what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 86 RSS Feed

Files from Francis Provencher

First Active2009-08-25
Last Active2017-01-12
IBM Lotus Domino LDAP Remote Code Execution
Posted Feb 19, 2011
Authored by Francis Provencher

IBM Lotus Domino LDAP bind request remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2010-4323
SHA-256 | 46402f3ac39ee9e15c00c1a55880febf3a51331ae26d8997f960f98c07fdb606
Novell ZenWorks 10 / 11 TFTPD Remote Code Execution
Posted Feb 19, 2011
Authored by Francis Provencher

Novell ZenWorks versions 10 and 11 tftpd remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2010-4323
SHA-256 | 78181683877a61639444c420aefed5f9d978da3b270235598031a80ebca21bb4
Novell Iprint LPD Remote Code Execution
Posted Feb 19, 2011
Authored by Francis Provencher

Novell Iprint LPD remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2010-4328
SHA-256 | ae058abd9f7bac1e4a5b8fbb2d5aed21a602a517a2bb70ef19c5bca552bb9b15
Novell Groupwise Internet Agent IMAP LIST Command Remote Code Execution
Posted Nov 10, 2010
Authored by Francis Provencher

Novell Groupwise suffers from an Internet Agent IMAP LIST command remote code execution vulnerability.

tags | exploit, remote, imap, code execution
SHA-256 | de163bf78d636b4473ab7820066e425de60984121a4acf0fdc9a44e1dfda0548
Novell Groupwise Internet Agent IMAP LIST LSUB Command Remote Code Execution
Posted Nov 10, 2010
Authored by Francis Provencher

Novell Groupwise version 8.0.2 suffers from an Internet Agent IMAP LIST LSUB command remote code execution vulnerability.

tags | exploit, remote, imap, code execution
SHA-256 | 443d827567f7a7b163d7618d61e03df800e3c2ed5dc1b2491d7178dcdbd8b7b9
Novell Netware OpenSSH Remote Stack Overflow
Posted Sep 3, 2010
Authored by Francis Provencher

A flaw exists within SSHD.NLM of Novell Netware version 6.5. When the application attempts to resolve an absolute path on the server, a 512 byte destination buffer is used without bounds checking. By providing a large enough value, an attacker can cause a buffer to be overflowed. Successful exploitation results in remote code execution under the context of the server.

tags | exploit, remote, overflow, code execution
SHA-256 | b66ffafeb7f223aee83ce62e71c46bd305a2640628049236529604d8e4bb0ed7
Novell Groupwise Internet Agent Stack Overflow
Posted Jul 17, 2010
Authored by Francis Provencher

The Novell Groupwise Internet Agent suffers from a remote code execution vulnerability due to a stack overflow.

tags | exploit, remote, overflow, code execution
SHA-256 | 76736a6c8ea0fb9f7f9a0f12dd5cf5394064dec0c96b1d6cf55ca7dee72c2d5f
Novell Groupwise Webaccess Stack Overflow
Posted Jul 16, 2010
Authored by Francis Provencher

Novell Groupwise Webaccess suffers from a remote code execution vulnerability due to a stack overflow.

tags | exploit, remote, overflow, code execution
SHA-256 | 6bc927bbb103ea68af6dfe0fd79afd57d34dc381ac12eaba2cd72d5a86b363a1
Microsoft Windows Outlook Express And Windows Mail Integer Overflow
Posted May 12, 2010
Authored by Francis Provencher

Microsoft Windows Outlook Express and Windows Mail suffer from an integer overflow vulnerability.

tags | exploit, overflow
systems | windows
advisories | CVE-2010-0816
SHA-256 | 2acf22676b2db8c146ec43270d2c5a5e9f0d7b238abc38f7dbe2d45a0204f152
Novell Netware 6.5 SP8 Stack Overflow
Posted Mar 30, 2010
Authored by Francis Provencher

Novell Netware version 6.5 SP8 suffers from a FTP related remote stack overflow vulnerability.

tags | advisory, remote, overflow
advisories | CVE-2010-0625
SHA-256 | d70cb64062375e67c59fa55ccdfc4459fc2ba986572b94e42fd9a52b123d90c9
Lexmark Laser Printer Denial Of Service
Posted Mar 24, 2010
Authored by Francis Provencher

