exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 326 - 350 of 620 RSS Feed

Files from Luigi Auriemma

Email addressaluigi at autistici.org
First Active2003-04-05
Last Active2024-09-01
aa2k7x.zip
Posted Sep 6, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit that demonstrates format string and spoofing vulnerabilities in Alien Arena 2007 versions 6.10 and below.

tags | exploit, spoof, vulnerability, proof of concept
SHA-256 | 983c751308a13680144237d2003e68638637bbb64d2d36567cfc028e14b860fe
aa2k7x.txt
Posted Sep 6, 2007
Authored by Luigi Auriemma | Site aluigi.org

Alien Arena 2007 versions 6.10 and below suffers from format string and spoofing vulnerabilities.

tags | advisory, spoof, vulnerability
SHA-256 | 0b90b11ae59dc5f5ab856a67f3fdea7c517921c1c8c1880e96c20073026919b5
dumsdei.zip
Posted Aug 30, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for Doomsday versions 1.9.0-beta5.1 and below which suffer from buffer overflow and format string vulnerabilities.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | 540586ef80480715169575fdef1387b665923b0654d8df90e0786eee899364c3
dumsdei.txt
Posted Aug 30, 2007
Authored by Luigi Auriemma | Site aluigi.org

Doomsday versions 1.9.0-beta5.1 and below suffer from buffer overflow and format string vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | b38dd3ee54d69e26999d0080a3cde63195198e6bb749b37c5f24934d46ca4cee
soldatdos.zip
Posted Aug 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept code for denial of service vulnerabilities in the Soldat game versions 1.4.2 and below and dedicated server versions 2.6.2.

tags | exploit, denial of service, vulnerability, proof of concept
SHA-256 | 3005f31e941811511bd88f2bb526a850dffa395ae2d56fed3f027e2fb7748ad3
soldatdos.txt
Posted Aug 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

The Soldat game versions 1.4.2 and below and dedicated server versions 2.6.2 and below suffer from remote denial of service vulnerabilities.

tags | advisory, remote, denial of service, vulnerability
SHA-256 | c121d53c7807204b349e59fbe33948e8d35c58dfe47a0285897ffd07e5095c24
skulltaghof.zip
Posted Aug 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept code for Skulltag versions 0.97d-beta4.1 and below which suffer from a remote heap overflow vulnerability.

tags | exploit, remote, overflow, proof of concept
SHA-256 | e9d38b49f2deb4e094f8c1cad77d630631d6ef35b273eb54f4e21b546c61698e
skulltaghof.txt
Posted Aug 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Skulltag versions 0.97d-beta4.1 and below suffer from a remote heap overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | fe9fc77a8b0717b18cfb5e992d1646044279a98963804816b115232458a6599f
asurabof.zip
Posted Aug 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept buffer overflow exploit for the Asura engine included with Rogue Trooper versions 1.0 and below and Prism: Guard Shield versions 1.1.1.0 and below which suffers from a buffer overflow vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | 7618b4bbc8c5df0185b1b622c41fdfb807190b4aeb24b3f171fd8e33d014a9b6
asurabof.txt
Posted Aug 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

The Asura engine included with Rogue Trooper versions 1.0 and below and Prism: Guard Shield versions 1.1.1.0 and below suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | b2da20b37df5ce4d44f52dde0e4992d9bbd948fe01888fca9909218c4aa7dce6
toribashish.zip
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for vulnerabilities in Toribash versions 2.71 and below.

tags | exploit, vulnerability, proof of concept
SHA-256 | bc7f5880bd7b38c848149f860d5730d6ded7c35e331dd519f7c18c903a4602cb
toribashish.txt
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

Toribash versions 2.71 and below suffer from buffer overflow and format string vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 2aecc01549531c4b7660823f4c93969a51abc19e597475b2ac6e5bcea7bbb71c
rfactox.txt
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

rFactor versions 1.250 and below suffer from buffer overflow and code execution vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
SHA-256 | a9a01d0ca9d025f9d3c5e130dfa1d4697908ec4e38d14ea3a2b0bc476fe97278
unrwebdos.zip
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

