exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 84 of 84 RSS Feed

Files Date: 2009-11-18 to 2009-11-19

XM Easy Personal FTP Server 5.8.0 APPE / DELE Denial Of Service
Posted Nov 18, 2009
Authored by zhangmc

XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit that makes use of APPE and DELE.

tags | exploit, remote, denial of service
SHA-256 | 92bddfff3321a2348f936f14081552ac3b85b3594271dd1ad057eba37550e2ad
Linux unix_stream_connect() Denial Of Service
Posted Nov 18, 2009
Authored by Tomoki Sekiyama

Proof of concept code that demonstrates the denial of service vulnerability in the Linux kernel unix_stream_connect() function.

tags | exploit, denial of service, kernel, proof of concept
systems | linux
SHA-256 | b2346c5121005fe334d9fce476edda6043810b304af209d2dad200c7d1b7764a
Thunderbird / Seamonkey Denial Of Service
Posted Nov 18, 2009
Authored by Marcin Ressel

Mozilla Thunderbird version 2.0.0.23 and Seamonkey version 2.0 suffer from a null pointer dereference denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 9818409ac58b963655daac1ce56a25d83dee37dd7cbc574fc25f1b897f1935d2
JBS 2.0 Administrative Bypass / File Upload
Posted Nov 18, 2009
Authored by blackenedsecurity | Site blackenedsecurity.blogcu.com

JBS version 2.0 and JBSX suffer from administrative bypass and malicious file upload vulnerabilities.

tags | exploit, vulnerability, file upload
SHA-256 | 092c59d7727c807680a4bc50474f4a7561f0383f9205a01df20ff8dca747c3ac
Microsoft Windows EOT Font Table Directory Integer Overflow
Posted Nov 18, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits an integer overflow flaw in the Microsoft Windows Embedded OpenType font parsing code located in win32k.sys. Since the kernel itself parses embedded web fonts, it is possible to trigger a BSoD from a normal web page when viewed with Internet Explorer.

tags | exploit, web, overflow, kernel
systems | windows
advisories | CVE-2009-2514
SHA-256 | ff7cac37f0fc0381971b0be66dfede47d6023d4693a45fab58f977f64831e3b8
Microsoft Excel Memory Corruption
Posted Nov 18, 2009
Authored by Nicolas Joly | Site vupen.com

Microsoft Office Excel suffers from various heap overflow and memory corruption vulnerabilities.

tags | advisory, overflow, vulnerability
advisories | CVE-2009-3130, CVE-2009-3131, CVE-2009-3132, CVE-2009-3133
SHA-256 | 274806e33d6ff76c0300184727853d711f01ac8661624226967d7b8aa075e277
Gimp BMP Image Parsing Integer Overflow
Posted Nov 18, 2009
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in Gimp, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused by an integer overflow error within the "ReadImage()" function in plug-ins/file-bmp/bmp-read.c. This can be exploited to cause a heap-based buffer overflow by e.g. tricking a user into opening a specially crafted BMP file. Version 2.6.7 is affected.

tags | advisory, overflow
advisories | CVE-2009-1570
SHA-256 | 85f0dc9e18157639fcbd9378b0285371a6aa9be92f500f354cfb55b30a5693ba
Windows XP Pro SP2 English Message-Box Shellcode
Posted Nov 18, 2009
Authored by Aodrulez

16 bytes small Message-Box shellcode for Windows XP Pro SP2 English.

tags | shellcode
systems | windows
SHA-256 | f046a00167a3d5df6fafed0240e15d80066760352ef619dfb8420328a41f0d07
Novell eDirectory 8.8 SP5 Denial Of Service
Posted Nov 18, 2009
Site hackattack.com

Novell eDirectory version 8.8 SP5 for Windows suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | b68a24d0d40fc09e83fd2fae8a79e0ef3561167e69aed97335098d210f59e9d4
Page 4 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close