exploit the possibilities
Showing 1 - 25 of 60 RSS Feed

Files from fl0 fl0w

First Active2007-05-23
Last Active2011-04-25
eZip Wizard 3.0 Stack Buffer Overflow
Posted Apr 25, 2011
Authored by fl0 fl0w, jduck, Lincoln | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in version 3.0 of ediSys Corp.'s eZip Wizard. In order for the command to be executed, an attacker must convince someone to open a specially crafted zip file with eZip Wizard, and access the specially file via double-clicking it. By doing so, an attacker can execute arbitrary code as the victim user.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-1028, OSVDB-52815
SHA-256 | f7cf6b8da01815b33b60d03bf75a15fdc34e7db6f1efa9610628e431ece1a389
Mini-stream Ripper 3.1.2.1 Buffer Overflow
Posted Aug 7, 2010
Authored by fl0 fl0w

Mini-stream Ripper version 3.1.2.1 buffer overflow exploit with DEP bypass.

tags | exploit, overflow
SHA-256 | 6a049a5db35d265fbf5c574ca8a281b22eb5392c0849e180dd1b3832fe92b1c6
Kingsoft Office 2010 Writer 6.6.0.2462 Buffer Overflow
Posted Jun 29, 2010
Authored by fl0 fl0w

Kingsoft Office 2010 Writer version 6.6.0.2462 .doc file buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | a8e7e212331558cfb8431638cb4ecebb5d9ef9637870222218158b727941ad17
UltraISO 9.3.6.2750 Buffer Overflow
Posted Jun 29, 2010
Authored by fl0 fl0w

UltraISO version 9.3.6.2750 .mds and .mdf files local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | f576fc8dbfa346a93e7e56b59a91e12f17017d0f43226e497750d211fe8b51e9
PowerZip 7.21 Stack Buffer Overflow
Posted Jun 19, 2010
Authored by fl0 fl0w

PowerZip version 7.21 (Build 4010) stack buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 2280b720ac74d90006a42889287873c09ccf3ece7d8d88cd2cb364096704f894
H264WebCam 3.7 Boundary Condition
Posted Jun 19, 2010
Authored by fl0 fl0w

H264WebCam version 3.7 local boundary condition exploit.

tags | exploit, overflow, local
SHA-256 | 33b66c7a966611e9b1b10a2d961477c7c936621e3de22087d0397fd01b9a4e95
Corel VideoStudio Pro X3 Boundary Condition
Posted Jun 19, 2010
Authored by fl0 fl0w

Corel VideoStudio Pro X3 local boundary condition exploit.

tags | exploit, overflow, local
SHA-256 | a806d0400246a52ff0f41d1f57a9aae04b89c33b74473d588ec0499c7c2eb251
FeedDemon 3.1.0.12 Stack Buffer Overflow
Posted Jun 4, 2010
Authored by fl0 fl0w, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0546
SHA-256 | 8afb9bc6b6e5ed13de0b34861110cee4952239ed2ad8726c5bcc1f02b21ecbf8
Amaya 11.3.1 Remote Buffer Overflow Proof Of Concept
Posted May 22, 2010
Authored by fl0 fl0w

Amaya version 11.3.1 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 4d3d211fc71e047e923473d9df15698aa896aae81c8d409b32b69d47e1ed3fec
TeamViewer 5.0.8232 Buffer Overflow
Posted May 19, 2010
Authored by fl0 fl0w

TeamViewer version 5.0.8232 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | eb3b4275204e3eb34a3eee73ff80bc30dc6a1ff82440af7000f547ec3b909b22
WFTPD Server 3.30 Directory Traversal
Posted May 14, 2010
Authored by fl0 fl0w

WFTPD Server version 3.30 directory traversal exploit.

tags | exploit, file inclusion
SHA-256 | 2e2fb1913a585ae5cf5f8fb18da7901f4b134cb92fceedd7436ccec16353d38f
PhotoFiltre Studio X .tif Buffer Overflow
Posted May 5, 2010
Authored by fl0 fl0w

PhotoFiltre Studio X local buffer overflow proof of concept exploit that creates a malicious .tif file.

tags | exploit, overflow, local, proof of concept
SHA-256 | 11c5aded6bc1702cdbfe37e890fb19e395ef3880d49e4f30b76c516300ebb65f
MediaCoder Local Buffer Overflow
Posted Mar 20, 2010
Authored by fl0 fl0w