Multiple Lexmark laser printers suffer from a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2010-0618
SHA-256 | 841ee8594d3134ad52863f80eadc2624517a74d49b50c5a701b129085d46e979
Lexmark Laser Printer Stack Overflow
Posted Mar 23, 2010
Authored by Francis Provencher

Multiple Lexmark laser printers suffer from a remote stack overflow vulnerability. Proof of concept code included.

tags | exploit, remote, overflow, proof of concept
advisories | CVE-2010-0619
SHA-256 | 9564488c97337d98ee78100dfc8337f082171206d5b27fc78d0fca2bd0e3c6a7
Xerox Workcenter 4150 Buffer Overflow
Posted Jan 31, 2010
Authored by Francis Provencher

The Xerox Workcenter version 4150 suffers from a buffer overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, proof of concept
SHA-256 | 0c47f97159b37b78391874db638835f12d96ef6db7c62a9f90fbaf6511284e7f
Novell Netware CIFS / AFP Remote Memory Consumption
Posted Jan 6, 2010
Authored by Francis Provencher

Novell Netware CIFS and AFP suffer from a remote memory consumption denial of service vulnerability. Proof of concept code included.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | c81ff29e3050f2cf6066bdf4dd0a8347ff90f32555917770ae13bc29fda6bdd3
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by Dr_IDE, Francis Provencher, jduck, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.

tags | exploit, overflow
advisories | CVE-2009-3837
SHA-256 | 03aa5d1fb353fd0b0a186d111853941e220644c617f4997fc853286c33067088
QuickHeal Antivirus 2010 Privilege Escalation
Posted Dec 16, 2009
Authored by Francis Provencher

QuickHeal Antivirus 2010 suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 69cd124e6b9c3943501daf6ddf8af230402ed50ff7d705785995379b9b2307cc
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 10, 2009
Authored by Dr_IDE, Francis Provencher, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message.

tags | exploit, overflow
SHA-256 | 215303af9fa1743f8f050624ab0a364dc6fdc4218fbee1b68806a9c6c18c6bd6
Panda Privilege Escalation
Posted Nov 3, 2009
Authored by Francis Provencher

Panda Global Protection 2010 and Panda Internet Security 2010 suffer from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 64f2e9ead589a335d9a4042fdd9fb8701624f6252be4329deeab35dd37c20a00
My Remote File Server Privilege Escalation
Posted Oct 30, 2009
Authored by Francis Provencher

My Remote File Server suffers from a local privilege escalation vulnerability.

tags | advisory, remote, local
SHA-256 | b0d5863983aebf57733c7be0f0976c34e42a4ed7233c11d0fb111626926f6f12
Rising Firewall 2009 Privilege Escalation
Posted Oct 27, 2009
Authored by Francis Provencher

Rising Firewall 2009 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 7ed1123ab5799083677729f1d7215d2caec6faad2ce9690b8b9d6cd8850e38eb
Rising Antivirus 2009 Privilege Escalation
Posted Oct 27, 2009
Authored by Francis Provencher

Rising Antivirus 2009 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | d96f58d6d5475678fc528db34b67fc3f36b99bebe82c9b326cc24a0dc32d2fd4
Pegasus Mail Client Buffer Overflow
Posted Oct 23, 2009
Authored by Francis Provencher

Pegasus Mail Client version 4.51 suffers from a remote buffer overflow vulnerability. Proof of concept denial of service code included.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | 1dbf648aa73fbc29abc9c44b1c7a86bd17ea343df12397c7dad7c627890324ae
Eureka Mail Client Buffer Overflow
Posted Oct 23, 2009
Authored by Francis Provencher

Eureka Mail Client version 2.2q suffers from a remote buffer overflow vulnerability. Proof of concept denial of service code included.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | a02d6270bac17874219ce98888b43ed15519fc06b9faa37202420af469d20643
Cerberus FTP 3.0.6 Denial Of Service
Posted Oct 2, 2009
Authored by Francis Provencher

Cerberus FTP version 3.0.6 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | ff4740488f314e311cf5ca7ee1ecf511fcf6838ffab91a647ba69d5bad0a7cf7
Novell Edirectory 8.8 SP5 Cross Site Scripting
Posted Oct 2, 2009
Authored by Francis Provencher

Novell Edirectory version 8.8 SP5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f94a3861133ed53cd369260714b12ab34c2f5bfe2161656e004ec00c5fdd05cd
Page 3 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close