exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 82 RSS Feed

Files from Dr_IDE

Email addressdr_ide at hushmail.com
First Active2009-07-24
Last Active2013-09-19
VLC Media Player 1.0.6 Crash Proof Of Concept
Posted May 28, 2010
Authored by Dr_IDE

VLC Media Player versions 1.0.6 and below malformed media file crash proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 13eb800a5cff5f157625c8d40d9606d5cda09def8324cf78fe127877e1d9a087
Open And Compact FTP Server 1.2 Denial Of Service
Posted May 26, 2010
Authored by Dr_IDE

Open and Compact FTP Server version 1.2 universal pre-auth denial of service exploit.

tags | exploit, denial of service
SHA-256 | 684440a1375687cbbed6a34317a123196df83653b157c3498e09d81c91f2b0de
Zervit Web Server 0.4 Directory Traversal
Posted May 14, 2010
Authored by Dr_IDE

Zervit Web Server version 0.4 suffers from directory traversal vulnerabilities.

tags | exploit, web, vulnerability, file inclusion
SHA-256 | 412f5bd324eda0957fd5a0e89ee6bacf545e251ff2eace1b61f5f221fde95db0
Zervit Web Server 0.4 Source Disclosure
Posted May 14, 2010
Authored by Dr_IDE

Zervit Web Server version 0.4 suffers from a source disclosure vulnerability.

tags | exploit, web, info disclosure
SHA-256 | 6c805cb1027e40126e41e44719826c6fd8ba45f40b1b10441a9ae7155c02d7d2
Miniwebsvr 0.0.10 Directory Traversal
Posted May 14, 2010
Authored by Dr_IDE

Miniwebsvr version 0.0.10 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 052a9e83d6d12c884693267a9e95733ea1c72e8fcbe5a5c85ef306156d415d62
PointDev IDEAL Migration Buffer Overflow
Posted May 12, 2010
Authored by Dr_IDE, jduck, dookie | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions v9.7 through v10.5 of IDEAL Administration and versions 4.5 and 4.51 of IDEAL Migration. All versions are suspected to be vulnerable. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code. NOTE: IDEAL Administration 10.5 is compiled with /SafeSEH

tags | exploit, overflow, arbitrary
advisories | CVE-2009-4265
SHA-256 | d487bf3a03cfdebd126e3b50fa65fc5bba22a39f6bc020af9d9f9429f2ff2e0c
Various Browsers Denial Of Service
Posted May 3, 2010
Authored by Dr_IDE

This archive has forkbomb and unicode denial of service exploits for Firefox, Safari and various other browsers.

tags | exploit, denial of service
SHA-256 | d9ed2cfda73d2c61b805add17e330491e74f3e95546a9bbe9df37bcf7e566cae
Safari 4.0.5 Webkit Stack Exhaustion Denial Of Service
Posted Apr 28, 2010
Authored by Dr_IDE

Safari version 4.0.5 Webkit blink tag stack exhaustion denial of service exploit.

tags | exploit, denial of service
SHA-256 | 3e012fa8c43470acb5ff285669c7a6cf64e74cc2ede2ed3538ac37fd50de1cef
IDEAL Migration 2009 4.5.1 Buffer Overflow
Posted Apr 27, 2010
Authored by Dr_IDE

IDEAL Migration 2009 version 4.5.1 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 3ad16b9660a81f545aa5212271ce5fafa81cf35afd9115c760c9d37598259ab4
IDEAL Administration 2010 10.2 Buffer Overflow
Posted Apr 27, 2010
Authored by Dr_IDE

IDEAL Administration 2010 version 10.2 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | c7613355ca5b9ab05ba984dd8f0f7e2ca0f6b6b8242c04dcf00805175b4c0521
Acritum Femitter 1.03 Directory Traversal
Posted Apr 20, 2010
Authored by Dr_IDE

Acritum Femitter version 1.03 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | cb8dab774dbd16f5f21e1e46e39fcc8cdcd435b629137c0a322feb43385199b1
Mongoose 2.8 Directory Traversal
Posted Apr 20, 2010
Authored by Dr_IDE

Mongoose web server version 2.8 suffers from directory traversal vulnerabilities.

tags | exploit, web, vulnerability, file inclusion
SHA-256 | c06c9b8a1ab7b64e816927760a9223bd4869afbcc92a31ce1a6fbea862d0a4db
MultiThreaded HTTP Server 1.1 Source Disclosure
Posted Apr 20, 2010
Authored by Dr_IDE

