exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 118 of 118 RSS Feed

Files from Jeremy Brown

Real NameJeremy Brown
Email addressprivate
Websitewww.patchtuesday.org
First Active2008-07-15
Last Active2022-09-05
View User Profile
silvershield-dos.txt
Posted Oct 23, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

SilverSHielD version 1.0.2.34 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | adffdb22b15610a653c02cf1010761aa42db8495512e93f297e063bfb7d1a17d
fsshatter2.txt
Posted Oct 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

FreeSSH version 1.2.1 denial of service exploit. Crash #2.

tags | exploit, denial of service
SHA-256 | 99bda96067e5b98d234446f0a8b67867b6ba03dc493753b12b97cf8aa297df43
fsshatter.txt
Posted Oct 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

FreeSSH version 1.2.1 denial of service exploit.

tags | exploit, denial of service
SHA-256 | d1d23d04a0d96b9bd50bbd0dfc343290a639f6d1a1d82ba7ed4de3104673a0a2
mySQLFUZZer.tar.gz
Posted Oct 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Quick little MySQL fuzzing utility that creates sockets and fuzzers on the fly.

tags | fuzzer
SHA-256 | 15405e4927cb4b5b834139904c6fa76a7c7a2d33cfddb4d8878f3376b025779e
fuzzing-auatfb.pdf
Posted Oct 21, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Fuzzing: A Useful Approach to Finding Bugs.

tags | paper
SHA-256 | 9c907cb0d0124b9ee8e6d11b1d8c18b22f0c23181a1bd6ffb8ffffe1f6c43c74
mozff_sunjava_dos.txt
Posted Oct 16, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Solaris 10 + Sun's Java Desktop System 3 Mozilla/Firefox browser denial of service html exploit.

tags | exploit, java, denial of service
systems | solaris
SHA-256 | 9afdc66f916123b3ddefaad1d63ac97ed6a883f46578f8ca47dc532e4e300242
konqueror-crash.txt
Posted Oct 9, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

KDE's Konqueror version 3.5.9 suffers from multiple crash vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 0b446a6080430b58e199d69c16b1c85c7de0768a1c844e80c705b20d1b570ea5
zfz20BETA.tar.gz
Posted Oct 1, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

ZfZ stands for Zeroday fuZzer. ZfZ is a network fuzzer that supports many protocols and can do generic fuzzing as well. It is trivial to add protocols to fuzz, just copy and modify the protocols already implemented.

tags | protocol, fuzzer
SHA-256 | ac192433c3e5acdbbe6c3311cba765940f354fc8bbb6a90f2e29f34e2b6cae95
domainraider.tar.gz
Posted Sep 27, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Domain Raider is a brute forcing utility to find a target's sub-domains.

tags | cracker
SHA-256 | f5796f130056d86cedf30f8f27ae002ad298b2b58a2180df1cde76d30ea114b2
fhttpd-dos.txt
Posted Sep 19, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

fhttpd version 0.4.2 un64() remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | d09bcd8e1769b38b778c16e14702a86664a723794d9ae55f53d822929025a0ec
ciscOWN2.txt
Posted Sep 17, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Cisco router HTTP administration cross site request forgery remote command execution universal exploit (2 of 2).

tags | exploit, remote, web, csrf
systems | cisco
SHA-256 | c50fb5576ca7bc2532133110c5ae07ff396cbcea3b4568ee544d3c7a8cbb5d40
ciscOWN1.txt
Posted Sep 17, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Cisco router HTTP administration cross site request forgery remote command execution universal exploit (1 of 2).

tags | exploit, remote, web, csrf
systems | cisco
SHA-256 | 9609bd09bf2c8115edd9396260d2c90cfab3b56601c43e31af6d393b2b510b7e
poker-multiple-useremu.txt
Posted Sep 12, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Absolute Poker suffers from a remote user enumeration vulnerability.

tags | exploit, remote
SHA-256 | 034af54b9dac02c196dcacca9302d0e450bd616d28cfa4559abf4e15753d65a0
adobe9-dos.txt
Posted Sep 11, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Adobe Acrobat 9 Active-X remote denial of service exploit.

tags | exploit, remote, denial of service, activex
SHA-256 | 29206898c3ad3c1835b2c4a69f7bf0bf07b1702196dc7b9710141b2e40b9c419
ptreexxec.txt
Posted Sep 10, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Peachtree Accounting 2004 suffers from an insecure method vulnerability in the PAWWeb11.ocx Active-X control.

tags | exploit, activex, xxe
SHA-256 | 7e082cb89cac4c2ffab9a838718cc17a6083bd64feec2c06e57146600c2fb86c
netbeware.txt
Posted Aug 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

The remote manager in Novell Netware version 6.5 suffers from an HTML injection vulnerability.

tags | exploit, remote
SHA-256 | d55104ed15bb268ae818564d5a27a9f645fab016c404a789b83dd37ee602b8f7
wms-overflow.txt
Posted Aug 22, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Windows Media Services (nskey.dll) on Windows 2000 Server, Advanced Server, and Datacenter Edition all suffer from a stack overflow vulnerability. Using an Active-X control that is safe for scripting/initialize, passing at least 9752 bytes to CallHTMLHelp will overwrite the EIP and remote code execution may be possible.

tags | exploit, remote, overflow, code execution, activex
systems | windows
SHA-256 | 7dd68791afc2235b0b12444e2fd32dbc8395c768e03a777ceda41ac3bed58fe0
ymsg81-dos.txt
Posted Jul 15, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Yahoo! Messenger version 8.1 ActiveX remote denial of service exploit.

tags | exploit, remote, denial of service, activex
SHA-256 | b86529c5c94705d2fa1eb098389b8c296df0db1270649c873ef34d3cbd30931c
Page 5 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close