exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 50 RSS Feed

Files from Blake

First Active2009-08-18
Last Active2013-10-16
RSP MP3 Player OCX 3.2 Buffer Overflow
Posted Jul 10, 2010
Authored by Blake

RSP MP3 Player OCX version 3.2 Active-X buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 3d0a0bc431182c3fcaa739d3baf0a496aa0dc7678a087484e7b5f032ebc1ff21
FathFTP 1.7 Active-X Buffer Overflow
Posted Jul 8, 2010
Authored by Blake

FathFTP version 1.7 Active-X related buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow, activex
SHA-256 | 01a41482daf48e3a91954318f996d41afe5d1f127e64e65f9a1535c757964674
SasCam WebCam Server 2.6.5 Active-X SEH Overwrite
Posted Jul 3, 2010
Authored by Blake

SasCam WebCam Server version 2.6.5 active-x SEH overwrite exploit.

tags | exploit, activex
SHA-256 | 7682eed33084ff722efb279c14ba70f70770eb05739265590db53fd832d52e05
BlazeDVD 6.0 Buffer Overflow
Posted Jun 29, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a stack over flow in BlazeDVD 6.0. When the application is used to open a specially crafted plf file, a buffer is overwritten allowing for the execution of arbitrary code. Set the EXITFUNC to seh or thread for best results.

tags | exploit, overflow, arbitrary
SHA-256 | 20b53625776e3d05d3cc53ca7da6f22022e677d28aa8cc32656def27f00bfded
Subtitle Translation Wizard 3.0.0 Proof Of Concept
Posted Jun 23, 2010
Authored by Blake

Subtitle Translation Wizard version 3.0.0 SEH proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 53a08678d8d8e934aedd1d15dbc4def6e16432b41f85da05bdf3b9a5f802643b
Rosoft Audio Converter 4.4.4 Buffer Overflow
Posted Jun 16, 2010
Authored by Blake

Rosoft Audio Converter version 4.4.4 local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | 514a817d1b88a2a903b0d297b92466adbc5b58c3e2e06a4b5df4de68f591f3b1
IDEAL Migration 4.5.1 Buffer Overflow
Posted May 10, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a stack overflow in IDEAL Migration version 4.5.1. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | af79d6c56f666491c7e1f5ad8061f0e4d29e40cfdd4335819a5c37ce111973c0
Serenity Audio Player Buffer Overflow Exploit
Posted Apr 27, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a buffer overflow in Serenity AudioPlayer versions 3.2.3 and below. By creating a specially crafted m3u file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 90b764ce20a97ac5db9d88000ab1c1bfdf3d748439a4bc8447cf37721e97a64e
WM Downloader Buffer Overflow Exploit
Posted Apr 27, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a stack overflow in WM Downloader version 3.0.0.9. By creating a specially crafted .pls file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 9f415cdadbdf13029705c9166217c23da9ee0653c650f508c222a0d96d6b1a24
Shutter 0.1.4 Blind SQL Injection
Posted Mar 28, 2010
Authored by Blake

Shutter version 0.1.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d4e30ff91683c82e5e49dc80891f2302d15b65436d2800c58cb775f2ba19b9ab
Family Connections 2.2 SQL Injection
Posted Mar 16, 2010
Authored by Blake

Family Connections version 2.2 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 932e4fe173014b2cdd8cb18dcf76db76665998ad415fe10ccb70b1436c237db3
Open & Compact FTPd 1.2 Pre-Authentication Buffer Overflow
Posted Mar 16, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a stack overflow in the USER verb in Open & Compact FTPd version 1.2. The program will crash once the payload is sent, so bind shell payloads are not effective.

tags | exploit, overflow, shell
SHA-256 | 1ae431d61e50c5b14fa336ca601d49fc1d63997a3d2836735d649f9123e42bf4
PhpMyLogon 2 SQL Injection
Posted Mar 15, 2010
Authored by Blake

