exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 613 RSS Feed

Files from Luigi Auriemma

Email addressaluigi at autistici.org
First Active2003-04-05
Last Active2015-03-06
Optima APIFTP 1.5.2.13 NULL Pointer
Posted Nov 14, 2011
Authored by Luigi Auriemma | Site aluigi.org

Optima APIFTP server versions 1.5.2.13 and below suffer from endless loop and NULL pointer vulnerabilities.

tags | exploit, vulnerability
systems | linux
SHA-256 | 3b2741903629c4845132b4ba7b1e2d6652a0a961f5708a28aad6d53aaf6442df
Microsoft Excel Use-After-Free
Posted Nov 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsoft Excel in Office 2003 version 11.8335.8333 SP3 suffers from a use-after-free vulnerability. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | de3b7829c10d4b0bb9337bbec900ab6dba8975b738f7268a64884cb5d48ea585
HP Data Protector Media Operations 6.20 Directory Traversal
Posted Nov 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

HP Data Protector Media Operations versions 6.20 and below suffer from a directory traversal vulnerability. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | c616b8c10bf822e6f792c5e79c0b731416917f82c9947882c509bbae639cf484
HP Data Protector Media Operations 6.20 Heap Corruption
Posted Nov 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

HP Data Protector Media Operations versions 6.20 and below suffer from a heap corruption vulnerability.

tags | advisory
SHA-256 | af5e76c52f4018432b4920e228ed337cdd6ec28166118bae3d87ea69d6286f47
Microsoft Excel Memory Corruption
Posted Nov 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsoft Excel in Office 2003 version 11.8335.8333 SP3 suffers from a memory corruption vulnerability. Proof of concept included.

tags | exploit, proof of concept
systems | linux
SHA-256 | 7bc888fe4dd23f5c472f81da4b3f94f9ff21c5f791f277ebde1ec6021951f893
Microsys PROMOTIC 8.1.4 Code Execution
Posted Oct 31, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsys PROMOTIC version 8.1.4 suffers from a code execution vulnerability due to an uninitialized pointer that is exploitable via the GetPromoticSite method of the PmTable.ocx active-x control.

tags | exploit, code execution, activex
systems | linux
SHA-256 | b0a62dda9986c2c4f7a5bd5b6f586762d0e8b4383c7500db646fd8cb0ea01ab5
Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow
Posted Oct 24, 2011
Authored by Luigi Auriemma, James Fitts | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Cytel Studio <= 9.0. The overflow is triggered during the copying of strings to a stack buffer of 256 bytes.

tags | exploit, overflow
advisories | OSVDB-75991
SHA-256 | 54cba2669ee78e390a6c7b20623fad6a9b5c9f2f49e59b8a55adc94afd84b482
PROMOTIC 8.1.3 Directory Traversal / Overflows
Posted Oct 14, 2011
Authored by Luigi Auriemma | Site aluigi.org

PROMOTIC version 8.1.3 suffers from an ActiveX SaveCfg stack overflow, an ActiveX AddTrend heap overflow, and a directory traversal. Details and proof of concept included.

tags | exploit, overflow, activex, proof of concept, file inclusion
systems | linux
SHA-256 | 3771948f0bd952728776730df1a273e42847c65f28d2f2d69c737d27de5ba2c2
PcVue 10.0 Function Pointer Overwrite
Posted Oct 14, 2011
Authored by Luigi Auriemma, mr_me, TecR0c | Site metasploit.com

This Metasploit module exploits a function pointer control within SVUIGrd.ocx of PcVue 10.0. By setting a dword value for the SaveObject() or LoadObject(), an attacker can overwrite a function pointer and execute arbitrary code.

tags | exploit, arbitrary
SHA-256 | 9cec135d4cf28788b201ff76bbf8e4da5b3898cae8eca25fb07c606afc723f80
atvise webMI2ADS 1.0 Directory Traversal / Denial Of Service
Posted Oct 11, 2011
Authored by Luigi Auriemma | Site aluigi.org

atvise webMI2ADS versions 1.0 and below suffer from directory traversal, NULL pointer, termination, and resource consumption vulnerabilities.

tags | exploit, vulnerability
systems | linux
SHA-256 | c8de8c2737604f7f41b76e7d2424b6442a3e1ef4cd17c90108cadec3df0bd7a9
IRAI AUTOMGEN 8.0.0.7 Use-After-Free
Posted Oct 11, 2011
Authored by Luigi Auriemma | Site aluigi.org

IRAI AUTOMGEN versions 8.0.0.7 and below suffer from a use-after-free vulnerability.

tags | exploit
systems | linux
SHA-256 | 591426b6f67dcfdbd177f4d7f529500eedb1243e3a1f09710a8f5dba34c5d4d1
OPC Systems.NET 4.00.0048 Denial Of Service
Posted Oct 11, 2011
Authored by Luigi Auriemma | Site aluigi.org

OPC Systems.NET versions 4.00.0048 and below suffer from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 45324c6a520c4d80012a80fcd91e555d641006009de1f3be4b69876b1f99e308
GenStat 14.1.0.5943 Array / Heap Overflows
Posted Oct 4, 2011
Authored by Luigi Auriemma | Site aluigi.altervista.org

GenStat versions 14.1.0.5943 and below suffer from an array overflow with write2 and a heap overflow. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 0377384c7f84d834a0e39fbd2b9026bab2120403e763bcf646f4811e09951430
Cytel Studio: StatXact / LogXact / CrossOver 9.0.0 Overflows
Posted Oct 4, 2011
Authored by Luigi Auriemma | Site aluigi.altervista.org