MultiThreaded HTTP Server version 1.1 suffers from a remote source disclosure vulnerability.

tags | exploit, remote, web, info disclosure
SHA-256 | 987bf6b3565122edfa3d483af245ea664523df3e3e0ad0363fc9b0178c19cb29
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by Dr_IDE, Francis Provencher, jduck, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.

tags | exploit, overflow
advisories | CVE-2009-3837
SHA-256 | 03aa5d1fb353fd0b0a186d111853941e220644c617f4997fc853286c33067088
IDEAL Administration 2009 Buffer Overflow
Posted Dec 31, 2009
Authored by Dr_IDE, dookie | Site metasploit.com

This Metasploit module exploits a stack overflow in IDEAL Administration v9.7. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 671e32b58eafc179c66a2c75065bd9266308aadcc36d69ae7c4a2f035130544f
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 10, 2009
Authored by Dr_IDE, Francis Provencher, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message.

tags | exploit, overflow
SHA-256 | 215303af9fa1743f8f050624ab0a364dc6fdc4218fbee1b68806a9c6c18c6bd6
VLC Media Player 1.0.3 smb:// Stack Overflow
Posted Dec 7, 2009
Authored by Dr_IDE

Proof of concept exploit for the VLC Media Player version 1.0.3 smb:// URI handling stack overflow vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | 767d6f43bcd9f36c30425b5d2d15526afe7544a53c9dce0e06e4c05f44f0ea28
IDEAL Administration 2009 9.7 Local Buffer Overflow
Posted Dec 7, 2009
Authored by Dr_IDE

Local buffer overflow exploit for IDEAL Administration 2009 version 9.7 that creates a malicious .ipj file that binds a shell to port 4444.

tags | exploit, overflow, shell, local
SHA-256 | 9f5c5dcba2f81bff55ee61949db3938b13ef630dc6841b4c30fc4c4acb7ae863
BigAnt Server 2.50 SP1 Buffer Overflow
Posted Nov 26, 2009
Authored by Dr_IDE | Site metasploit.com

This exploits a stack overflow in the BigAnt Messaging Service, part of the BigAnt Server product suite. This Metasploit module was tested successfully against version 2.50 SP1.

tags | exploit, overflow
SHA-256 | a6efaa655fbca2207d1e6a66a1c5c9d6fb68fe09f3765724c03c9f340169fcf3
Cherokee 0.5.4 Directory Traversal
Posted Oct 28, 2009
Authored by Dr_IDE

Cherokee versions 0.5.4 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | e98d286121b0854950d5c8ad20255bbe19675d7c7fec7efd3126c5b4d9d701fe
Boloto Media Player 1.0.0.9 Crash
Posted Oct 27, 2009
Authored by Dr_IDE

Boloto Media Player version 1.0.0.9 local crash proof of concept exploit that creates a malicious .pls file.

tags | exploit, denial of service, local, proof of concept
SHA-256 | 6a901ac053ed7ae3865f920867a1003d0f4fc947a6b68e9f1e75e6868ce4b8e1
xp-AntiSpy 3.9.7-4 Local Buffer Overflow
Posted Oct 26, 2009
Authored by Dr_IDE

xp-AntiSpy versions 3.9.7-4 and below local buffer overflow exploit that creates a malicious .xpas file.

tags | exploit, overflow, local
SHA-256 | fb7c0d38c62756cc07427f4f9cc68a113bb21c52a93dcd03c74d4ea5f5190bc2
GNU Privacy Assistant Crash
Posted Oct 23, 2009
Authored by Dr_IDE

GPG4Win GNU Privacy Assistant proof of concept crash exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | f45b73a43afd05c08a9cdd42903ee4e5aeef56c90200b4f4a4cff7479f86bd21
Mongoose Web Server 2.8.0 Source Disclosure
Posted Oct 23, 2009
Authored by Dr_IDE

Mongoose Web Server versions 2.8.0 and below suffer from a remote source disclosure vulnerability.

tags | exploit, remote, web, info disclosure
SHA-256 | de42bbe8b5418e0b3955394314e14cebeac3228c3c1732eff9a9fa188d93929a
GPG2/Kleopatra 2.0.11 Malformed Certificate Crash
Posted Oct 21, 2009
Authored by Dr_IDE

GPG2/Kleopatra version 2.0.11 malformed certificate proof of concept crash exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 8fdf127e1bcf4e8fc3661e1905b9d258ed04c182e4640baf933708d72da5780a
Page 2 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close