PhpMyLogon version 2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 762f8d8b23e1fe93b37f7e2d972a585697aed6700004c6057c8c7f341fed883f
Front Door 0.4b SQL Injection
Posted Mar 12, 2010
Authored by Blake

Front Door version 0.4b suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b2c66eaa97e44b3860d934d72b7d20699c091b2530ea4539e52bbe091eaa00e6
Easy~FTP Server v1.7.0.2 CWD Command Buffer Overflow
Posted Mar 9, 2010
Authored by Blake | Site metasploit.com

This Metasploit module exploits a stack overflow in the CWD verb in Easy~FTP Server. You must have valid credentials to trigger this vulnerability.

tags | exploit, overflow
SHA-256 | cfd458989a8afba7f91cf2e94e4d8e76b599cdf51bb3698d539c553eb90282e3
PHP File Sharing System 1.5.1 Directory Traversal / XSS / Shell Upload
Posted Mar 9, 2010
Authored by Blake

PHP File Sharing System version 1.5.1 suffers from cross site scripting, directory traversal and shell upload vulnerabilities.

tags | exploit, shell, php, vulnerability, xss, file inclusion, file upload
SHA-256 | 600f1ed6730a94bf662c8f2cd0a025a24138f69cab7f3cd1399623a951421d2a
YPOPS! 0.9.7.3 Buffer Overflow
Posted Jan 11, 2010
Authored by Blake

YPOPS! version 0.9.7.3 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | bf1e5d7241d94b4badf970524736139db9a20c92a95adf9bb48e45cefcc013fa
TFTgallery 0.13 Directory Traversal
Posted Nov 3, 2009
Authored by Blake

TFTgallery version 0.13 is susceptible to a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 5370fcca2282a413d7c5725544ed0dd09fef1ae46f8a2f1ae671c6f349ecee64
TFTgallery 0.13 Cross Site Scripting
Posted Oct 26, 2009
Authored by Blake

TFTgallery version 0.13 is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 63c864ab65c6626cd22619a37272b2397a4e4a8dfda92c12502c770de28ed5ca
Ada Image Server 0.6.6 SEH Overwrite
Posted Oct 8, 2009
Authored by Blake

Ada Image Server version 0.6.6 SEH overwrite exploit. Written in python. Binds a shell to port 4444.

tags | exploit, shell, python
SHA-256 | d87bfb3e20915566a05ab76213e11a737937addc368ddc45c29a3fc9b3288009
BigAnt Server 2.50 Buffer Overflow
Posted Sep 16, 2009
Authored by Blake

BigAnt server version 2.50 GET request buffer overflow exploit that spawns a shell on port 4444.

tags | exploit, overflow, shell
SHA-256 | 2a18b8c27c22b5848e54aed583ed0da892e6b3be2d25e6f17c5df52d7aa4efb5
Kolibri+ Webserver 2 Remote SEH Overwrite
Posted Sep 11, 2009
Authored by Blake

Kolibri+ Webserver 2 remote SEH overwrite exploit that makes use of a GET request.

tags | exploit, remote
SHA-256 | bd85f6c54f94bd9d250b9177a43c0b4734ade699bb08465bbc280de22b9acf1e
Audio Lib Player Buffer Overflow
Posted Sep 10, 2009
Authored by Blake

Audio Lib Player buffer overflow exploit that creates a malicious .m3u file. Binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | 7f097664a15702484907cde64b852cedd2d5e25e4e5390d7343648ee52bbecad
SIDVault 2.0e Buffer Overflow
Posted Sep 4, 2009
Authored by Blake

SIDVault version 2.0e Windows remote buffer overflow exploit. Binds a shell to port 4444.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | 9090278453847c904085bf60589c2b42fca976232134291c075f10e549e2403a
Playlistmaker 1.51 Buffer Overflow
Posted Aug 18, 2009
Authored by Blake

Playlistmaker version 1.51 local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | b53ca0611559fd94aaad83073b637144940f4645225b05797c42d057824b66bc
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close