exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Behrang Fouladi

Email addressbehrang at hat-squad.com
First Active2003-12-29
Last Active2004-11-05
000077.txt
Posted Nov 5, 2004
Authored by Behrang Fouladi | Site hat-squad.com

Hat Squad Advisory - Helm Web Hosting Control Panel is susceptible to cross site scripting and SQL injection vulnerabilities. Versions 3.1.19 and below are affected.

tags | advisory, web, vulnerability, xss, sql injection
SHA-256 | c3b9809692743b6d9b75bd8868292a9f6686f574c566fd5c6ce763508c70554c
101_ypops.cpp
Posted Oct 13, 2004
Authored by class101, Behrang Fouladi

YahooPOPS version 1.6 and prior SMTP port buffer overflow exploit version 0.1. Binds a shell to port 101.

tags | exploit, overflow, shell
SHA-256 | d2ee1b20931eae876045ab86c1dd5593d1c5adec78853e59d0fc83e91f651324
yahooPOPS.txt
Posted Oct 1, 2004
Authored by Behrang Fouladi, Nima Majidi

Remote buffer overflows in both the POP3 and SMTP services of the YahooPOPs application can allow for arbitrary code execution. Exploit included.

tags | exploit, remote, overflow, arbitrary, code execution
SHA-256 | 124a97c593ee3f534937a99069df7569c100a351f74208a9a4a156e48622cc26
hatsquad.txt
Posted May 11, 2004
Authored by Behrang Fouladi | Site hat-squad.com

Hat-Squad Advisory - A remote heap overflow has been discovered in MailEnable Professional Edition versions 1.5 to 1.7. Sending an HTTP request with more than 4045 bytes to MEHTTPS service will cause a heap buffer overflow while logging is enabled. It is possible for a remote attacker to execute code as SYSTEM.

tags | advisory, remote, web, overflow
SHA-256 | 7fbcb105140f4b9e3648e2b0f3fc89ae526912d8e532e8cfa5260c3bf076c531
mdaemon-raw.txt
Posted Dec 29, 2003
Authored by Pejamn Davarzani, Behrang Fouladi | Site hat-squad.com

Alt-N Technologies MDaemon Mail Server versions 6.52 to 6.85 suffer from a remote buffer overflow in its raw message handler. Sending more than 153 bytes in the From field to FROM2Raw.exe creates a raw file, that when processed by mdaemon, will cause a stack buffer overflow.

tags | exploit, remote, overflow
SHA-256 | 4daf75c0f5e15aad52aebd515291656487a499b4fb5e7b31fe3229b19871d00a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close