Exploit the possiblities
Showing 1 - 8 of 8 RSS Feed

Files from Evilcry

Email addressevilcry at gmail.com
First Active2008-03-24
Last Active2012-08-08
PHP IRC Bot pbot eval() Remote Code Execution
Posted Aug 8, 2012
Authored by Evilcry, juan vazquez, bwall, Jay Turla | Site metasploit.com

This Metasploit module allows remote command execution on the PHP IRC bot pbot by abusing the usage of eval() in the implementation of the .php command. In order to work, the data to connect to the IRC server and channel where find pbot must be provided. The module has been successfully tested on the version of pbot analyzed by Jay Turla, and published on Infosec Institute, running over Ubuntu 10.04 and Windows XP SP3.

tags | exploit, remote, php
systems | linux, windows, xp, ubuntu
MD5 | b4302c2d8b8f5eacb2c614d506570e68
Avast! Corruption / Escalation
Posted Nov 18, 2009
Authored by Evilcry, AbdulAziz Hariri

Avast's aswRdr.sys driver does not sanitize user supplied input IOCTL and this may lead to a kernel heap overflow that propagates on the system with a BSOD and offers potential risk of privilege escalation. Proof of concept code included.

tags | exploit, overflow, kernel, proof of concept
MD5 | cd96aecf6f16e39656603640bd2ae4de
Avast 4.8.1351.0 Privilege Escalation
Posted Sep 24, 2009
Authored by Evilcry | Site evilcry.altervista.org

Avast Antivirus version 4.8.1351.0 suffers from local denial of service and privilege escalation vulnerabilities.

tags | exploit, denial of service, local, vulnerability
MD5 | c1163f32f236af6bd2fec4b36b30bbe9
TheGreenBow VPN Denial Of Service
Posted Aug 17, 2009
Authored by Evilcry | Site evilcry.altervista.org

TheGreenBow VPN client versions 4.61.003 suffers from a local denial of service vulnerability in tgbvpn.sys.

tags | exploit, denial of service, local
MD5 | a61e3c21eebf4953ef8187ba6369eb4a
PHP Desktop 9.0.6 Denial Of Service
Posted Dec 30, 2008
Authored by Evilcry | Site evilcry.altervista.org

PGP Desktop version 9.0.6 local denial of service exploit that uses PGPwded.sys.

tags | exploit, denial of service, local
MD5 | 8ff8418c7176bd8204f6f1379436f395
greenbow-memory.txt
Posted Apr 8, 2008
Authored by Evilcry | Site evilcry.altervista.org

TheGreenBow IPSec VPN client version 4.10.010 suffers from a vulnerability where login credentials are stored in the clear in memory.

tags | advisory
MD5 | 4583049e2c02821e9106695dfd4bf778
xchat-disclose.txt
Posted Mar 28, 2008
Authored by Omnipresent, Evilcry | Site evilcry.altervista.org

XChat version 2.8.4-1 suffers from a password disclosure vulnerability.

tags | advisory, info disclosure
MD5 | 8859a198df5ac9c75c54cfc73d614c38
hamachi-disclose.txt
Posted Mar 24, 2008
Authored by Evilcry | Site evilcry.altervista.org

The Hamachi VPN client version 1.0.2.5 stores the password in clear text in memory.

tags | advisory, info disclosure
MD5 | c7445dbb15ea6cd5fcb91c3ff319f6a0
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    1 Files
  • 22
    Jan 22nd
    15 Files
  • 23
    Jan 23rd
    17 Files
  • 24
    Jan 24th
    35 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close