what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

eIQ-LM-3.txt
Posted Jul 28, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.

tags | exploit, remote, overflow
advisories | CVE-2006-3838
SHA-256 | 2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984

Related Files

sas.txt
Posted Aug 27, 2006
Authored by houseofdabus

MS04011 Lsasrv.dll RPC buffer overflow remote exploit version 0.1. Untested.

tags | exploit, remote, overflow
SHA-256 | 7d6457eada7d956609ced1edae13ed6602702803d0e989601405109add713f5c
eIQ-ESA.txt
Posted Jul 28, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit for the Syslog server by eIQnetworks that has a vulnerability when processing long strings transmitted to its TCP port.

tags | exploit, remote, tcp
advisories | CVE-2006-3838
SHA-256 | 60bffcf1a26deeb9ebda5eb75a657c002ee82720c1ef7a36d68131a01a17d94d
trionPWN.pl.txt
Posted Jul 28, 2006
Authored by c0rrupt

Triton version 1.0.4 remote exploit for the sipxtapi vulnerability.

tags | exploit, remote
SHA-256 | f93b23609f2b1ea7d2fa0921eaab18bffbff4d1f638e4c6b7dad4792aca8f31a
Zero Day Initiative Advisory 06-024
Posted Jul 26, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability exists in the IQnetworks Enterprise Security Analyzer. The specific flaw exists within EnterpriseSecurityAnalyzer.exe, which binds by default to TCP port 10616. During the processing of long arguments to the LICMGR_ADDLICENSE command a stack based buffer overflow occurs.

tags | advisory, overflow, tcp
advisories | CVE-2006-3838
SHA-256 | 62dba3a26852eedc18c6ce2aca71f4563fcba6abc5407d832c1d9a918fee9f91
bl4ck_ms06_036.tgz
Posted Jul 24, 2006
Authored by redsand | Site blacksecurity.org

Functioning remote exploit for the Windows DHCP Client broadcast attack vulnerability as described in MS06-036.

tags | exploit, remote
systems | windows
SHA-256 | 5e033b168105689986e7b2df247c78c44f22d6ec22b3b955cc3445ba86a8d6aa
GUESTEX-exec.pl.txt
Posted Jun 12, 2006
Authored by K-sPecial

Remote exploit for an old flaw in GUESTEX 1.0 guestbook that allows for remote code execution.

tags | exploit, remote, code execution
SHA-256 | bb3e843dbd7e85e94f043786965ba4cf0fd2d1035be98b3b2b98554289d95f2a
unb_161p1_incl_xpl.txt
Posted May 21, 2006
Authored by rgod | Site retrogod.altervista.org

Remote exploit for an arbitrary file inclusion flaw in Unclassified NewsBoard versions 1.6.1 and below.

tags | exploit, remote, arbitrary, file inclusion
SHA-256 | 0abf7924e12ca0c4cf02b57e277252115334faa389dec0a3d0df88dd9c22be0c
nodez_4611_xpl.html
Posted Apr 1, 2006
Authored by rgod | Site retrogod.altervista.org

Nodez version 4.6.1.1 Mercury remote exploit that makes use of arbitrary inclusion and authentication bypass flaws.

tags | exploit, remote, arbitrary
SHA-256 | 5d6166ec9ae5d6d089413a57324580495715cccb2a8ff7f5c31f86e7b0497552
argoOverflow.txt
Posted Feb 26, 2006
Authored by Jerome Athias

Remote exploit for ArGoSoft FTP server versions 1.4.3.5 and below that makes use of a remote heap overflow in the DELE command.

tags | exploit, remote, overflow
SHA-256 | 7254d5e1a22aa5a9bedc2e13bb70cc4b7c74c92e5c1eac37b5611a7eb4360abd
dlink_udp_dos.txt
Posted Feb 13, 2006
Authored by Aaron Portnoy | Site thunkers.net

D-Link fragmented UDP denial of service remote exploit that makes use of a design error flaw.

tags | exploit, remote, denial of service, udp
SHA-256 | 7eaaf634f7193ebbda5c1b77c8b1aae055a9904f48c80350134ddaead13b52fa
expl5.txt
Posted Feb 4, 2006
Authored by Securma Massine | Site morx.org

Remote exploit for eXchangepop3 that makes use of a buffer overflow attack.

tags | exploit, remote, overflow
SHA-256 | fdc180d92a58df7519a77e8c23a67af73ce3279b446f4560f4e15d95204a3c26
DSR-farmerswife44sp1.pl.txt
Posted Jan 15, 2006
Authored by Knud Erik Hojgaard

Farmers WIFE version 4.4 sp1 ftpd remote exploit that allows for system compromise.

