Twenty Year Anniversary
Showing 1 - 25 of 26 RSS Feed

Files from sickness

First Active2011-01-28
Last Active2017-12-13
Dup Scout Enterprise 10.0.18 Buffer Overflow
Posted Dec 13, 2017
Authored by sickness, Chris Higgins | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Dup Scout Enterprise version 10.0.18. The buffer overflow exists via the web interface during login. This gives NT AUTHORITY\SYSTEM access.

tags | exploit, web, overflow
MD5 | 26ff0f7d30dcb4009b02b3daa319c7bf
Dup Scout Enterprise 10.0.18 Buffer Overflow
Posted Nov 15, 2017
Authored by sickness

Dup Scout Enterprise version 10.0.18 'Login' buffer overflow exploit.

tags | exploit, overflow
MD5 | 790e2c3309e345ffb151e91188c0384a
Disk Pulse Enterprise 10.0.12 GET Buffer Overflow
Posted Sep 26, 2017
Authored by sickness

Disk Pulse Enterprise version 10.0.12 GET buffer overflow SEH exploit.

tags | exploit, overflow
MD5 | 36b790c3356a4fa721b0bd092dc61b0f
Internet Explorer 8 Fixed Col Span ID Full ASLR, DEP, And EMET 5.0 Bypass
Posted Sep 29, 2014
Authored by sickness, ryujin

Internet Explorer 8 fixed col span ID full ASLR, DEP, and EMET 5.0 bypass exploit that leverages the issue outlined in MS12-037.

tags | exploit, bypass
advisories | CVE-2012-1876
MD5 | 7d28f375517fbc935fe27864665a6455
Symantec Endpoint Protection 11.x / 12.x Kernel Pool Overflow
Posted Aug 5, 2014
Authored by Matteo Memelli, sickness

Symantec Endpoint Protection versions 11.x and 12.x suffer from a kernel pool overflow vulnerability.

tags | exploit, overflow, kernel
advisories | CVE-2014-3434
MD5 | f34e94fc45f69fbf037858196c0221b6
Internet Explorer 8 Bypass
Posted Jul 1, 2014
Authored by sickness

Internet Explorer 8 fixed col span ID full ASLR, DEP, and EMET 4.1.x bypass exploit.

tags | exploit, bypass
advisories | CVE-2012-1876, OSVDB-82866
MD5 | 25c24888c898edf0098c39bf2befbabe
Novell Client 2 SP3 Privilege Escalation
Posted Jul 29, 2013
Authored by sickness

Novell Client 2 SP3 suffers from a privilege escalation vulnerability.

tags | exploit
advisories | OSVDB-93718
MD5 | d55894615a747624ade14ec16b1b6feb
Internet Explorer 8 Heap Overflow
Posted Jan 11, 2013
Authored by sickness

Internet Explorer 8 heap overflow exploit with ASLR and DEP bypass that spawns a bind shell on port 4444.

tags | exploit, overflow, shell
advisories | CVE-2012-1876
MD5 | 318bf5718bdfe80a5c3f1a9d1fbcc2a6
Novell Client 4.91 SP3/4 Privilege Escalation
Posted May 23, 2012
Authored by sickness

Novell Client version 4.91 SP3/4 privilege escalation exploit for Win2K3 and WinXP.

tags | exploit
systems | windows, xp
advisories | CVE-2007-5762
MD5 | e59e74f4b1cab13f13403229646f8b01
Wireshark 1.4.4 Remote Stack Buffer Overflow
Posted Feb 2, 2012
Authored by Paul Makowski, sickness | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Wireshark versions 1.4.4 and below by sending an malicious packet.

tags | exploit, overflow
advisories | CVE-2011-1591, OSVDB-71848
MD5 | acdf688cdd507f2928b4f39c4fe84030
Wireshark 1.4.4 Local Stack Buffer Overflow
Posted Feb 2, 2012
Authored by Paul Makowski, sickness | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Wireshark versions 1.4.4 and below. When opening a malicious .pcap file in Wireshark, a stack buffer overflow occurs, resulting in arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2011-1591, OSVDB-71848
MD5 | db004e8e710819d322cb853734c2336a
DVD X Player 5.5 .plf PlayList Buffer Overflow
Posted Sep 2, 2011
Authored by n00b, sinn3r, sickness | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow on DVD X Player 5.5 Pro and Standard. By supplying a long string of data in a plf file (playlist), the MediaPlayerCtrl.dll component will attempt to extract a filename out of the string, and then copy it on the stack without any proper bounds checking, which causes a buffer overflow, and results arbitrary code execution under the context of the user. This Metasploit module has been designed to target common Windows systems such as: Windows XP SP2/SP3, Windows Vista, and Windows 7.

