exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files from Expanders

Email addressexpanders at gmail.com
First Active2005-04-17
Last Active2010-02-05
AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
MD5 | 35c9773dc0a7fa04a697d0a53ee89484
xmplay-1.txt
Posted Nov 22, 2006
Authored by Expanders, Greg Linares

XMPlay version 3.3.0.4 .M3U filename local buffer overflow exploit that executes CALC.exe.

tags | exploit, overflow, local
MD5 | 863a37a16135b9e651098390601fbffb
XHNB-Novell-eDirectory_remote_bof.c
Posted Nov 7, 2006
Authored by Expanders, Manuel Santamarina Suarez

Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | 1ed95b6be03b156bf4d22e7d5f95b29e
streamripper-2.txt
Posted Aug 30, 2006
Authored by Expanders

Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.

tags | exploit, web, overflow
MD5 | cd277a8b2537d3dc5e39dd7e88daae3e
XH-FreeFTPD_remote_bof.c
Posted Nov 20, 2005
Authored by barabas, Expanders | Site x0n3-h4ck.org

FreeFTPd remote USER buffer overflow exploit for versions 1.0.8 and below.

tags | exploit, remote, overflow
MD5 | ad8cb8527a30bf2280be0f4aea92c3e7
XH-Hasbani-HTTPD-DoS.c
Posted Oct 30, 2005
Authored by Expanders | Site x0n3-h4ck.org

Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.

tags | exploit, remote, web, denial of service
MD5 | 62411e2cbf277383b98e1096a7b2e2c7
mailenable_bof_advisory.txt
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | advisory, overflow, arbitrary
MD5 | 716d2166a0aa057eae20c9831fc6a2b9
x0n3-h4ck_MailEnable_Imapd.c
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | exploit, overflow, arbitrary
MD5 | e464b98e77727cbd391a46b4ba4281f2
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close