what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 613 RSS Feed

Files from Luigi Auriemma

Email addressaluigi at autistici.org
First Active2003-04-05
Last Active2015-03-06
DATAC RealWin SCADA Server SCPC_TXTEVENT Buffer Overflow
Posted Nov 24, 2010
Authored by Luigi Auriemma, MC | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.1.8.10). By sending a specially crafted packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2010-4142, OSVDB-68812
SHA-256 | b59d9a1f23c5626c6efa73bf36caa496b08cb3ed11b9c2ff88e058916f50b1c6
DATAC RealWin SCADA Server SCPC_SCPC_INITIALIZE Buffer Overflow
Posted Oct 19, 2010
Authored by Luigi Auriemma, MC | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.1.8.10). By sending a specially crafted packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 6cf335d7a911baa5a781d9110c547c3f8feb4e5400dc4f0212b17723f78da7c3
DATAC RealWin SCADA Server SCPC_INITIALIZE_RF Buffer Overflow
Posted Oct 19, 2010
Authored by Luigi Auriemma, MC | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.1.8.10). By sending a specially crafted packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 388759d36655c0ed2039607f9ec5c8c8d9a87a60ebfb3d8b487ad627d522e542
DATAC RealWin 2.0 Stack Overflow
Posted Oct 16, 2010
Authored by Luigi Auriemma | Site aluigi.org

DATAC RealWin versions 2.0 build 6.1.8.10 and below suffer from multiple stack overflow vulnerabilities.

tags | exploit, overflow, vulnerability
SHA-256 | 10cc6e32b4b5e6a19e7719ef4706e7a1cd904c85d9ca48c6783de69e3ed6cdc2
Rocket Software UniData 7.2.7.3806 Denial Of Service
Posted Oct 16, 2010
Authored by Luigi Auriemma | Site aluigi.org

Rocket Software UniData versions 7.2.7.3806 and below suffer from various denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | d61f5f2e29252ddc27c114fab16623b0aa6b985c5be991ced7e832b553b7098f
IBM solidDB 6.5.0.3 Denial Of Service
Posted Oct 16, 2010
Authored by Luigi Auriemma | Site aluigi.org

IBM solidDB versions 6.5.0.3 and below suffer from a remote denial of service vulnerability when receiving a malformed packet.

tags | exploit, remote, denial of service
SHA-256 | 863115a1791808ffc3159bf92a78b1ccf005d2d625480a6795e9b2f627e2039f
Winamp 5.5.8.2985 Integer / Buffer Overflows
Posted Oct 14, 2010
Authored by Luigi Auriemma | Site aluigi.org

Winamp versions 5.5.8.2985 and below suffer from various integer overflows and a buffer overflow. Demonstration proof of concept code included.

tags | exploit, overflow, proof of concept
SHA-256 | a0cb1e9de2217d6f06ad1289f88cdf207c26d90803921c157b810b06c921fa89
Unreal Tournament III Uninitialized Pointer
Posted Jul 21, 2010
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament III suffers from an uninitialized pointer vulnerability.

tags | advisory
SHA-256 | 4f03ee16d11664440497200a3044e2b1c74ba81bb6fd7c59fec78d672f1e22b5
Lithtech Engine Memory Corruption
Posted Jul 21, 2010
Authored by Luigi Auriemma | Site aluigi.org

The Lithtech engine in F.E.A.R and F.E.A.R. 2 Project Origin suffers from a memory corruption vulnerability. Exploit included.

tags | exploit
SHA-256 | 34287796cabe7c93695c0dc48cdfbec8df8c736277f0b7f0ea6e0911536a1625
DirectPlay8 NULL Pointer / Access Violation
Posted Jul 21, 2010
Authored by Luigi Auriemma | Site aluigi.org

DirectPlay8 suffers from NULL pointer and access violation / freeze vulnerabilities. Exploit included.

tags | exploit, vulnerability
SHA-256 | 1059213ca6067595a354e83762de856ece3e7b9ef12c97d4dfcd58d11a74000f
Freeciv 2.2.1 Denial Of Service
Posted Jul 8, 2010
Authored by Luigi Auriemma | Site aluigi.org

Freeciv version 2.2.1 suffers from denial of service vulnerabilities. Exploit included.

tags | exploit, denial of service, vulnerability
SHA-256 | 9d9e673eee5c1ce184752800c40c16a06d773e5a251dffdd15ceaf0a2a965042
Ghost Recon Advanced Warfighter 1 / 2 Overflows
Posted Jul 8, 2010
Authored by Luigi Auriemma | Site aluigi.org

Ghost Recon Advanced Warfighter versions 1 and 2 suffer from integer and array indexing overflows.

tags | advisory, overflow
SHA-256 | d973bcc1e6529953596abb97784dab67f32422d00caf4533203eb9fcab4cab84
EA Battlefield 2 / Battlefield 2142 Multiple Arbitrary File Upload
Posted Jul 8, 2010
Authored by Luigi Auriemma | Site aluigi.org

