exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 60 RSS Feed

Files from fl0 fl0w

First Active2007-05-23
Last Active2011-04-25
eZip Wizard 3.0 Stack Buffer Overflow
Posted Apr 25, 2011
Authored by fl0 fl0w, jduck, Lincoln | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 3.0 of ediSys Corp.'s eZip Wizard. In order for the command to be executed, an attacker must convince someone to open a specially crafted zip file with eZip Wizard, and access the specially file via double-clicking it. By doing so, an attacker can execute arbitrary code as the victim user.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-1028, OSVDB-52815
SHA-256 | f7cf6b8da01815b33b60d03bf75a15fdc34e7db6f1efa9610628e431ece1a389
Mini-stream Ripper 3.1.2.1 Buffer Overflow
Posted Aug 7, 2010
Authored by fl0 fl0w

Mini-stream Ripper version 3.1.2.1 buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 6a049a5db35d265fbf5c574ca8a281b22eb5392c0849e180dd1b3832fe92b1c6
Kingsoft Office 2010 Writer 6.6.0.2462 Buffer Overflow
Posted Jun 29, 2010
Authored by fl0 fl0w

Kingsoft Office 2010 Writer version 6.6.0.2462 .doc file buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | a8e7e212331558cfb8431638cb4ecebb5d9ef9637870222218158b727941ad17
UltraISO 9.3.6.2750 Buffer Overflow
Posted Jun 29, 2010
Authored by fl0 fl0w

UltraISO version 9.3.6.2750 .mds and .mdf files local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | f576fc8dbfa346a93e7e56b59a91e12f17017d0f43226e497750d211fe8b51e9
PowerZip 7.21 Stack Buffer Overflow
Posted Jun 19, 2010
Authored by fl0 fl0w

PowerZip version 7.21 (Build 4010) stack buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 2280b720ac74d90006a42889287873c09ccf3ece7d8d88cd2cb364096704f894
H264WebCam 3.7 Boundary Condition
Posted Jun 19, 2010
Authored by fl0 fl0w

H264WebCam version 3.7 local boundary condition exploit.

tags | exploit, overflow, local
SHA-256 | 33b66c7a966611e9b1b10a2d961477c7c936621e3de22087d0397fd01b9a4e95
Corel VideoStudio Pro X3 Boundary Condition
Posted Jun 19, 2010
Authored by fl0 fl0w

Corel VideoStudio Pro X3 local boundary condition exploit.

tags | exploit, overflow, local
SHA-256 | a806d0400246a52ff0f41d1f57a9aae04b89c33b74473d588ec0499c7c2eb251
FeedDemon 3.1.0.12 Stack Buffer Overflow
Posted Jun 4, 2010
Authored by fl0 fl0w, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0546
SHA-256 | 8afb9bc6b6e5ed13de0b34861110cee4952239ed2ad8726c5bcc1f02b21ecbf8
Amaya 11.3.1 Remote Buffer Overflow Proof Of Concept
Posted May 22, 2010
Authored by fl0 fl0w

Amaya version 11.3.1 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 4d3d211fc71e047e923473d9df15698aa896aae81c8d409b32b69d47e1ed3fec
TeamViewer 5.0.8232 Buffer Overflow
Posted May 19, 2010
Authored by fl0 fl0w

TeamViewer version 5.0.8232 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | eb3b4275204e3eb34a3eee73ff80bc30dc6a1ff82440af7000f547ec3b909b22
WFTPD Server 3.30 Directory Traversal
Posted May 14, 2010
Authored by fl0 fl0w

WFTPD Server version 3.30 directory traversal exploit.

tags | exploit, file inclusion
SHA-256 | 2e2fb1913a585ae5cf5f8fb18da7901f4b134cb92fceedd7436ccec16353d38f
PhotoFiltre Studio X .tif Buffer Overflow
Posted May 5, 2010
Authored by fl0 fl0w

PhotoFiltre Studio X local buffer overflow proof of concept exploit that creates a malicious .tif file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 11c5aded6bc1702cdbfe37e890fb19e395ef3880d49e4f30b76c516300ebb65f
MediaCoder Local Buffer Overflow
Posted Mar 20, 2010
Authored by fl0 fl0w

