exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 106 RSS Feed

Files from Maksymilian Arciemowicz

Email addresscxib at securityreason.com
First Active2005-02-26
Last Active2016-12-12
Vsftpd 2.3.2 Denial Of Service
Posted Mar 1, 2011
Authored by Maksymilian Arciemowicz

Vsftpd versions 2.3.2 on NetBSD and 2.3.0 on Ubuntu suffer from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
systems | linux, netbsd, ubuntu
advisories | CVE-2011-0762
SHA-256 | 582c1d1692bc5d0b1eb73bec75e387f99e33527b0bb2b8270799c9b544858506
PHP 5.2.5 grapheme_extract() NULL Pointer Dereference
Posted Feb 16, 2011
Authored by Maksymilian Arciemowicz

PHP version 5.2.5 suffers from a grapheme_extract() null pointer dereference vulnerability.

tags | exploit, php
advisories | CVE-2011-0420
SHA-256 | 03b8ac9c97cec89d34b8ed048ab62fda0ab9ae70423a1f1f02f86a029656b0fe
GNU libc/regcomp(3) Overflow / Stack Exhaustion
Posted Jan 7, 2011
Authored by Maksymilian Arciemowicz

GNU libc/regcomp(3) suffers from overflow and stack exhaustion vulnerabilities. proftpd.gnu.c exploit included.

tags | exploit, overflow, vulnerability
systems | linux
advisories | CVE-2010-4051, CVE-2010-4052
SHA-256 | 43e26bde432a5e50b401382b8c5f29be36e9aef9c061f0a6cff7b5f6cc7132b4
Apache Insecure mod_rewrite PCRE Resource Exhaustion
Posted Dec 21, 2010
Authored by Maksymilian Arciemowicz

Apache suffers from an insecure mod_rewrite PCRE resource exhaustion vulnerability.

tags | advisory
SHA-256 | 7d492d273943f22315c2cb19f58a3dea3975e892b72a898b79db1d05e192fe87
PHP 5.3.3 Integer Overflow
Posted Dec 10, 2010
Authored by Maksymilian Arciemowicz

PHP version 5.3.3 suffers from a NumberFormatter::getSymbol integer overflow vulnerability.

tags | exploit, overflow, php
advisories | CVE-2010-4409
SHA-256 | 1df59e17c946c51528d4029507cbbbe55391b84ff9525a5af9000a7bc64461a6
PHP 5.3.3 / 5.2.14 ZipArchive::getArchiveComment NULL Pointer Dereference
Posted Nov 8, 2010
Authored by Maksymilian Arciemowicz

PHP versions 5.3.3 and 5.2.14 suffer from a ZipArchive::getArchiveComment NULL pointer dereference vulnerability.

tags | exploit, php
advisories | CVE-2010-3709
SHA-256 | 68be23c50207c40ec5d2536feb3f2e9140c61ce6c6338a7459cb75b6dbf43313
Multiple Vendors libc/glob(3) Resource Exhaustion
Posted Oct 8, 2010
Authored by Maksymilian Arciemowicz

libc/glob(3) suffers from a resource exhaustion vulnerability. Proof of concept code included. Affected includes OpenBSD 4.7, NetBSD 5.0.2, FreeBSD 7.3/8.1, Oracle Sun Solaris 10 and GNU Libc (glibc).

tags | exploit, proof of concept
systems | netbsd, solaris, freebsd, openbsd
advisories | CVE-2010-2632
SHA-256 | 0fe71b6c891ef4cf59d9008f85704335ab1de299aa1ecc8f4f06ae19461af5cd
FreeBSD 8.1 / 7.3 vm.pmap Kernel Race Condition
Posted Sep 9, 2010
Authored by Maksymilian Arciemowicz

FreeBSD versions 7.3 and 8.1 suffer from a vm.pmap kernel local race condition denial of service vulnerability.

tags | exploit, denial of service, kernel, local
systems | freebsd
SHA-256 | 15ff6a10a74c00f3447bc440c3c878c02a0a5a9e6a2ff0a3d99e2b1daab2d3ea
FreeBSD 8.0 ftpd Off-By-One Proof Of Concept
Posted May 28, 2010
Authored by Adam Zabrocki, Maksymilian Arciemowicz

FreeBSD version 8.0 ftpd off-by-one proof of concept exploit.

tags | exploit, proof of concept
systems | freebsd
advisories | CVE-2010-1938
SHA-256 | a17d270d62782bdb0279584ea2dad8c8fe353c35767657f09ffda201da15d4f5
Sun Solaris 10 libc/*convert Buffer Overflow
Posted May 22, 2010
Authored by Maksymilian Arciemowicz

Sun Solaris 10 libc/*convert (*cvt) suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | solaris
SHA-256 | 9b14cab195e419fc0bf7bb1409772fa4266c6cf1aed8fedf93eec1a3dff9a281
Sun Solaris 10 filesystem rm(1),find(1),etc Denial Of Service
Posted May 22, 2010
Authored by Maksymilian Arciemowicz

