what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Alex Hernandez

First Active2000-08-30
Last Active2009-11-20
Cisco VPN Client 0day Integer Overflow
Posted Nov 20, 2009
Authored by Alex Hernandez

Cisco VPN Client 0day integer overflow denial of service proof of concept code.

tags | exploit, denial of service, overflow, proof of concept
systems | cisco
SHA-256 | 142bea9a4f77b4e9264718284df5e0a2a9694680c035f320894fc7e1f5fcd792
samsung-dos.txt
Posted Sep 5, 2008
Authored by Alex Hernandez

Proof of concept denial of service exploit for the Samsung DVR SHR-2040.

tags | exploit, denial of service, proof of concept
SHA-256 | f173614a1597153ec3b59cabe2a7e09d31c193e2ae9d282668f9b81a1b960b2d
insecurityoverview-samsung.pdf
Posted Sep 5, 2008
Authored by Alex Hernandez

An Insecurity Overview of the Samsung DVR SHR-2040.

tags | paper
SHA-256 | 365bacaa549cc4b8728baff6b78163b0b7ac855f06d5191d8fb1f5d06a90cef0
altiris.pdf
Posted May 15, 2008
Authored by Alex Hernandez, Sirdarckcat

Whitepaper discussing privilege escalation vulnerability in the Symantec Altiris Deployment Solution.

tags | paper
SHA-256 | 2fc81172db8cad360b6b8a9a6ecafd03ebc2aeeecdb3406f9337639913e4d644
symantec-escalate.txt
Posted May 15, 2008
Authored by Alex Hernandez, Sirdarckcat

Symantec Altiris Client Service versions 6.5.248, 6.5.299, and 6.8.378 local privilege escalation exploit. Based on the vulnerability noted in MS04-019.

tags | exploit, local
SHA-256 | f1cad553cb21404e91c8a9c6e6ccb9b9a40445cde887bdb7e08dc593a46a8c79
dvr3204_exp.txt
Posted Dec 29, 2007
Authored by Alex Hernandez

March networks DVR 3204 logfile information disclosure exploit.

tags | exploit, info disclosure
SHA-256 | a8de9f2ff246734bbfaa7def4155ecf81a21aecd1eef7445b563c86d73e1d08c
dvr-cctv.pdf
Posted Dec 28, 2007
Authored by Alex Hernandez

Whitepaper called An Insecurity Overview of the March networks DVR-CCTV 3204.

tags | paper
SHA-256 | 272d573166df365763980b1a1734f4622be73e3d1c9175afd0c35ef2ecdd1cbd
airsensor-dos.txt
Posted Sep 19, 2007
Authored by Alex Hernandez

Airsensor M520 httpd remote preauth denial of service buffer overflow proof of concept exploit.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | 392a2c06e846eb34be94f8491f3cd9e418fb9922ce9d10cb8550bc8ea7efb3db
tactical.pdf
Posted Aug 28, 2007
Authored by Alex Hernandez | Site sybsecurity.com

Whitepaper called Tactical Exploitation and Response Over Solaris Sparc 5.8/5.9 systems.

tags | paper
systems | solaris
SHA-256 | 6608bd953c5fb32d95cbbe74636f7a82f56e28a44f64441079dd58df993f8107
pUll.pl
Posted Jul 8, 2002
Authored by Zillion, Alex Hernandez | Site safemode.org

Slrnpull '-d' buffer overflow exploit. Executes shellcode with group 'news' privileges. Tested to work on an Intel Red Hat 6.2 installation .

tags | exploit, overflow, shellcode
systems | linux, redhat
SHA-256 | eccfcdb6d3ad013958b3649b816be1230bf50ad9509fddc11a59fc1c14880407
cifslogin.txt
Posted Jun 25, 2002
Authored by Alex Hernandez

Sharity Cifslogin Buffer Overflow - Several command line options can be made to crash /opt/cifsclient/bin/cifslogin, local root is possible.

tags | overflow, local, root
SHA-256 | 8f90a70db1881faaf91f285d05768df02e91bbfd9008ee9584cc954887ea8e03
slrnpull.overflow.txt
Posted Apr 25, 2002
Authored by Alex Hernandez

Slrnpull, which is installed sgid root on RedHat 6.2, contains an exploitable buffer overflow in the -d parameter.

tags | overflow, root
systems | linux, redhat
SHA-256 | 3950879882b96a2f764f65ca4f6bcaf9fe87f1de9f0abfc1ef9d7a26911d5c12
Xerver-2.10.txt
Posted Mar 8, 2002
Authored by Alex Hernandez

The Xerver Free Web Server v2.10 contains file disclosure and denial of service vulnerabilities. Platforms affected include Windows, Linux, BSD, Solaris, and Mac. Exploits included.

tags | exploit, web, denial of service, vulnerability
systems | linux, windows, solaris, bsd
SHA-256 | 38182b4e729c84958d0fc82d0597349a14e9eea6c1efb3b69df525ff368496eb
Colbalt-RAQ-v4.txt
Posted Mar 4, 2002
Authored by Alex Hernandez

Cobalt's RAQ 4 server has three remote vulnerabilities. The service.cgi script has a cross site scripting vulnerability because it incorrectly parses the incoming searches and includes HTML tags and Javascript in the result. A directory traversal vulnerability allows attackers to read restricted files or passwords and profiles the users. In addition, a very long URL string will crash the service. Exploits included.

tags | exploit, remote, cgi, javascript, vulnerability, xss
SHA-256 | 5ff610883de6c62b6e21a04a4afd2e050469e4e36cf69e6665831f6d3baaed70
Phusion-web.txt
Posted Feb 19, 2002
Authored by Alex Hernandez

The Phusion Webserver v1.0 for Windows 9x/NT/2000 contains three remote vulnerabilities which allow users to see and retrieve any file on the server. Exploit information included.

tags | exploit, remote, vulnerability
systems | windows
SHA-256 | 803f44e633274876ffbcfb29b2146327c1f1601a0dfad1a62a327fe9914c10b2
defcom.innfeed.txt
Posted Apr 19, 2001
Authored by Alex Hernandez, Enrique A. Sanchez Montellano | Site defcom.com

Defcom Labs Advisory def-2001-19 - Innfeed has local stack overflow vulnerabilities in the logOrPrint() function which can be exploited to give uid=news. Tested on Slackware 7.1, Mandrake 7.0, and RedHat 7.2. Includes a patch, proof of concept exploit x-startinnfeed.c, and a shell script to brute force the offset.

tags | overflow, shell, local, vulnerability, proof of concept
systems | linux, redhat, slackware, mandrake
SHA-256 | 4138178fdea0de7a98d769d075ebec0aa842b1ff03426901f91cd2c8b12ac932
fpage-DoS.pl
Posted Aug 30, 2000
Authored by Alex Hernandez | Site raza-mexicana.org

Fpage-DoS.pl - Info based attacks DoS Front page. To exploit this vunerability you must have the extensions "/ _ vti_bin/shtml.exe in your server. This is a demonstration script to remotely overflow various server buffers, resulting in a denial of service, for TESTING purposes only. Runs on *nix & Windows with perl.

tags | denial of service, overflow, perl
systems | windows
SHA-256 | fd30db3d59fb11eebed664de7828aa72bf38858d22179822a5620979f47adbd7
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close