MediaCoder local buffer overflow exploit that creates a malicious .lst file.

tags | exploit, overflow, local
SHA-256 | 58f46679c2efc25a83d00b6a0ae41d8f9dd29f03d72f7508c16895530afb0375
MediaCoder 0.7.3.4605 Local Buffer Overflow
Posted Feb 25, 2010
Authored by fl0 fl0w

MediaCoder version 0.7.3.4605 local buffer overflow exploit with calc.exe and bindshell shellcode.

tags | exploit, overflow, local, shellcode
SHA-256 | fddb673addca4e8f2a1b132f3c1cc428c3b5554e631381b9af04b449c98a5ce4
Radasm .rap Local Buffer Overflow
Posted Feb 12, 2010
Authored by fl0 fl0w

Radasm local buffer overflow proof of concept exploit that creates a malicious .rap file.

tags | exploit, overflow, local, proof of concept
SHA-256 | e4c3d722260b66655d90ed7d614dfaa7b189d85b1dcbad2eac228e1811f84483
feedDemon 3.1.0.9 .opml File Buffer Overflow
Posted Feb 10, 2010
Authored by fl0 fl0w

feedDemon version 3.1.0.9 .opml file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | bdb43462e833a38c658cf6f4ea913c59a3fd9b5d0c379adb4507e5a5ea47926b
UltraISO 9.3.6.2750 Local Buffer Overflow
Posted Feb 9, 2010
Authored by fl0 fl0w

UltraISO version 9.3.6.2750 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | bd57eec4e2084ff888f186ef5a94a351746bbbfe3542359ada2785b0666a8bbe
AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
SHA-256 | 6aadc69d3bc6b1f7513f995d00471a16d1534088f0b0cfb9a3bbad503d044aa7
Deepburner Pro 1.9.0.228 Buffer Overflow
Posted Feb 3, 2010
Authored by fl0 fl0w

Deepburner Pro version 1.9.0.228 dbr file universal buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 93a19afa970f1ffa7953e6a989001556ec9f30f1effdd22bf0222dd39eb76b95
VLC 0.8.6x Buffer Overflow
Posted Jan 18, 2010
Authored by fl0 fl0w

VLC version 0.8.6 .ASS file universal buffer overflow exploit for Win32.

tags | exploit, overflow
systems | windows
SHA-256 | 63a7a3930d0434f2b98bc13930389bcdcdc0f4ba38af27f10f3b7ab9dac64c1c
Sub Station Alpha 4.08 Buffer Overflow
Posted Jan 15, 2010
Authored by fl0 fl0w

Sub Station Alpha version 4.08 .rt file local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | 356a1734a82896abc954b705230277e9a5bf6d3c3e7c61e033a26e05508e11ce
Winamp .ini Local Stack Buffer Overflow
Posted Jan 14, 2010
Authored by fl0 fl0w

Winamp versions 5.05 through 5.13 .ini local stack buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | e5862cc513ec580a652b913188b7b7c0f4287a97d191bfbe1ada137d8251baf2
HTMLDOC .html Buffer Overflow
Posted Jan 11, 2010
Authored by fl0 fl0w

HTMLDOC version 1.9.x-r1629 local .html buffer overflow exploit for Win32.

tags | exploit, overflow, local
systems | windows
SHA-256 | 095175a7d02b2fe4657634cc64a4193d580ca5d0b32384de942458135879443f
VirtualDJ Trial 6.0.6 NYE Exploit
Posted Jan 4, 2010
Authored by fl0 fl0w

VirtualDJ Trial version 6.0.6 New Year Edition .m3u file buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 867fd3accdc475cb1b17bc7e991a6e4d57fceed2f764d4b04aba130eb585bf67
Jasc Paint Shop Pro 8 Buffer Overflow
Posted Dec 4, 2009
Authored by fl0 fl0w

Jasc Paint Shop pro version 8 universal local buffer overflow exploit that creates a malicious .png file.

tags | exploit, overflow, local
SHA-256 | 4a5400aa187a892c6a698ad0935e27ff8b0f86c55a675a4cd10f3673e53418ea
Page 1 of 3
Back123Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close