tags | exploit, overflow, arbitrary, code execution
systems | windows, xp, vista, 7
advisories | CVE-2007-3068, OSVDB-36956
MD5 | 8d32c2e58191795b07f93bda0d49f7d6
DVD X Player 5.5.0 Pro / Standard Buffer Overflow
Posted Aug 30, 2011
Authored by sickness

DVD X Player version 5.5.0 Pro / Standard buffer overflow universal exploit with DEP and ASLR bypass.

tags | exploit, overflow
MD5 | 012c7f717d92e217110e8ee5b698992f
Linux Exploit Development Part 4
Posted May 15, 2011
Authored by sickness

Whitepaper called Linux exploit development part 4 - ASCII armor bypass + return-to-plt.

tags | paper, bypass
systems | linux
MD5 | 17178f2b96395b69446515c494327944
Linux Exploit Writing Tutorial Part 3 Revision 2
Posted Apr 23, 2011
Authored by sickness

This whitepaper is the Linux Exploit Writing Tutorial Part 3 - ret2libc. This is revision 2 of this paper.

tags | paper
systems | linux
MD5 | 6cba379b8f618445e06fdbcd9217bd74
Wireshark 1.4.4 packet-dect.c Stack Buffer Overflow
Posted Apr 19, 2011
Authored by corelanc0d3r, sickness | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Wireshark versions 1.4.4 and below. When opening a malicious .pcap file in Wireshark, a stack buffer overflow occurs, resulting in arbitrary code execution. This exploit bypasses DEP and ASLR and works on XP, Vista & Windows 7.

tags | exploit, overflow, arbitrary, code execution
systems | windows, 7
advisories | CVE-2011-1591, OSVDB-71848
MD5 | a5deb27f59ac34243335eeaf00573514
Wireshark 1.4.4 SEH Overflow
Posted Apr 18, 2011
Authored by sickness

Wireshark versions 1.4.1 through 1.4.4 SEH overflow exploit that spawns calc.exe.

tags | exploit, overflow
MD5 | 68d2fcfe93eed1f7e7f10c3151f96b6f
Linux Exploit Development Part 2 Rev 2
Posted Apr 12, 2011
Authored by sickness

Whitepaper called Linux Exploit Development Part 2 (rev 2) - Real app demo. It demonstrates the techniques discussed in part two of the Linux Exploit Writing Tutorial Part 2.

tags | paper
systems | linux
MD5 | cf20f8edb7d69172ac14a7b9fa599b6b
Linux Exploit Writing Tutorial Part 3
Posted Apr 12, 2011
Authored by sickness

This whitepaper is the Linux Exploit Writing Tutorial Part 3 - ret2libc.

tags | paper
systems | linux
MD5 | 0955a6a25e968b63d3f5ce8fe931a7ac
Linux Exploit Writing Tutorial Part 2
Posted Mar 26, 2011
Authored by sickness

This whitepaper is the Linux Exploit Writing Tutorial Part 2 - Stack Overflow ASLR bypass using ret2reg instruction from vulnerable_1.

tags | paper, overflow, bypass
systems | linux
MD5 | 9e26d6a118475de7d7aeed6e04c4622c
Linux Exploit Writing Tutorial Part 1
Posted Mar 19, 2011
Authored by sickness

This whitepaper is the Linux Exploit Writing Tutorial Part 1 - Stack Overflows.

tags | paper, overflow
systems | linux
MD5 | f61a3da7ba8a3c7c64ed4e13e6d3c97a
Elecard AVC_HD/MPEG Player 5.7 Buffer Overflow
Posted Feb 27, 2011
Authored by sickness

Elecard AVC_HD/MPEG Player version 5.7 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
MD5 | fe04e3f60138da0411d836cba9fd7fc6
MoviePlay 4.82 Buffer Overflow
Posted Feb 11, 2011
Authored by sickness

MoviePlay version 4.82 buffer overflow exploit that creates a malicious .lst file.

tags | exploit, overflow
MD5 | 8d22430bf0e6783487603176e2999b17
Exploit Writing Made Easier With !pvefindaddr
Posted Feb 7, 2011
Authored by sickness

Whitepaper called Exploit Writing Made Easier With !pvefindaddr.

tags | paper
MD5 | b257e300a532e8ef8e76da198c46b93f
AOL Desktop 9.6 Buffer Overflow
Posted Feb 3, 2011
Authored by sickness

AOL Desktop version 9.6 buffer overflow exploit that creates a malicious .rtx file.

tags | exploit, overflow
MD5 | 62cd12642cc40202ff417146505a6cef
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    7 Files
  • 23
    Jun 23rd
    2 Files
  • 24
    Jun 24th
    1 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close