Denial of service exploit that demonstrates a buffer overflow in the logging function of the Unreal engine.

tags | exploit, denial of service, overflow
SHA-256 | 256616a46fd983fd5ab187b9b434b3f728d79cf9edac8d029f1e4dce45b796bc
unrwebdos.txt
Posted Aug 20, 2007
Authored by Luigi Auriemma | Site aluigi.org

The logging function of the Unreal engine suffers from a buffer overflow.

tags | advisory, overflow
SHA-256 | 7ddf6ee9235d007b3d67bcfd3d6435cdede70d2e7c30362fed19fdc35676cc6b
zoidboom2.zip
Posted Aug 15, 2007
Authored by Luigi Auriemma | Site aluigi.org

Zoidcom versions 0.6.7 and below proof of concept exploit that demonstrates a crash vulnerability.

tags | exploit, proof of concept
SHA-256 | 138fd40e2de6eb84ad1259c781269ae1077d0bedea7a2ecaa48a56bea5fe28a1
zoidboom2.txt
Posted Aug 15, 2007
Authored by Luigi Auriemma | Site aluigi.org

Zoidcom versions 0.6.7 and below suffer from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 6c64dd688249e42705afcfe0d02685cc9c5a4d9fc2fcd6aecc882c6d0119dcb7
bv2x.zip
Posted Aug 15, 2007
Authored by Luigi Auriemma | Site aluigi.org

Babo Violent 2 versions 2.08.00 and below proof of concept exploit that demonstrates multiple vulnerabilities.

tags | exploit, vulnerability, proof of concept
SHA-256 | bd1d92a75ce86e15b8e3df93845f1ad8307b2d173d06b3178b1ed0ea01de1ad3
bv2x.txt
Posted Aug 15, 2007
Authored by Luigi Auriemma | Site aluigi.org

Babo Violent 2 versions 2.08.00 and below suffer from multiple vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 0f461d45f7c3f8e045742f3dfc0c3e6cc5a393c4bc4a8ac951f0dba55b58dfec
lfsfp.zip
Posted Aug 15, 2007
Authored by Luigi Auriemma | Site aluigi.org

Live For Speed versions 0.5X10 and below proof of concept exploit that demonstrates buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | 0c6a89beb4a07b95ba34a7e6422d06439298f78de9f2f3aeece9e5828367709a
lfsfp.txt
Posted Aug 15, 2007
Authored by Luigi Auriemma | Site aluigi.org

Live For Speed versions 0.5X10 and below suffer from multiple buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 35c0c543c662e582655aab6f86cbb8576f08030cb8f3b86b10bea4e9f91c20ef
conquest-overflow.txt
Posted Mar 9, 2007
Authored by Luigi Auriemma | Site aluigi.org

Conquest versions 8.2a (svn 691) and below suffer from buffer overflow and memory corruption vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 858134cf9631a43c96c8ccdb82c9d9e1ae83103f68ee6d3468c7fa13d3ca8cd0
netrekfs.zip
Posted Mar 8, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for Netrek versions 2.12.0 and below which suffer from a format string vulnerability.

tags | exploit, proof of concept
SHA-256 | 93c912a65f97bc2caa9814c08bf6f13b9a409e47d7b90b10ac88e62c3795baaf
netrekfs.txt
Posted Mar 8, 2007
Authored by Luigi Auriemma | Site aluigi.org

Netrek versions 2.12.0 and below suffer from a format string vulnerability.

tags | advisory
SHA-256 | 41c173dd96c828918b04020674893aaebeedf56a458fb39de4e1d091992fd623
simbin.txt
Posted Feb 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Games developed by SimBin suffer from a denial of service flaw where a UDP packet of zero bytes sent to the server disconnects all clients.

tags | advisory, denial of service, udp
SHA-256 | fa5e287f5b93583af9eab52af614b8dc703f1025f7cf7aec03ff410c09fbf9f7
Page 14 of 25
Back1213141516Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close