exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from cazz

First Active2009-10-28
Last Active2009-11-26
Microsoft RPC DCOM Interface Overflow
Posted Nov 26, 2009
Authored by H D Moore, spoonm, cazz | Site metasploit.com

This Metasploit module exploits a stack overflow in the RPCSS service, this vulnerability was originally found by the Last Stage of Delirium research group and has bee widely exploited ever since. This Metasploit module can exploit the English versions of Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 all in one request :)

tags | exploit, overflow
systems | windows
advisories | CVE-2003-0352
SHA-256 | 6b1062b85247570ddb5362e034cb6be3d1be2f14dd236970e3ab1f279909588d
Microsoft Plug and Play Service Overflow
Posted Nov 26, 2009
Authored by H D Moore, cazz | Site metasploit.com

This Metasploit module exploits a stack overflow in the Windows Plug and Play service. This vulnerability can be exploited on Windows 2000 without a valid user account. Since the PnP service runs inside the service.exe process, a failed exploit attempt will cause the system to automatically reboot.

tags | exploit, overflow
systems | windows
advisories | CVE-2005-1983
SHA-256 | 2d54b358ebb862c805c0f268e705e13f7bd6770f841069a133a28f5e460b2a4a
PHP XML-RPC Arbitrary Code Execution
Posted Oct 30, 2009
Authored by H D Moore, cazz | Site metasploit.com

This Metasploit module exploits an arbitrary code execution flaw discovered in many implementations of the PHP XML-RPC module. This flaw is exploitable through a number of PHP web applications, including but not limited to Drupal, Wordpress, Postnuke, and TikiWiki.

tags | exploit, web, arbitrary, php, code execution
advisories | CVE-2005-1921
SHA-256 | 74661987981d6b9dcef06ec55c6a9cc16d40945f635c122f6a84bdf7a7d57158
Solaris in.telnetd TTYPROMPT Buffer Overflow
Posted Oct 28, 2009
Authored by MC, cazz

This Metasploit module uses a buffer overflow in the Solaris 'login' application to bypass authentication in the telnet daemon.

tags | exploit, overflow
systems | solaris
advisories | CVE-2001-0797
SHA-256 | 1922fca1702919a985e0d03cd6e813a1ab64a1125cad7362097ca409173defa5
Solaris sadmind Command Execution
Posted Oct 28, 2009
Authored by H D Moore, cazz, vlad902 | Site metasploit.com

This exploit targets a weakness in the default security settings of the sadmind RPC application. This server is installed and enabled by default on most versions of the Solaris operating system. Vulnerable systems include solaris 2.7, 8, and 9.

tags | exploit
systems | solaris
advisories | CVE-2003-0722
SHA-256 | 14557b273499a2ea3ee86d39d208d2b582a750cf286e96ff62c3dd367eac0d64
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close