exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files from modpr0be

First Active2010-06-19
Last Active2018-12-11
CyberLink LabelPrint 2.5 Stack Buffer Overflow
Posted Dec 11, 2018
Authored by modpr0be, f3ci | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This Metasploit module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).

tags | exploit, overflow
systems | windows
advisories | CVE-2017-14627
SHA-256 | 5b93e4f728713e374facd865bf3645e22f45dbb6fc5e1b5e6aac4c62197b922c
Zahir Enterprise Plus 6 Stack Buffer Overflow
Posted Oct 5, 2018
Authored by modpr0be, f3ci | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Zahir Enterprise Plus version 6 build 10b and below. The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters via Import from other File. This results in overwriting a structured exception handler record.

tags | exploit, overflow
advisories | CVE-2018-17408
SHA-256 | c51c1d1c21392204bf387a607e386388a6773f8a710db6706b904d643e98b8f9
Zahir Enterprise Plus 6 Build 10b Buffer Overflow
Posted Oct 1, 2018
Authored by modpr0be

Zahir Enterprise Plus 6 build 10b suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 6cd7f06f5f8babde60b5020ba2bff8010c6891ee9e61e0a2cdee4f0f7f78d0b1
Centreon 2.3.x SQL Injection
Posted Dec 13, 2012
Authored by modpr0be

Centreon versions 2.3.3 through 2.3.9-4 menuXML.php remote blind SQL injection exploit.

tags | exploit, remote, php, sql injection
advisories | CVE-2012-5967
SHA-256 | d04b644c764a41f28eca2c71a041e69645a678273c302fafa28bfe8fac2f9c4a
Trend Micro Control Manager 5.5 / 6.0 Blind SQL Injection
Posted Sep 27, 2012
Authored by modpr0be, otoy

Trend Micro Control Manager versions 5.5 and 6.0 suffer from an AdHocQuery remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2012-2998
SHA-256 | ce96999e810814c024c38533c2b23e3e57c9c4a4b441314fa7e4c4133f539757
webERP 4.08.4 SQL Injection
Posted Sep 17, 2012
Authored by modpr0be

webERP versions 4.08.4 and below suffer from a remote SQL injection vulnerability in WorkOrderEntry.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6a3662b7c29717d2a88024524394dbdf12cf57e1da607c8a6457fcc3b5244904
Trend Micro InterScan Messaging Security Suite XSS / CSRF
Posted Sep 15, 2012
Authored by modpr0be

Trend Micro InterScan Messaging Security Suite suffers from stored cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2012-2995, CVE-2012-2996
SHA-256 | d86efa1d88ecdbb7560b3e29adb1a12d5b6a2953d61809ccae4d56fd757440dc
ALLMediaServer 0.8 Buffer Overflow
Posted Jul 16, 2012
Authored by modpr0be, juan vazquez, motaz reda | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in ALLMediaServer 0.8. The vulnerability is caused due to a boundary error within the handling of HTTP request. While the exploit supports DEP bypass via ROP, on Windows 7 the stack pivoting isn't reliable across virtual (VMWare, VirtualBox) and physical environments. Because of this the module isn't using DEP bypass on the Windows 7 SP1 target, where by default DEP is OptIn and AllMediaServer won't run with DEP.

tags | exploit, web, overflow
systems | windows
SHA-256 | cd224eb091bd83cac2f6867238fdeea0e253250295ed9b0257c0173e71de0311
EZHomeTech EzServer 6.4.017 Stack Buffer Overflow
Posted Jun 19, 2012
Authored by modpr0be | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the EZHomeTech EZServer. If a malicious user sends packets containing an overly long string, it may be possible to execute a payload remotely. Due to size constraints, this module uses the Egghunter technique.

tags | exploit, overflow
SHA-256 | 2bc92ff43f6bcca9c19f782162fc5db7f333fc90bad8a57b6c286fccae52a802
Ezhometech Ezserver 6.4 Stack Overflow
Posted Jun 19, 2012
Authored by modpr0be

Ezhometech Ezserver versions 6.4 and below stack buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | 0a3c7b30433e99d4e5b31ad439b1616f357b9a2b87934bff537c85f76e8698e9
Hexamail Server 4.4.5 Cross Site Scripting
Posted Jun 4, 2012
Authored by modpr0be

Hexamail Server versions 4.4.5 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 160e361b2554abab89535e34bcabe535be38225dbc0d072c307a624af2a5e429
QuickShare File Share 1.2.1 Directory Traversal
Posted May 27, 2012
Authored by sinn3r, modpr0be | Site metasploit.com

This Metasploit module exploits a vulnerability found in QuickShare File Share's FTP service. By supplying "../" in the file path, it is possible to trigger a directory traversal flaw, allowing the attacker to read a file outside the virtual directory. By default, the "Writable" option is enabled during account creation, therefore this makes it possible to create a file at an arbitrary location, which leads to remote code execution.