tags | exploit, remote
SHA-256 | 890997b51723f28c17e0b21e78bc7cc7e3e5fb4620c3ebe70555565e6bffafc1
MS05-053.c
Posted Dec 14, 2005
Authored by Winny Thomas

Microsoft Windows Metafile (WMF) remote exploit which takes advantage of the bug known as ms05-053. This program creates a special .wmf file which crashes IE by overflowing the "mtNoObjects" header.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 8a69e2857d794a4dbba1f6eb8fe50a28af6da1e116e413522bef8d7a68279195
sobexsrv.pl.txt
Posted Dec 7, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Remote exploit that makes use of a format string vulnerability in sobexsrv.

tags | exploit, remote
SHA-256 | 70af8edf82d16d5c0a15f619b7c245147a561588641160e58d5d55fedecb6bb3
20051021.MS05-047.c
Posted Nov 4, 2005

Remote exploit that makes use of a buffer length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList (services.exe - ms05-047).

tags | exploit, remote
advisories | CVE-2005-2120
SHA-256 | 345a0d8ab4a6509f06d6a75f4f2eae744f2bf4df914b5e46c61fd00ce658368c
ms05039.c
Posted Aug 12, 2005

Microsoft Windows 2000 Plug and Play universal remote exploit for the flaw discussed in MS05-039.

tags | exploit, remote
systems | windows
advisories | CVE-2005-1983
SHA-256 | 781399405050c0988fddc2a8b8e492927b774aa17316460c4c494ff7b5f37391
goodtech.c
Posted Mar 22, 2005
Authored by cybertronic

Remote exploit for GoodTech Telnet server versions below 5.0.7. This exploit can spawn a bindshell or launch a reverse shell.

tags | exploit, remote, shell
SHA-256 | 589775b96701523a09ebbc413fcde21a03c4bcb8b334a15046465788ed9e1f10
awstats_shell.c
Posted Mar 3, 2005
Authored by omin0us | Site dtors.ath.cx

Awstats remote exploit that allows for remote command execution on the host with privileges of the httpd process. Versions 5.7 through 6.2 are affected.

tags | exploit, remote
SHA-256 | e0d6aacf97481633bcc02f886a5337792a2211c0e98331682b0c4276982738ae
webconnect.pl
Posted Feb 26, 2005
Authored by KarakOrsan

WebConnect remote exploit that makes use of a directory traversal vulnerability in versions 6.4.4 and 6.5.

tags | exploit, remote
SHA-256 | 2d547bdd62b6ceb8e18c55857e4b388aefd9f219e6a9f3609806e27395367f24
bontagobof.zip
Posted Feb 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Bontago versions 1.1 and below remote exploit that makes use of a buffer overflow when a nickname longer than 512 bytes is sent.

tags | exploit, remote, overflow
SHA-256 | 3de0fc3cba9cb28bfb5fc6dd46c632438e39b87cdce96b3746fd833a07415d82
silePNUKExpl_v7.4.c
Posted Feb 25, 2005
Authored by Silentium | Site autistici.org

phpNUKE version 7.4 remote exploit that adds an administrative user.

tags | exploit, remote
SHA-256 | 86151974f860e2902a16b8cb3ca111c827b9c3fed0f5bf33e2ab3c7274a2abad
3csploit.c
Posted Feb 22, 2005
Authored by mandragore

3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.

tags | exploit, remote, shell
SHA-256 | b5968e526f536105d0b7f4dd141a4dd4e87ff1181b770a5035d8b3578d83f457
php-nuke.7.4.c
Posted Feb 18, 2005
Authored by Silentium | Site autistici.org

PHP-Nuke v7.4 remote exploit which allows you to create new admin with relative passwd that you specify on the command line. Allows you to take administrative control of the webPortal. See here for more information.

tags | exploit, remote, php
SHA-256 | d4519b08516e4a2b394f9870d72fa7a2e76009da122c00757f5e8ba8dabc2814
20050209.MS05009.windows.c
Posted Feb 18, 2005
Authored by ATmaCA | Site atmacasoft.com

MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Windows. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.

tags | exploit, remote, overflow
systems | windows
SHA-256 | c30c3511146addce1842ff9014814c1afd908e35efb8b7c35a338901c14f83a3
20050209.MS05009.c
Posted Feb 18, 2005
Authored by ATmaCA | Site atmacasoft.com

MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Linux. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.

tags | exploit, remote, overflow
systems | linux, windows
SHA-256 | 7f4fd2c135fdf617b1189c77097199a161a47f41e34cbc4b66d71870dd2a774f
Page 2 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    14 Files
  • 7
    Dec 7th
    24 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close