exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files

Simple Web Server 2.2-rc2 Code Execution
Posted Aug 29, 2012
Authored by Dhruval

Simple Web Server version 2.2-rc2 remote code execution exploit with egghunting and ASLR bypass.

tags | exploit, remote, web, code execution
MD5 | 8361ddc7efb40cc50927786cf8abf91b

Related Files

Serv-U FTP Server 15.1.7 Cross Site Scripting
Posted Dec 17, 2019
Authored by Cyb0r9

Serv-U FTP Server version 15.1.7 suffers from a persistent cross site scripting vulnerability leveraging the Email parameter.

tags | exploit, xss
advisories | CVE-2019-19829
MD5 | 514d8ebc96f062a481bd19ea5e4b5040
Intrasrv 1.0 Buffer Overflow
Posted Aug 14, 2013
Authored by xis_one | Site metasploit.com

This Metasploit module exploits a boundary condition error in Intrasrv Simple Web Server 1.0. The web interface does not validate the boundaries of an HTTP request string prior to copying the data to an insufficiently large buffer. Successful exploitation leads to arbitrary remote code execution in the context of the application.

tags | exploit, remote, web, arbitrary, code execution
advisories | OSVDB-94097
MD5 | da075e4e6bcae38ea0d3d84857e63162
Intrasrv Simple Web Server 1.0 Code Execution
Posted May 30, 2013
Authored by xis_one

Intrasrv Simple Web Server version 1.0 SEH based remote code execution exploit.

tags | exploit, remote, web, code execution
MD5 | 31b991d92947bef68ace5984045918d6
Simple Webserver 2.3-rc1 Directory Traversal
Posted Jan 3, 2013
Authored by CwG GeNiuS

PM Software Simple Webserver version 2.3-rc1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 9c432474b08cac723196ef1965249cec
Simple Web Server Connection Header Buffer Overflow
Posted Jul 23, 2012
Authored by mr.pr0n, juan | Site metasploit.com

This Metasploit module exploits a vulnerability in Simple Web Server 2.2 rc2. A remote user can send a long string data in the Connection Header to cause an overflow on the stack when function vsprintf() is used, and gain arbitrary code execution. The module has been tested successfully on Windows 7 SP1 and Windows XP SP3.

tags | exploit, remote, web, overflow, arbitrary, code execution
systems | windows, xp, 7
MD5 | d8d2ec005f962860b2da889da4d291c1
SimpleWebServer 2.2-rc2 Remote Buffer Overflow
Posted Jul 19, 2012
Authored by mr.pr0n

SimpleWebServer version 2.2-rc2 remote buffer overflow exploit that achieves code execution.

tags | exploit, remote, overflow, code execution
MD5 | a674d34d5ee58a37ae4c282e8c852ebb
School Website Solutions Cross Site Scripting
Posted Apr 23, 2012

School Website Solutions suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 4939643ea105a553027778cb855f260d
Simple Web Server 2.1 Denial Of Service
Posted Aug 3, 2010
Authored by ipax | Site dclabs.com.br

Simple Web Server version 2.1 suffers from a remote denial of service vulnerability.

tags | exploit, remote, web, denial of service
MD5 | 80923234eb69e81d704c8c3a0da74edd
ernwSA012005.txt
Posted May 29, 2005
Authored by Michael Thumann

A buffer overflow exists in PMSoftware's Simple Web Server version 1.0.

tags | advisory, web, overflow
MD5 | a65472e2e830a623659134e3d0c0655a
Secunia Security Advisory 15000
Posted May 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Thumann has reported a vulnerability in PMSoftware Simple Web Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, web
MD5 | faf69048ed041eb5f8bf5e53762dee15
WebServerFP-Source.zip
Posted May 23, 2003
Authored by Ante Kotarac

A simple web server fingerprinting tool that has a large database of fingerprints. The author welcomes all user feedback for improvements.

tags | tool, web
systems | unix
MD5 | 17060a90c6380ab0b7d84a7017f0f6f5
sws_web_killer.c
Posted Sep 2, 2002
Authored by SaMaN

Proof of Concept Exploit for SWS Web Server v0.1.0. The SWS web server will re-spawn its process every time it receives a string without a linebreak. Tested on: Slackware 8.1 and Redhat 7.0.

tags | exploit, web, proof of concept
systems | linux, redhat, slackware
MD5 | b4f2224f7060b64ce3e013d5f258a859
sws.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | 85e29bedd11f0e9567a1ff0f1ea68376
swstack.txt
Posted May 31, 2000
Authored by Sectorx | Site xorteam.cjb.net

Simple Web Server 0.5.1 stack overflow advisory. Allows eip to be overwritten.

tags | exploit, web, overflow
MD5 | a67c189a2cdb64f9d3132fdcf0e8bd65
Page 1 of 1
Back1Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close