the original cloud security
Showing 1 - 25 of 27 RSS Feed

Files

Httpdx 1.5.3 Break Services
Posted Mar 10, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Httpdx version 1.5.3 remote break services exploit.

tags | exploit, remote
MD5 | 0d68268c5eda2e07d8be262bba731a96

Related Files

httpdx 1.5.4 Heap Overflow
Posted Jul 29, 2012
Authored by st3n

httpdx versions 1.5.4 and below suffer from a heap overflow vulnerability.

tags | exploit, overflow
MD5 | adab73920feaeabefb8c4347da2d42cc
Secunia Security Advisory 41027
Posted Aug 25, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in httpdx, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users to potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | e9b5b001c6e75bc1d4c58d92b3e0a835
Httpdx 1.5.4 Denial Of Service
Posted Aug 18, 2010
Authored by Dr_IDE

Httpdx version 1.5.4 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | ac4dd81e2c95ede3f176ea2958b04f11
Httpdx 1.5.3 Remote Break Services
Posted Mar 16, 2010
Authored by Jonathan Salwan

Httpdx version 1.5.3 remote break services exploit.

tags | exploit, remote
MD5 | 5dc4a8f716291ef5f6ee472c61c54e83
httpdx 1.5.3b Pre-Auth Crash
Posted Mar 16, 2010
Authored by loneferret

httpdx version 1.5.3b remote pre-authentication denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
MD5 | cd6eaf143dd7d6978809b8f9990e2645
Secunia Security Advisory 38933
Posted Mar 15, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in httpdx, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 44f2544b51be7c281bff897143ec3e5c
httpdx 1.53b Denial Of Service
Posted Feb 23, 2010
Authored by d3b4g

httpdx version 1.53b remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 1b06f0c2b57a0b818d99812fc7be3efa
Secunia Security Advisory 38620
Posted Feb 17, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fb1h2s has discovered a vulnerability in httpdx, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | f0604d9d1f304c93062c30ff568f3a81
Httpdx 1.5 Directory Traversal
Posted Feb 15, 2010
Authored by FB1H2S

Httpdx version 1.5 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 286d0d9cf48843e28b8fb1cfbf47f187
httpdx 1.5.2 Pre-Auth Denial Of Service
Posted Feb 8, 2010
Authored by loneferret

httpdx version 1.5.2 suffers from a remote pre-authentication denial of service vulnerability.

tags | exploit, remote, denial of service
MD5 | f3f1efcd3bc3fe5bf4ab32eb1de1645e
Secunia Security Advisory 38486
Posted Feb 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in httpdx, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 7df16732f074a87c21eff05979c97627
Httpdx 1.5 Source Disclosure
Posted Jan 4, 2010
Authored by Securitylab Security Research | Site securitylab.ir

Httpdx version 1.5 suffers from a remote source disclosure. This is the same vulnerability that also affected 1.4.6b.

tags | exploit, remote, info disclosure
MD5 | 37742c6073ad173e067f1593cede0535
HTTPDX tolog() Function Format String Vulnerability
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a format string vulnerability in HTTPDX FTP server. By sending an specially crafted FTP command containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user via FTP.

tags | exploit, web, arbitrary
MD5 | 7dd7f143f9f3899006734975639cc259
HTTPDX tolog() Function Format String Vulnerability
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a format string vulnerability in HTTPDX HTTP server. By sending an specially crafted HTTP request containing format specifiers, an attacker can corrupt memory and execute arbitrary code. By default logging is off for HTTP, but enabled for the 'moderator' user via FTP.

tags | exploit, web, arbitrary
MD5 | 2ef6438aabb882fbfc39ba6f6434a25c
Secunia Security Advisory 37063
Posted Oct 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dr_IDE has discovered a vulnerability in httpdx, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | e58a91f14ad6c67e87a1e701356e566e
httpdx 1.4.6.b Source Disclosure
Posted Oct 21, 2009
Authored by Dr_IDE

httpdx versions 1.4.6b and below suffer from a remote source disclosure vulnerability.

tags | exploit, remote, info disclosure
MD5 | 57f8d5a9a7801d378ac577bb84c37d9b
HTTPDX h_handlepeer() Buffer Overflow
Posted Oct 16, 2009
Authored by Trancer, Pankaj Kohli | Site rec-sec.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The vulnerability is caused due to a boundary error within the "h_handlepeer()" function in http.cpp. By sending an overly long HTTP request, an attacker can overrun a buffer and execute arbitrary code.

tags | exploit, web, overflow, arbitrary
MD5 | 8f618cb9fb2dae93b8a74aa7b8a6060c
Secunia Security Advisory 37013
Posted Oct 14, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dr_IDE has discovered a vulnerability in httpdx, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | e48578c10343bfb83f7c082440b38729
httpdx 1.4.4 Source Disclosure
Posted Oct 12, 2009
Authored by Dr_IDE

httpdx versions 1.4.4 and below suffer from a remote source disclosure vulnerability.

tags | exploit, remote, info disclosure
MD5 | 385ccfa570f00b7c9bf73ea59f9a9d9a
Secunia Security Advisory 36991
Posted Oct 12, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pankaj Kohli has discovered a vulnerability in httpdx, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 56582df747a84180ee3a96075cebf635
httpdx 1.4 Buffer Overflow Exploit
Posted Oct 8, 2009
Authored by Pankaj Kohli | Site pank4j.com

httpdx web server version 1.4 if vulnerable to a remote buffer overflow vulnerable when supplied a long GET request. Exploit is written for httpdx 1.4 on Windows XP SP3 and binds a shell to port 58821.

tags | exploit, remote, web, overflow, shell
systems | windows, xp
MD5 | 00b412c87dc078e5022add43ffd4f5c3
Secunia Security Advisory 36734
Posted Sep 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in httpdx Web Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, web
MD5 | 6ebea7279a12137a60462e9532a4ce6c
httpdx 1.4 Format String Denial Of Service
Posted Sep 15, 2009
Authored by Pankaj Kohli | Site pank4j.com

httpdx web server version 1.4 Host Header remote format string denial of service exploit.

tags | exploit, remote, web, denial of service
MD5 | f8f83a01e45971922fe5d9344ca7887b
httpdx 0.8 FTP Server Delete/Get/Create
Posted Jun 8, 2009
Authored by Jonathan Salwan | Site shell-storm.org

httpdx FTP server versions 0.8 and below suffer from remote arbitrary manipulation of directories and files.

tags | exploit, remote, arbitrary
MD5 | 9e287d6a68c361ef0d15a2ec85d010d7
httpdx 0.5b CWD Buffer Overflow
Posted May 19, 2009
Authored by His0k4

httpdx versions 0.5b and below CWD related remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | e6c0c5ba1f3782a056ee746dcef857b6
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close