MediaCoder local buffer overflow exploit that creates a malicious .lst file.

tags | exploit, overflow, local
SHA-256 | 58f46679c2efc25a83d00b6a0ae41d8f9dd29f03d72f7508c16895530afb0375
MediaCoder 0.7.3.4605 Local Buffer Overflow
Posted Feb 25, 2010
Authored by fl0 fl0w

MediaCoder version 0.7.3.4605 local buffer overflow exploit with calc.exe and bindshell shellcode.

tags | exploit, overflow, local, shellcode
SHA-256 | fddb673addca4e8f2a1b132f3c1cc428c3b5554e631381b9af04b449c98a5ce4
Radasm .rap Local Buffer Overflow
Posted Feb 12, 2010
Authored by fl0 fl0w

Radasm local buffer overflow proof of concept exploit that creates a malicious .rap file.

tags | exploit, overflow, local, proof of concept
SHA-256 | e4c3d722260b66655d90ed7d614dfaa7b189d85b1dcbad2eac228e1811f84483
feedDemon 3.1.0.9 .opml File Buffer Overflow
Posted Feb 10, 2010
Authored by fl0 fl0w

feedDemon version 3.1.0.9 .opml file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | bdb43462e833a38c658cf6f4ea913c59a3fd9b5d0c379adb4507e5a5ea47926b
UltraISO 9.3.6.2750 Local Buffer Overflow
Posted Feb 9, 2010
Authored by fl0 fl0w

UltraISO version 9.3.6.2750 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | bd57eec4e2084ff888f186ef5a94a351746bbbfe3542359ada2785b0666a8bbe
AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
SHA-256 | 6aadc69d3bc6b1f7513f995d00471a16d1534088f0b0cfb9a3bbad503d044aa7
Deepburner Pro 1.9.0.228 Buffer Overflow
Posted Feb 3, 2010
Authored by fl0 fl0w

Deepburner Pro version 1.9.0.228 dbr file universal buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 93a19afa970f1ffa7953e6a989001556ec9f30f1effdd22bf0222dd39eb76b95
VLC 0.8.6x Buffer Overflow
Posted Jan 18, 2010
Authored by fl0 fl0w

VLC version 0.8.6 .ASS file universal buffer overflow exploit for Win32.

tags | exploit, overflow
systems | windows
SHA-256 | 63a7a3930d0434f2b98bc13930389bcdcdc0f4ba38af27f10f3b7ab9dac64c1c
Sub Station Alpha 4.08 Buffer Overflow
Posted Jan 15, 2010
Authored by fl0 fl0w

Sub Station Alpha version 4.08 .rt file local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | 356a1734a82896abc954b705230277e9a5bf6d3c3e7c61e033a26e05508e11ce
Winamp .ini Local Stack Buffer Overflow
Posted Jan 14, 2010
Authored by fl0 fl0w

Winamp versions 5.05 through 5.13 .ini local stack buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | e5862cc513ec580a652b913188b7b7c0f4287a97d191bfbe1ada137d8251baf2
HTMLDOC .html Buffer Overflow
Posted Jan 11, 2010
Authored by fl0 fl0w

HTMLDOC version 1.9.x-r1629 local .html buffer overflow exploit for Win32.

tags | exploit, overflow, local
systems | windows
SHA-256 | 095175a7d02b2fe4657634cc64a4193d580ca5d0b32384de942458135879443f
VirtualDJ Trial 6.0.6 NYE Exploit
Posted Jan 4, 2010
Authored by fl0 fl0w

VirtualDJ Trial version 6.0.6 New Year Edition .m3u file buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 867fd3accdc475cb1b17bc7e991a6e4d57fceed2f764d4b04aba130eb585bf67
Jasc Paint Shop Pro 8 Buffer Overflow
Posted Dec 4, 2009
Authored by fl0 fl0w

Jasc Paint Shop pro version 8 universal local buffer overflow exploit that creates a malicious .png file.

tags | exploit, overflow, local
SHA-256 | 4a5400aa187a892c6a698ad0935e27ff8b0f86c55a675a4cd10f3673e53418ea
Page 1 of 3
Back123Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close