exploit the possibilities
Showing 1 - 25 of 25 RSS Feed

Files from modpr0be

First Active2010-06-19
Last Active2018-12-11
CyberLink LabelPrint 2.5 Stack Buffer Overflow
Posted Dec 11, 2018
Authored by modpr0be, f3ci | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This Metasploit module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).

tags | exploit, overflow
systems | windows, 7
advisories | CVE-2017-14627
MD5 | acb856f3a5d193a4fad88b2e1c8c5548
Zahir Enterprise Plus 6 Stack Buffer Overflow
Posted Oct 5, 2018
Authored by modpr0be, f3ci | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Zahir Enterprise Plus version 6 build 10b and below. The vulnerability is triggered when opening a CSV file containing CR/LF and overly long string characters via Import from other File. This results in overwriting a structured exception handler record.

tags | exploit, overflow
advisories | CVE-2018-17408
MD5 | cfd4757165bcf0b8e10de824abd789c6
Zahir Enterprise Plus 6 Build 10b Buffer Overflow
Posted Oct 1, 2018
Authored by modpr0be

Zahir Enterprise Plus 6 build 10b suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 940b18da86b7a956a51795fe2948d218
Centreon 2.3.x SQL Injection
Posted Dec 13, 2012
Authored by modpr0be

Centreon versions 2.3.3 through 2.3.9-4 menuXML.php remote blind SQL injection exploit.

tags | exploit, remote, php, sql injection
advisories | CVE-2012-5967
MD5 | c54a11254bc5911e13270c3b4e825152
Trend Micro Control Manager 5.5 / 6.0 Blind SQL Injection
Posted Sep 27, 2012
Authored by modpr0be, otoy

Trend Micro Control Manager versions 5.5 and 6.0 suffer from an AdHocQuery remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2012-2998
MD5 | 56f0a5421206e687e52f760ad196651e
webERP 4.08.4 SQL Injection
Posted Sep 17, 2012
Authored by modpr0be

webERP versions 4.08.4 and below suffer from a remote SQL injection vulnerability in WorkOrderEntry.php.

tags | exploit, remote, php, sql injection
MD5 | 2a3998114ad72d6a96fecf4ba7fa6e27
Trend Micro InterScan Messaging Security Suite XSS / CSRF
Posted Sep 15, 2012
Authored by modpr0be

Trend Micro InterScan Messaging Security Suite suffers from stored cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2012-2995, CVE-2012-2996
MD5 | 11bd6fad231e403fae6e563be0b09725
ALLMediaServer 0.8 Buffer Overflow
Posted Jul 16, 2012
Authored by modpr0be, juan vazquez, motaz reda | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in ALLMediaServer 0.8. The vulnerability is caused due to a boundary error within the handling of HTTP request. While the exploit supports DEP bypass via ROP, on Windows 7 the stack pivoting isn't reliable across virtual (VMWare, VirtualBox) and physical environments. Because of this the module isn't using DEP bypass on the Windows 7 SP1 target, where by default DEP is OptIn and AllMediaServer won't run with DEP.

tags | exploit, web, overflow
systems | windows, 7
MD5 | 59ea30c205258988554bd473b89706e9
EZHomeTech EzServer 6.4.017 Stack Buffer Overflow
Posted Jun 19, 2012
Authored by modpr0be | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the EZHomeTech EZServer. If a malicious user sends packets containing an overly long string, it may be possible to execute a payload remotely. Due to size constraints, this module uses the Egghunter technique.

tags | exploit, overflow
MD5 | 9c0e617228c2281179aad5fb2284756a
Ezhometech Ezserver 6.4 Stack Overflow
Posted Jun 19, 2012
Authored by modpr0be

Ezhometech Ezserver versions 6.4 and below stack buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
MD5 | 37da3ca2a88bac7501228d78f10c734e
Hexamail Server 4.4.5 Cross Site Scripting
Posted Jun 4, 2012
Authored by modpr0be

Hexamail Server versions 4.4.5 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 48ab187117a6905f5336e8ba7299fc8c
QuickShare File Share 1.2.1 Directory Traversal
Posted May 27, 2012
Authored by sinn3r, modpr0be | Site metasploit.com

This Metasploit module exploits a vulnerability found in QuickShare File Share's FTP service. By supplying "../" in the file path, it is possible to trigger a directory traversal flaw, allowing the attacker to read a file outside the virtual directory. By default, the "Writable" option is enabled during account creation, therefore this makes it possible to create a file at an arbitrary location, which leads to remote code execution.

