exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Trancek

Email addresstrancek at yashira.org
First Active2008-01-06
Last Active2010-02-15
RKD Software BarCodeAx.dll v4.9 ActiveX Remote Stack Buffer Overflow
Posted Feb 15, 2010
Authored by patrick, Trancek | Site metasploit.com

This Metasploit module exploits a stack overflow in RKD Software Barcode Application ActiveX Control 'BarCodeAx.dll'. By sending an overly long string to the BeginPrint method of BarCodeAx.dll v4.9, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-3435
SHA-256 | 830fb97a12250288c3c344f312f383d28eed3c7a3ad23ca70f9078f2faa09692
Cain & Abel <= v4.9.24 RDP Buffer Overflow.
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.

tags | exploit, remote, overflow
advisories | CVE-2008-5405
SHA-256 | 47967a6fce5366f37b0a5c09173209b74b0a55645903ae023725ee62e0883c49
Destiny Media Player 1.61 PLS M3U Buffer Overflow
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist

tags | exploit, overflow
SHA-256 | 868dcc3efcdca401445588d0a42bc621b29c77a244203e78aa5f0670aaeb92dc
Racer v0.5.3 beta 5 Buffer Overflow
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits the Racer Car and Racing Simulator game versions v0.5.3 beta 5 and earlier. Both the client and server listen on UDP port 26000. By sending an overly long buffer we are able to execute arbitrary code remotely.

tags | exploit, arbitrary, udp
advisories | CVE-2007-4370
SHA-256 | eeec58a260df8c186168c51564c1648b4fb15be54f60f8be09a8ae6f007dc2e7
Zinf Audio Player 2.2.1 (PLS File) Stack Overflow.
Posted Nov 26, 2009
Authored by patrick, Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Zinf Audio Player 2.2.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extension is registered to Zinf. This functionality has not been tested in this module.

tags | exploit, overflow
advisories | CVE-2004-0964
SHA-256 | ce73f204a7c39ce17aa59a98ab75c05c4e5a425c620c828d042446194e557785
imagestation-overflow.txt
Posted Feb 8, 2008
Authored by Trancek

ImageStation ActiveX buffer overflow proof of concept exploit that takes advantage of SonylSUpload.cab version 1.0.0.38.

tags | exploit, overflow, activex, proof of concept
SHA-256 | 4639742089526827e9967fed3e52ab54a2210f04551adb3d7c140616eb330727
osa-rfi.txt
Posted Feb 6, 2008
Authored by Trancek

OpenSiteAdmin versions 0.9.1.1 and below suffer from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 40bbe74570d048d429056d0c1a17fda85bc1e944fbaa129886682ca5af5ac6f4
allclub-lfi.txt
Posted Feb 6, 2008
Authored by Trancek

All Club CMS versions 0.0.1f and below suffer from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | 7b484d9c53345d3a9f9556d695fc6149c1573cb91ba442195bac31775e0d697f
coolplayer217-overflow.txt
Posted Jan 6, 2008
Authored by Trancek

CoolPlayer version 2.17 .m3u playlist stack overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | cdff2e6770f455d03ba6e2c1262138e8142d7ae62186f141fcebc62cbbaf9f93
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close