exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files

dope_expl.c
Posted Apr 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

dopewars 1.4.4 exploit, it's been fixed now ( thanks to my patch :-) ). It dates back to oktober 1999. But i used some cool methods in it.

SHA-256 | f7b77db072d1405a450204a66ded9b44f5d8fe5c91b142d9376c984870b4f68f

Related Files

Ubuntu Security Notice USN-2306-3
Posted Sep 8, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2306-3 - USN-2306-1 fixed vulnerabilities in the GNU C Library. On Ubuntu 10.04 LTS, the fix for CVE-2013-4357 introduced a memory leak in getaddrinfo. This update fixes the problem. Maksymilian Arciemowicz discovered that the GNU C Library incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 10.04 LTS. It was discovered that the GNU C Library incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu 12.04 LTS. Stephane Chazelas discovered that the GNU C Library incorrectly handled locale environment variables. An attacker could use this issue to possibly bypass certain restrictions such as the ForceCommand restrictions in OpenSSH. David Reid, Glyph Lefkowitz, and Alex Gaynor discovered that the GNU C Library incorrectly handled posix_spawn_file_actions_addopen() path arguments. An attacker could use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, vulnerability, memory leak
systems | linux, osx, ubuntu
advisories | CVE-2013-4357, CVE-2013-4458, CVE-2014-0475, CVE-2014-4043
SHA-256 | f2603aa7d9226b9f4831dcb8df5250b85e04ad8455ad6664e7dbbc9ad9a8c435
Oracle WebCenter Content CheckOutAndOpen.dll ActiveX Remote Code Execution
Posted Jun 2, 2013
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit modules exploits a vulnerability found in the Oracle WebCenter Content CheckOutAndOpenControl ActiveX. This vulnerability exists in openWebdav(), where user controlled input is used to call ShellExecuteExW(). This Metasploit module abuses the control to execute an arbitrary HTA from a remote location. This Metasploit module has been tested successfully with the CheckOutAndOpenControl ActiveX installed with Oracle WebCenter Content 11.1.1.6.0.

tags | exploit, remote, arbitrary, activex
advisories | CVE-2013-1559, OSVDB-92386
SHA-256 | b0e1c2b4d5000f5d54ab03faad81b1e6f76cdaf93878521b78deb176531d5582
RopeADope 1.1 Linux Log Cleaner
Posted Apr 30, 2012
Authored by pr1me | Site nullsecurity.net

RopeADope is a log cleaning script for Linux.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 0a538b3c9726137b26e026c1e69ab969caa3666fe2f0721b2dd11ca711fd1682
Secunia Security Advisory 36961
Posted Oct 7, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Doug Prostko has reported a vulnerability in Dopewars, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | cb82fac4e03f9f4fcf17d4f8ff3e07cc90843c802fbc9d6665eb3514be794def
Dopewars 1.5.12 Denial Of Service
Posted Oct 6, 2009
Authored by dougtko

Dopewars version 1.5.12 is susceptible to a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | aab85c14b9d4e987d213433c3c431ba26abe2139f6eadf90354976381447703f
Secunia Security Advisory 18246
Posted Jan 3, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Dopewars, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 2a7e309edead582f35aab5f2e2459295ff742f8f9135b472c3e62bfe784b8894
pimp12.zip
Posted Aug 26, 2002

[PIMP] #12: Programing the : Nokia 2120 Series, : Hack the PDT 3140, : Optoelectronic : Eavesdropping, and : more.. : www.dope.org/pimp

tags | bbs
SHA-256 | e14f71ba4038a1c508f2409699ea454c4c230b8060c98ae539dc978fd766b371
2dopewars_exploits.txt
Posted Jun 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Dopewars 1.47-current has two local security holes. Dopewars is SGID games. Remote buffer overflows also exist.

tags | exploit, remote, overflow, local
SHA-256 | 0f42ff1b37e66d07b86bb87e247d94963fa74c6ecd4315816a593792519e5108
dopewarez.c
Posted Oct 25, 1999
Authored by nuuB

Remote exploit for dopewars-1.4.4. Exploit works for servers as well as clients. Produces a shell.

tags | exploit, remote, shell
SHA-256 | 6ba59e6009b05be123b6af5928e78b018f173818061ec3c4bfedafabca9b0987
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close