tags | exploit, remote, arbitrary, code execution
advisories | OSVDB-70776
SHA-256 | 6ec3545a1080c917dedf3c676152c00eb53f82eef025b7df8d5bd1ad6fb56805
Distinct TFTP 3.01 Writable Directory Traversal Execution
Posted May 11, 2012
Authored by sinn3r, modpr0be | Site metasploit.com

This Metasploit module exploits a vulnerability found in Distinct TFTP server. The software contains a directory traversal vulnerability that allows a remote attacker to write arbitrary file to the file system, which results in code execution under the context of 'SYSTEM'.

tags | exploit, remote, arbitrary, code execution
advisories | OSVDB-80984
SHA-256 | f9ed713ff3be483dd14a09fbef83afaa998846ace3aab19c3588c2a752aaa832
CyberLink Power2Go Stack Buffer Overflow
Posted Apr 18, 2012
Authored by mr_me, modpr0be | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in CyberLink Power2Go version 8.x. The vulnerability is triggered when opening a malformed p2g file containing an overly long string in the 'name' attribute of the file element. This results in overwriting a structured exception handler record.

tags | exploit, overflow
advisories | OSVDB-70600
SHA-256 | 130e60095a57a3b069f09bfa02ddc5fe4743b86427ffcaf33f1f4cc77609b845
CyberLink Stack Buffer Overflow
Posted Dec 9, 2011
Authored by modpr0be

Multiple CyberLink products suffer a file project handling stack buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 47ae6efc123ab0a2d65e2470e0618b50d536f33edb978f5e8d4680db0541507b
Aviosoft Digital TV Player Professional 1.0 Buffer Overflow
Posted Nov 13, 2011
Authored by sinn3r, modpr0be | Site metasploit.com

This Metasploit module exploits a vulnerability found in Aviosoft Digital TV Player Pro version 1.x. An overflow occurs when the process copies the content of a playlist file on to the stack, which may result arbitrary code execution under the context of the user.

tags | exploit, overflow, arbitrary, code execution
advisories | OSVDB-77043
SHA-256 | 40796a9ff8ef6ef45d0fa1a9d3f0de273180cbc7d8cbb49f00ac35473f6640a3
Aviosoft Digital TV Player Professional 1.x Buffer Overflow
Posted Nov 9, 2011
Authored by modpr0be

Aviosoft Digital TV Player Professional version 1.x stack buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
SHA-256 | dcacb9fec63a2e9898a6a4280beea67758dc693f42d4b3d3c4f4a587825aa14b
BlazeVideo HDTV Player 6.6 Professional Buffer Overflow
Posted Oct 7, 2011
Authored by modpr0be

BlazeVideo HDTV Player version 6.6 Professional universal DEP and ASLR bypass buffer overflow exploit.

tags | exploit, overflow
SHA-256 | cd503a7eb1398e42493c9c50930545257e289549f4b450834e2fd5e2a62499ff
ScriptFTP 3.3 Buffer Overflow
Posted Sep 21, 2011
Authored by modpr0be

ScriptFTP versions 3.3 and below suffer from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 4c3d7bd282a71bbc0d04ab728ecd6d649b96ed1e7f9337d132ef2569f82dde80
QuickShare File Share 1.2.1 Directory Traversal
Posted Feb 3, 2011
Authored by modpr0be

QuickShare File Share version 1.2.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d7ed75e1d802259579a6e45360cb55024fc8640a7eee5794fb64b8a33fd89152
FTPGetter 3.58.0.21 Buffer Overflow
Posted Feb 3, 2011
Authored by modpr0be

FTPGetter version 3.58.0.21 buffer overflow PASV exploit.

tags | exploit, overflow
SHA-256 | 0fd21df550d9c2c1d42fdcf6b62b41c882ba373c78788b0e3f9bf34885f83d93
BS.Player 2.56 Denial Of Service
Posted Sep 28, 2010
Authored by modpr0be

BS.Player version 2.56 (Build 1043) denial of service exploit that can create malicious .m3u and .pls files.

tags | exploit, denial of service
SHA-256 | f5354b4c39398d0c5cbe4e3d643f4a08d1282f57e0101e5b6905431e527a5cb0
MediaHuman Music COnverter 1.0.1 Denial Of Service
Posted Sep 18, 2010
Authored by modpr0be

MediaHuman Music Converter version 1.0.1 suffers from .wav and .mp3 denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | 49de5f7d7f2ab9b63ac7c0a0f944ab60335f419fbb054e0cf33fa66a6a0e606d
A-PDF All To MP3 Coverter 1.1.0 Universal Exploit
Posted Sep 18, 2010
Authored by modpr0be

A-PDF All to MP3 Converter version 1.1.0 universal SEH overwrite exploit.

tags | exploit
SHA-256 | 3f2a1e14578e7f0b16bdaf7c345ff3f4e5b23a857542542f9875c0de6d4f9e47
Batch Audio Converter Lite Edition 1.0.0.0 Buffer Overflow
Posted Jun 19, 2010
Authored by modpr0be

Batch Audio Converter Lite Edition versions 1.0.0.0 and below stack buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 55f9de422b17a2e4ab8c50f079c1e3564b943b40addd11d3087fc08d2de92e3d
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close