Cytel Studio: StatXact / LogXact / CrossOver versions 9.0.0 and below suffer from multiple stack and integer overflows. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | f0aea5e4c39c536fab980b8b5bfd20fdeec3ce5e73e290377a07027665b46d62
eSignal / eSignal Pro 10.6.2425.1208 Buffer Overflow
Posted Sep 29, 2011
Authored by Luigi Auriemma, mr_me, TecR0c | Site metasploit.com

eSignal and eSignal Pro versions 10.6.2425.1208 and below suffer from a file parsing buffer overflow in QUO. Successful exploitation of this vulnerability may take up to several seconds due to the use of egghunter. Also, DEP bypass is unlikely due to the limited space for payload.

tags | exploit, overflow
advisories | CVE-2011-3494, OSVDB-75456
SHA-256 | 45cd9b3a8b486aca462800fbb23d651421a08959c7bf6605daf83dde4828f239
NCSS 07.1.21 Array Overflow
Posted Sep 29, 2011
Authored by Luigi Auriemma | Site aluigi.altervista.org

NCSS versions 07.1.21 and below suffer from an array overflow with write2.

tags | exploit, overflow
systems | linux
SHA-256 | c6619e3f31945a8a7b5e376281cae03af5f42af0a358b23c58813c1c6078ad33
PcVue 10.0 Code Execution / Overflow
Posted Sep 28, 2011
Authored by Luigi Auriemma | Site aluigi.altervista.org

PcVue versions 10.0 and below suffer from code execution, file corruption, and an array overflow.

tags | exploit, overflow, code execution
systems | linux
SHA-256 | 2b492fc5f7687d09c964607ba7f43df83758c2deffbd132dac6f74f247ee0d92
Sterling Trader 7.0.2 Integer Overflow
Posted Sep 26, 2011
Authored by Luigi Auriemma | Site aluigi.org

Sterling Trader versions 7.0.2 and below suffer from an integer overflow vulnerability.

tags | exploit, overflow
systems | linux
SHA-256 | be6fbbd5c1406751e12672870cb02440d8217601e35a328d93b875ae0e05adfd
Sunway ForceControl 6.1 SP3 Stack Overflow / Directory Traversal
Posted Sep 23, 2011
Authored by Luigi Auriemma | Site aluigi.org

Sunway ForceControl versions 6.1 SP3 and below suffer from stack overflows, directory traversals, third party ActiveX code execution, and denial of service vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability, code execution, activex
systems | linux
SHA-256 | 89c4c166c8194c9585125b7a6737879dcfa4a5324859d50835a4df7c6271c943
EViews 7.0.0.1 Memory Corruption / Heap Overflow
Posted Sep 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

EViews versions 7.0.0.1 and below suffer from memory corruption and heap overflow vulnerabilities.

tags | exploit, overflow, vulnerability
systems | linux
SHA-256 | be48badc72b4e1d5c824e861b9cf4392dc32970a580ebf2abc57ca1c1f2bcb31
MetaServer RT 3.2.1.450 Heap Overflow / Denial Of Service
Posted Sep 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

MetaServer RT versions 3.2.1.450 and below suffer from heap overflow and denial of service vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability
SHA-256 | 7a443b62dbf2c43b4d149adce2a09d72963021bff26038d582a82a3bcec0adad
DaqFactory HMI NETB Request Overflow
Posted Sep 19, 2011
Authored by Luigi Auriemma, mr_me | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Azeotech's DaqFactory product. The specific vulnerability is triggered when sending a specially crafted 'NETB' request to port 20034. Exploitation of this vulnerability may take a few seconds due to the use of egghunter. This vulnerability was one of the 14 releases discovered by researcher Luigi Auriemma.

tags | exploit, overflow
advisories | CVE-2011-3492, OSVDB-75496
SHA-256 | f768d01949d1c55ca3bfc13b8651ff570985496cb1e98d04e3b557ddfbf40e5e
Measuresoft ScadaPro 4.0.0 Remote Command Execution
Posted Sep 17, 2011
Authored by Luigi Auriemma, mr_me, TecR0c | Site metasploit.com

This Metasploit module allows remote attackers to execute arbitrary commands on the affected system by abusing a directory traversal attack when using the 'xf' command (execute function). An attacker can execute system() from msvcrt.dll to upload a backdoor and gain remote code execution.

tags | exploit, remote, arbitrary, code execution
SHA-256 | 802baf0283f3035901e556177c67bc14ff8b62fa5e4ccd9e691b0fd5740792be
Beckhoff TwinCAT 2.11.0.2004 Denial Of Service
Posted Sep 14, 2011
Authored by Luigi Auriemma | Site aluigi.org

Beckhoff TwinCAT versions 2.11.0.2004 and below suffer from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 9ae5fa0332f0210ce3e53d42906d8106eabd9512e4c02fcbfec8ff8f35aafb88
Measuresoft ScadaPro 4.0.0 Traversal / Overflow / Denial Of Service
Posted Sep 14, 2011
Authored by Luigi Auriemma | Site aluigi.org

Measuresoft ScadaPro versions 4.0.0 and below suffer from directory traversal, denial of service, and stack overflow vulnerabilities.

tags | exploit, denial of service, overflow, vulnerability
systems | linux
SHA-256 | 6639f15d908f337b59c6e233d17567a8e75300c3d7445e8916701a7b3a05d9d5
Page 3 of 25
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close