exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Aviram Jenik

Email addressaviram at beyondsecurity.com
First Active1999-11-04
Last Active2004-02-18
brokerFTP.txt
Posted Feb 18, 2004
Authored by Aviram Jenik | Site securiteam.com

Two security vulnerabilities in Broker FTP server version 6.1.0.0 cause the server to crash and utilize 100 percent of the systems CPU cycles.

tags | exploit, vulnerability
SHA-256 | 468c4ebd2f2d3bba08b987b1bfbe71803d631e237f34b3603b7a4170a7b0d3ac
deskpro.sql.txt
Posted Oct 21, 2003
Authored by Aviram Jenik | Site securiteam.com

DeskPRO v1.1.0 and below do not adequately filter user provided data, allowing a remote attacker to insert malicious SQL statements into existing ones. Allows attackers to login to the system as an administrator without knowing the password.

tags | exploit, remote
SHA-256 | 983ccb3475e6d82e382857c1d96466127ac14546a3310ec3ddb85f10f737178d
tftpd32.traverse.pl
Posted Nov 19, 2002
Authored by Aviram Jenik | Site SecuriTeam.com

Tftpd TFTP server v2.50.2 and below remote exploit which allows any file on the system to be viewed and written to arbitrary locations. Fix available here.

tags | exploit, remote, arbitrary
SHA-256 | 873d353180f19cd2f3180436d51e6b969551726ec62331c1e8f534cb4d29e38f
tftpd32.pl
Posted Nov 19, 2002
Authored by Aviram Jenik | Site SecuriTeam.com

Tftpd TFTP server v2.21 and below remote command execution exploit in perl. Fix available here.

tags | exploit, remote, perl
SHA-256 | fcdc959822bf5fe12b26d0525067a4065e0b63beccdcd45371546b50e251eacf
bearshare.4.0.6.txt
Posted Oct 4, 2002
Authored by Aviram Jenik, Gluck, Mario Solares | Site BeyondSecurity.com

Bearshare v4.0.6 and below is contains a directory traversal bug which allows remote attackers to view any file on the system by sending a specially crafted HTTP request. Exploit URL's included.

tags | exploit, remote, web
SHA-256 | cad3d0362461a14c8ccbd95f6f1f600ac94604d550985ae00256a9005707e65c
hotsync.manager.txt
Posted Nov 4, 1999
Authored by Aviram Jenik

The Palm Hotsync manager is vulnerable to a buffer overflow attack that can crash the hotsync application and possibly be used to execute arbitrary code on the machine running the hotsync. Hotsync manager runs on tcp port 14238. Exploit and full advisory here.

tags | exploit, overflow, arbitrary, tcp
SHA-256 | 248da307134983a853fc649115b333378def514fe8249763e567a75ad6d28e29
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close