The Refractor 2 engine in Battlefield 2 versions 1.50 and below and Battlefield 2142 versions 1.50 and below suffers from multiple arbitrary file upload vulnerabilities. Exploit included.

tags | exploit, arbitrary, vulnerability, file upload
SHA-256 | c719436be31cc3d812b256a0566b6669d91a7366594c74a49b5940eb5ce70c97
Qt 4.6.3 Denial Of Service
Posted Jul 8, 2010
Authored by Luigi Auriemma | Site aluigi.org

Qt versions 4.6.3 and below suffer from a remote denial of service vulnerability. Exploit included.

tags | exploit, remote, denial of service
SHA-256 | a98ad307a19189b74621d8afdcf89966c842795c15ee9ef0845f54e7ed9b8ae5
Updated SAP MaxDB 7.6.03 Build 007 Pre-Auth Code Execution
Posted Feb 9, 2010
Authored by Luigi Auriemma, Peter Osterberg | Site aluigi.org

Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. This version has been updated by FortConsult A/S to use the same byte code as the Nessus plugin.

tags | exploit, remote, code execution
SHA-256 | 05af56508525edf0cf99ea659ff6d05ca91fd9083283f2d88a196e7beafa974b
Icecast 2.0.1 Header Overwrite
Posted Nov 26, 2009
Authored by Luigi Auriemma, spoonm | Site metasploit.com

This Metasploit module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array.

tags | exploit, web, overflow
advisories | CVE-2004-1561
SHA-256 | f52566cdec54b398c8bf936c7c78edca800747f33139bbed5058021572328958
UDPSZ UDP Spoofing Tool
Posted Jul 14, 2009
Authored by Luigi Auriemma | Site aluigi.org

UDPSZ is a simple proof of concept exploit/tool for spoofing UDP.

tags | exploit, udp, spoof, proof of concept
SHA-256 | e8042b84d8869853e556af1e563425d40d6be10c6bc20ebe6ae535458a135f23
America's Army 3 Packet Loop
Posted Jul 14, 2009
Authored by Luigi Auriemma | Site aluigi.org

America's Army 3 versions 3.0.5 and below suffer from an endless packet looping vulnerability.

tags | advisory
SHA-256 | cc12aed70ab266df042298956c3516806327ca54a06e4cd885e9b01d6b5f7a43
America's Army 3 Crash
Posted Jul 14, 2009
Authored by Luigi Auriemma | Site aluigi.org

America's Army 3 versions 3.0.5 and below suffer from resource consumption and crash vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 436dc7355cb5fcab14d683b579c77e9406c373195bab6416c1280d2890f812ad
America's Army 3 Null Pointer
Posted Jul 14, 2009
Authored by Luigi Auriemma | Site aluigi.org

America's Army 3 versions 3.0.4 and below suffer from a null pointer vulnerability.

tags | exploit
SHA-256 | 3acfb90412f07f7f8f0f99747a102e8c481be969db2fe902334f360e2dba9822
unreal-1.3-dirtrav.txt
Posted Sep 21, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal Tournament v1.3 (build 3601 and 3614) suffer from a directory traversal in the web interface.

tags | exploit, web
SHA-256 | 17218c9d1f467e7dd29ba5fb2bb0ee6793d87e3757a1e1aff9b2b1d9d7d13482
unrealfp.zip
Posted Sep 16, 2008
Authored by Luigi Auriemma | Site aluigi.org

Server shutdown exploit for Unreal Engine which suffers from a failed assertion vulnerability.

tags | exploit
SHA-256 | b7e7f1463c21f51de7f49c1f903f44cdd78632aa54a69a21b30c8bf88a042f62
unrealfp.txt
Posted Sep 16, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal Engine suffers from a failed assertion vulnerability that allows for server shutdown.

tags | advisory
SHA-256 | 83af6f51a1662c1603b02411ceb0ebbbaeea83057640b31febbbbed85f5c3498
unrealclient.tgz
Posted Sep 11, 2008
Authored by Luigi Auriemma | Site aluigi.org

The Unreal engine is affected by some format string vulnerabilities which can be exploited by a malicious server when the victim client connects to it. The main format string can be exploited through a malformed CLASS parameter of the DLMGR command but another one seems to be exploitable through the forcing of the download of a malformed package (PKG). Some older games instead can be exploited through a malformed LEVEL parameter of the WELCOME command. The bug is caused by the calling of _vsnwprintf_s or _vsnwprintf for building an error message to visualize to the user (for example for a missing class) using a max size of 4 kilobytes and, naturally, without passing the needed format argument. All related exploit code is included in this tarball.

tags | exploit, vulnerability
SHA-256 | 863f67850b55e9c9c3297e5e56a9c2c5c4cb9c1adea759190bb77fe1d9feaa1b
ut3sticle.zip
Posted Sep 11, 2008
Authored by Luigi Auriemma | Site aluigi.org

Unreal engine 3 remote denial of service exploit that leverages a failed memory allocation vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 085f6e99f790ab5b50851dcc299a7b582152c776dedb75e44dd63093bef86737
Page 6 of 25
Back45678Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close