Sun Solaris 10 filesystem rm, find, etc suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | solaris
SHA-256 | 1e273224020c7a25c0ba05d1352ca20c832b1e821ac772c1024178bcdeab6176
Sun Solaris 10 ftpd Cross Site Request Forgery
Posted May 22, 2010
Authored by Maksymilian Arciemowicz

Sun Solaris 10 ftpd suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
systems | solaris
SHA-256 | 7c3ed2c5a6f4bc2080796dcb6ccb70ee63dd0b5d4ad81d589821c55d8d7da5d7
Mac OS X 10.6.3 Filesystem HFS Denial Of Service
Posted Apr 24, 2010
Authored by Maksymilian Arciemowicz

Mac OS X version 10.6.3 suffers from a HFS related denial of service vulnerability.

tags | exploit, denial of service
systems | apple, osx
advisories | CVE-2010-0105
SHA-256 | 164e411db38aa88a7e22d17c8d7b70711b8105a1c5ddae787f697ee6ae07c1ab
Mac OS X 10.5 / 10.6 libc/strtod(3) Buffer Overflow
Posted Jan 9, 2010
Authored by Maksymilian Arciemowicz | Site securityreason.com

Mac OS X versions 10.5 and 10.6 suffers from a buffer overflow vulnerability in libc/strtod(3).

tags | exploit, overflow
systems | apple, osx
advisories | CVE-2009-0689
SHA-256 | 330c9d7d085bc82da2371af39d43273ccaac08ea388a26d47fb3bf3d953867d8
Matlab R2009b Array Overrun
Posted Jan 9, 2010
Authored by Maksymilian Arciemowicz | Site securityreason.com

Matlab R2009b suffers from an array overrun vulnerability that allows for code execution.

tags | exploit, overflow, code execution
advisories | CVE-2009-0689
SHA-256 | d0fecd045e6348016e15d944f4d2ab38c62e2de8cd2a7176be5367552b8e4e29
J 6.02.023 Array Overrun
Posted Jan 9, 2010
Authored by Maksymilian Arciemowicz | Site securityreason.com

J version 6.02.023 suffers from an array overrun vulnerability.

tags | exploit, overflow
advisories | CVE-2009-0689
SHA-256 | 07186da5845d16072c45cb784eb5b3b228dfd83cfc5385b39f355ccccd3d8bc2
PHP 5.2.12 / 5.3.1 symlink() open_basedir Bypass
Posted Dec 21, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHP versions 5.2.12 and 5.3.1 suffer from a symlink() open_basedir bypass vulnerability.

tags | exploit, php, bypass
SHA-256 | 1d9cd89835a6198f59b89c83701718f2f5b216f7cabf01a8a62f26935f81a051
Thunderbird 2.0.0.23 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Thunderbird version 2.0.0.23 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 9a6a391941b200a19efd9a43cd84797f49e731b5b7c082401291e365c9294a3d
Sunbird 0.9 Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Sunbird version 0.9 suffers from a remote array overrun that allows for code execution.

tags | exploit, remote, overflow, code execution
advisories | CVE-2009-0689
SHA-256 | 2483a1810a65e2b43ccfed2e7e173d84dd8e586834924704ffeccf778c51a7b4
Camino 1.6.10 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Camino version 1.6.10 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | e16541afa2295ecb3f4cbf992119b30a71799c09664819cedf8c4168e8bb4a6f
Flock 2.5.2 Remote Array Overrun
Posted Dec 12, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Flock version 2.5.2 suffers from a remote array overrun that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 3046782d52e5b5223a145b479d898e4e8979080472f8c526d055bf3af11ab4b5
PHP ini_restore Memory Disclosure
Posted Dec 4, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHP suffers from an ini_restore() related memory information disclosure vulnerability.

tags | exploit, php, info disclosure
advisories | CVE-2009-2626
SHA-256 | 2cb1b058ea1c9470f0fb1332b5e80ee970764c67f4f3fd6b726311532d1ceb21
KDELibs 4.3.3 Remote Array Overrun
Posted Nov 20, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

KDE KDELibs version 4.3.3 suffers from a remote array overrun vulnerability that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 6f52b93fb01923395e9e086f5499f4f495580fa36af7131b1bed3d92eb179b44
Opera 10.01 Remote Array Overrun
Posted Nov 20, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

Opera version 10.01 suffers from a remote array overrun vulnerability that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | a37b1ab07f2eb1b10acb2a9937e5b99e96db9296d51a29455557a8d718666d22
K-Meleon 1.5.3 Remote Array Overrun
Posted Nov 20, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

K-Meleon version 1.5.3 suffers from a remote array overrun vulnerability that allows for arbitrary code execution.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2009-0689
SHA-256 | 4f99f451546f29e0f79ecb622261bf75af36cf92b6e4376642a36de97a3e3327
Page 2 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close