exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Trancek

Email addresstrancek at yashira.org
First Active2008-01-06
Last Active2010-02-15
RKD Software BarCodeAx.dll v4.9 ActiveX Remote Stack Buffer Overflow
Posted Feb 15, 2010
Authored by patrick, Trancek | Site metasploit.com

This Metasploit module exploits a stack overflow in RKD Software Barcode Application ActiveX Control 'BarCodeAx.dll'. By sending an overly long string to the BeginPrint method of BarCodeAx.dll v4.9, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-3435
SHA-256 | 830fb97a12250288c3c344f312f383d28eed3c7a3ad23ca70f9078f2faa09692
Cain & Abel <= v4.9.24 RDP Buffer Overflow.
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.

tags | exploit, remote, overflow
advisories | CVE-2008-5405
SHA-256 | 47967a6fce5366f37b0a5c09173209b74b0a55645903ae023725ee62e0883c49
Destiny Media Player 1.61 PLS M3U Buffer Overflow
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist

tags | exploit, overflow
SHA-256 | 868dcc3efcdca401445588d0a42bc621b29c77a244203e78aa5f0670aaeb92dc
Racer v0.5.3 beta 5 Buffer Overflow
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits the Racer Car and Racing Simulator game versions v0.5.3 beta 5 and earlier. Both the client and server listen on UDP port 26000. By sending an overly long buffer we are able to execute arbitrary code remotely.

tags | exploit, arbitrary, udp
advisories | CVE-2007-4370
SHA-256 | eeec58a260df8c186168c51564c1648b4fb15be54f60f8be09a8ae6f007dc2e7
Zinf Audio Player 2.2.1 (PLS File) Stack Overflow.
Posted Nov 26, 2009
Authored by patrick, Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Zinf Audio Player 2.2.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extension is registered to Zinf. This functionality has not been tested in this module.

tags | exploit, overflow
advisories | CVE-2004-0964
SHA-256 | ce73f204a7c39ce17aa59a98ab75c05c4e5a425c620c828d042446194e557785
imagestation-overflow.txt
Posted Feb 8, 2008
Authored by Trancek

ImageStation ActiveX buffer overflow proof of concept exploit that takes advantage of SonylSUpload.cab version 1.0.0.38.

tags | exploit, overflow, activex, proof of concept
SHA-256 | 4639742089526827e9967fed3e52ab54a2210f04551adb3d7c140616eb330727
osa-rfi.txt
Posted Feb 6, 2008
Authored by Trancek

OpenSiteAdmin versions 0.9.1.1 and below suffer from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 40bbe74570d048d429056d0c1a17fda85bc1e944fbaa129886682ca5af5ac6f4
allclub-lfi.txt
Posted Feb 6, 2008
Authored by Trancek

All Club CMS versions 0.0.1f and below suffer from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | 7b484d9c53345d3a9f9556d695fc6149c1573cb91ba442195bac31775e0d697f
coolplayer217-overflow.txt
Posted Jan 6, 2008
Authored by Trancek

CoolPlayer version 2.17 .m3u playlist stack overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | cdff2e6770f455d03ba6e2c1262138e8142d7ae62186f141fcebc62cbbaf9f93
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close