exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Expanders

Email addressexpanders at gmail.com
First Active2005-04-17
Last Active2010-02-05
AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
SHA-256 | 6aadc69d3bc6b1f7513f995d00471a16d1534088f0b0cfb9a3bbad503d044aa7
xmplay-1.txt
Posted Nov 22, 2006
Authored by Expanders, Greg Linares

XMPlay version 3.3.0.4 .M3U filename local buffer overflow exploit that executes CALC.exe.

tags | exploit, overflow, local
SHA-256 | 082bb5e1b00a07a7d2af2a365a3da3b5aa70c31d6de463b58cf200a19606e19f
XHNB-Novell-eDirectory_remote_bof.c
Posted Nov 7, 2006
Authored by Expanders, Manuel Santamarina Suarez

Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 1acfa7a13ca13f316e5a4c8f1d11e2f197cda1019616c5dc3401e0d70f57d958
streamripper-2.txt
Posted Aug 30, 2006
Authored by Expanders

Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.

tags | exploit, web, overflow
SHA-256 | a01cbeda0ca3af143a437e3f105f122b5ca65dd6fed028ccf124d6b599630770
XH-FreeFTPD_remote_bof.c
Posted Nov 20, 2005
Authored by barabas, Expanders | Site x0n3-h4ck.org

FreeFTPd remote USER buffer overflow exploit for versions 1.0.8 and below.

tags | exploit, remote, overflow
SHA-256 | 8da2a5f3da96fa0cafbeead497312b5e06fcdbd17ce4badd50add24f1c732a7c
XH-Hasbani-HTTPD-DoS.c
Posted Oct 30, 2005
Authored by Expanders | Site x0n3-h4ck.org

Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.

tags | exploit, remote, web, denial of service
SHA-256 | e7ea5226541a9e30177def6562f8d6efcb06aad03e47001f1f145555549dc8b9
mailenable_bof_advisory.txt
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | 3c903a1c75d2c6ce2dc58166691a78cc53abf54674742b75c0de08bc36644648
x0n3-h4ck_MailEnable_Imapd.c
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 2edd1ae02970c2a37df0d63b2f434b3f3acccbe4d46c6f12b8f968b4377f3bc5
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close