what you don't know can hurt you
Showing 1 - 9 of 9 RSS Feed

Files

MiniShare 1.4.1 CONNECT Remote Buffer Overflow
Posted Oct 11, 2019
Authored by Striker

MiniShare version 1.4.1 CONNECT remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | 464c128d19d3bc0920c09a679653418b

Related Files

MiniShare 1.4.1 HEAD / POST Buffer Overflow
Posted Dec 7, 2018
Authored by Rafael Pedrero

MiniShare version 1.4.1 suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
advisories | CVE-2004-2271, CVE-2018-19861, CVE-2018-19862
MD5 | 597a47d5ba041592c6980bf8d2f57017
Minishare 1.5.5 Buffer Overflow
Posted Nov 4, 2010
Authored by Muhamad Fadzil Ramli

Minishare version 1.5.5 buffer overflow exploit using SEH.

tags | exploit, overflow
MD5 | 7d8819ec4e86a2cb29911d7daf7765dc
Minishare 1.5.5 Buffer Overflow
Posted Nov 3, 2010
Authored by Chris Gabriel

Minishare versions 1.4.0 through 1.5.5 buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | b0636d4f7d4ae2c5a4d2567aa6d72c89
Minishare 1.4.1 Buffer Overflow
Posted Nov 26, 2009
Authored by acaro | Site metasploit.com

This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This Metasploit module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable.

tags | exploit, web, overflow
advisories | CVE-2004-2271
MD5 | 0a585e008afc05253dafa670d80fa4b2
MiniShare HTTP Server 1.5.5 Buffer Overflow
Posted Oct 20, 2009
Authored by iM4n

MiniShare HTTP server version 1.5.5 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, web, overflow, shell
MD5 | 246d187aa67e0473fd80dcc4c4d75347
minish.txt
Posted Apr 17, 2007
Authored by device | Site geekmind.altervista.org

MiniShare version 1.5.4 remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 5887f380edac1598a278dc82fe405f21
Secunia Security Advisory 24898
Posted Apr 16, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - device has reported a vulnerability in MiniShare, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | d7fc18cd732548ce29dfe3d1f4a89f60
101_mini.cpp
Posted Nov 10, 2004
Authored by class101

Minishare versions 1.4.1 and below remote buffer overflow exploit that binds a shell to port 101.

tags | exploit, remote, overflow, shell
MD5 | 470aaf255d5cecbac310c94088f9fe4f
minishare132.txt
Posted May 28, 2004
Authored by Donato Ferrante | Site autistici.org

MiniShare HTTP server version 1.3.2 is susceptible to a denial of service attack due to mismanagement of requests. If a HEAD or GET request is sent with only one line following it, the server will crash.

tags | advisory, web, denial of service
MD5 | b9408a34ff51863488b63616ccf25e42
Page 1 of 1
Back1Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close