exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files from Expanders

Email addressexpanders at gmail.com
First Active2005-04-17
Last Active2010-02-05
AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
MD5 | 35c9773dc0a7fa04a697d0a53ee89484
xmplay-1.txt
Posted Nov 22, 2006
Authored by Expanders, Greg Linares

XMPlay version 3.3.0.4 .M3U filename local buffer overflow exploit that executes CALC.exe.

tags | exploit, overflow, local
MD5 | 863a37a16135b9e651098390601fbffb
XHNB-Novell-eDirectory_remote_bof.c
Posted Nov 7, 2006
Authored by Expanders, Manuel Santamarina Suarez

Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | 1ed95b6be03b156bf4d22e7d5f95b29e
streamripper-2.txt
Posted Aug 30, 2006
Authored by Expanders

Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.

tags | exploit, web, overflow
MD5 | cd277a8b2537d3dc5e39dd7e88daae3e
XH-FreeFTPD_remote_bof.c
Posted Nov 20, 2005
Authored by barabas, Expanders | Site x0n3-h4ck.org

FreeFTPd remote USER buffer overflow exploit for versions 1.0.8 and below.

tags | exploit, remote, overflow
MD5 | ad8cb8527a30bf2280be0f4aea92c3e7
XH-Hasbani-HTTPD-DoS.c
Posted Oct 30, 2005
Authored by Expanders | Site x0n3-h4ck.org

Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.

tags | exploit, remote, web, denial of service
MD5 | 62411e2cbf277383b98e1096a7b2e2c7
mailenable_bof_advisory.txt
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | advisory, overflow, arbitrary
MD5 | 716d2166a0aa057eae20c9831fc6a2b9
x0n3-h4ck_MailEnable_Imapd.c
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | exploit, overflow, arbitrary
MD5 | e464b98e77727cbd391a46b4ba4281f2
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close