tags | exploit, remote, arbitrary, code execution
advisories | OSVDB-70776
MD5 | f232667933a9b74318156ffe27e5e96c
Distinct TFTP 3.01 Writable Directory Traversal Execution
Posted May 11, 2012
Authored by sinn3r, modpr0be | Site metasploit.com

This Metasploit module exploits a vulnerability found in Distinct TFTP server. The software contains a directory traversal vulnerability that allows a remote attacker to write arbitrary file to the file system, which results in code execution under the context of 'SYSTEM'.

tags | exploit, remote, arbitrary, code execution
advisories | OSVDB-80984
MD5 | 4b981d0c04919b8a8ad909c7b29a180d
CyberLink Power2Go Stack Buffer Overflow
Posted Apr 18, 2012
Authored by mr_me, modpr0be | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in CyberLink Power2Go version 8.x. The vulnerability is triggered when opening a malformed p2g file containing an overly long string in the 'name' attribute of the file element. This results in overwriting a structured exception handler record.

tags | exploit, overflow
advisories | OSVDB-70600
MD5 | 6f60db215db0d38c85d08e9138043d6c
CyberLink Stack Buffer Overflow
Posted Dec 9, 2011
Authored by modpr0be

Multiple CyberLink products suffer a file project handling stack buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 40c4212ec2b7b74593f44d50562a722b
Aviosoft Digital TV Player Professional 1.0 Buffer Overflow
Posted Nov 13, 2011
Authored by sinn3r, modpr0be | Site metasploit.com

This Metasploit module exploits a vulnerability found in Aviosoft Digital TV Player Pro version 1.x. An overflow occurs when the process copies the content of a playlist file on to the stack, which may result arbitrary code execution under the context of the user.

tags | exploit, overflow, arbitrary, code execution
advisories | OSVDB-77043
MD5 | c8694f3cd7fe6c011444f94229d8e73a
Aviosoft Digital TV Player Professional 1.x Buffer Overflow
Posted Nov 9, 2011
Authored by modpr0be

Aviosoft Digital TV Player Professional version 1.x stack buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
MD5 | f4beae934cde090009a3740b70e26d08
BlazeVideo HDTV Player 6.6 Professional Buffer Overflow
Posted Oct 7, 2011
Authored by modpr0be

BlazeVideo HDTV Player version 6.6 Professional universal DEP and ASLR bypass buffer overflow exploit.

tags | exploit, overflow
MD5 | 90b1a0d63e5c0d3724d0772541a6de97
ScriptFTP 3.3 Buffer Overflow
Posted Sep 21, 2011
Authored by modpr0be

ScriptFTP versions 3.3 and below suffer from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | acb73347ac255641916b16c44e31b839
QuickShare File Share 1.2.1 Directory Traversal
Posted Feb 3, 2011
Authored by modpr0be

QuickShare File Share version 1.2.1 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | 0b8f50c6550aa0377785b09f3c0f12be
FTPGetter 3.58.0.21 Buffer Overflow
Posted Feb 3, 2011
Authored by modpr0be

FTPGetter version 3.58.0.21 buffer overflow PASV exploit.

tags | exploit, overflow
MD5 | aa5c448584af285155cb1c410ebe8c0e
BS.Player 2.56 Denial Of Service
Posted Sep 28, 2010
Authored by modpr0be

BS.Player version 2.56 (Build 1043) denial of service exploit that can create malicious .m3u and .pls files.

tags | exploit, denial of service
MD5 | 3bca1817a68731f762c74595004cdb37
MediaHuman Music COnverter 1.0.1 Denial Of Service
Posted Sep 18, 2010
Authored by modpr0be

MediaHuman Music Converter version 1.0.1 suffers from .wav and .mp3 denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
MD5 | a5338a3713e6db9312a215762d56eb10
A-PDF All To MP3 Coverter 1.1.0 Universal Exploit
Posted Sep 18, 2010
Authored by modpr0be

A-PDF All to MP3 Converter version 1.1.0 universal SEH overwrite exploit.

tags | exploit
MD5 | 81f13aef1403f9fe64ce3ebefa579fa5
Batch Audio Converter Lite Edition 1.0.0.0 Buffer Overflow
Posted Jun 19, 2010
Authored by modpr0be

Batch Audio Converter Lite Edition versions 1.0.0.0 and below stack buffer overflow exploit.

tags | exploit, overflow
MD5 | dc5c7142e83662a51bca3bc446c84fc0
Page 1 of 1
Back1Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close