exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Zwell

First Active2005-04-19
Last Active2007-08-15
wireshark-dos.txt
Posted Aug 15, 2007
Authored by Zwell | Site nosec.org

WireShark versions below 0.99.6 suffer from a denial of service vulnerability when parsing MMS messages. Denial of service exploit included.

tags | exploit, denial of service
SHA-256 | 90ada8e6d8d19f8c14348b012635138ac41888d2f21e0390cdda97eac4b912b5
wengophone-dos.txt
Posted Aug 14, 2007
Authored by Zwell | Site nosec.org

WengoPhone SIP Phone version 2.x suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 844aee0a2cd207db48e3126900dd64fcafd1de57444fd3eb8ba3a8990d42a2b4
counterpath-dos.txt
Posted Aug 14, 2007
Authored by Zwell | Site nosec.org

CounterPath X-Lite SIP Phone version 3.x suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 7d308fdccd85abb51ba288ba7af1e1d449f69e1da5dadc2d7eacd42df1012ecc
estaraDoS.txt
Posted Feb 25, 2006
Authored by Zwell

eStara SIP softphone is susceptible to denial of service and format string flaws.

tags | advisory, denial of service
SHA-256 | 934eae5aad07a18778dbf8f0edd5a828561b872570a74187fd7385232de093a9
eyeBeam_dos.c
Posted Jan 21, 2006
Authored by Zwell

eyeBeam softphone remote denial of service SIP header mishandling exploit.

tags | exploit, remote, denial of service
SHA-256 | c9af2dfdb21e5a5ab2c257b74a84585563a0f0be60d3124fc374306d1a84e010
eStara.c
Posted Jan 12, 2006
Authored by Zwell | Site donews.net

eStara Softphone buffer overflow exploit that makes use of a vulnerability in the SIP stack processing. Versions 3.0.1.14 and 3.0.1.46 were verified vulnerable.

tags | exploit, overflow
SHA-256 | 382b1c07faea1deb25c0e2911fccc9df59685b96488eb391a4d7676a072f4005
ms05038.c
Posted Aug 12, 2005
Authored by Zwell | Site donews.net

Microsoft Internet Explorer COM Object remote file down and execute exploit. Makes use of the vulnerability described in MS05-038.

tags | exploit, remote
advisories | CVE-2005-1990
SHA-256 | fb75508c17a1d01407c6df35ff810bd6880a37223ff16a1e6f1e8d024a2ae186
MSHTA_POC.c
Posted Apr 19, 2005
Authored by Zwell

Proof-of-Concept code to generate a file with an embedded CLSID, demonstrating how the issues detailed in the iDEFENSE "MSHTA" advisory, MS05-016, and other places, can be exploited.

tags | exploit
advisories | CVE-2005-0063
SHA-256 | 7826084c6c139e8540b77c60563f111711b9055021c1118b3cabc3f461e16bb2
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close