what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

kmailbug.c
Posted Apr 9, 2001
Authored by Crashkiller

Remote buffer overflow exploit for Kmail, a mail client for KDE. Tested against kmail v1.0.29 and v1.0.20.

tags | exploit, remote, overflow
SHA-256 | f55166711a0a151507c36c9ae5b1a55081ad5bbd687b9780e99dbcb0964c7668

Related Files

Novell ZENworks Configuration Management Preboot Service 0x4c Buffer Overflow
Posted Jul 19, 2012
Authored by Luigi Auriemma, juan | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x4c (PROXY_CMD_PREBOOT_TASK_INFO2) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 / SP3 and Windows Server 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, tcp
systems | windows
advisories | CVE-2011-3176, OSVDB-80231
SHA-256 | eb8d23c0d1251c7dcb0480044c6de8f7f8d9c2d7e8de5b4a78afffe09b659c78
Novell ZENworks Configuration Management Preboot Service 0x6c Buffer Overflow
Posted Jul 19, 2012
Authored by Luigi Auriemma, juan | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x6c (PROXY_CMD_GET_NEXT_STEP) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 / SP3 and Windows Server 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, tcp
systems | windows
advisories | CVE-2011-3175, OSVDB-80231
SHA-256 | 7d25707a364b6e8cc80a0819d82a572cf3f8dd0815e6c1b374eaa52379c9f479
SimpleWebServer 2.2-rc2 Remote Buffer Overflow
Posted Jul 19, 2012
Authored by mr.pr0n

SimpleWebServer version 2.2-rc2 remote buffer overflow exploit that achieves code execution.

tags | exploit, remote, overflow, code execution
SHA-256 | d479bd8f4fea4bdf5c0972e056189d54814dde491f87ef49ea5a3093231a8ef1
Novell ZENworks Configuration Management Preboot Service 0x06 Buffer Overflow
Posted Jul 19, 2012
Authored by Stephen Fewer, juan | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management 10 SP2. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x06 (PROXY_CMD_CLEAR_WS) to the 998/TCP port. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 and Windows Server 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, tcp
systems | windows
advisories | OSVDB-65361
SHA-256 | d8e51661349a2d58c55ebba98e0aab7bf40252bcd11e9570670dbb09e98a4244
Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow
Posted Jul 19, 2012
Authored by Stephen Fewer, juan | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management 10 SP2. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x21 (PROXY_CMD_FTP_FILE) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 and Windows Server 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, tcp
systems | windows
advisories | OSVDB-65361
SHA-256 | 10965ccc1d7f3bdfb1cdc1edf6199b5eb01250bbec68ab0ee4cf54ba20262a61
Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020006 Buffer Overflow
Posted Jun 2, 2012
Authored by alino, juan vazquez | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020006 (GetObjetsRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

tags | exploit, remote, overflow, udp, code execution
systems | windows
advisories | OSVDB-75780
SHA-256 | e3c0a6f5b3a3f26ed4fb9bebaf9f0c8831cc32e99feb9f9583bae8d17e4829c2
Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020002 Buffer Overflow
Posted Jun 2, 2012
Authored by alino, juan vazquez | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

tags | exploit, remote, overflow, udp, code execution
systems | windows
advisories | OSVDB-75780
SHA-256 | 95742b6130c01a360fcb07725b756b00b4f683ebbfffb07615e116c0dbccde5f
Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020004 Buffer Overflow
Posted Jun 2, 2012
Authored by alino, juan vazquez | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020004 (GetBootRecordRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

tags | exploit, remote, overflow, udp, code execution
systems | windows
advisories | OSVDB-75780
SHA-256 | 48a0910b2afcd24f3d4c665d8c997a2e0fe577dffb6bca3c0ecace91c10b120f
MailMax 4.6 POP3 Buffer Overflow
Posted Mar 30, 2012
Authored by localh0t

MailMax versions 4.6 and below POP3 USER remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 14b8a1f5446fbce8f0033455b422da494838ebd8f710bfefe2e225cd86bde3c9
TRENDnet SecurView TV-IP121WN Wireless Internet Camera UltraMJCam Buffer Overflow
Posted Mar 29, 2012
Authored by rgod | Site retrogod.altervista.org

The TRENDnet SecurView TV-IP121WN wireless internet camera UltraMJCam active-x control suffers from an OpenFileDlg() WideCharToMultiByte remote buffer overflow. Proof of concept code included.

tags | exploit, remote, overflow, activex, proof of concept
systems | linux
SHA-256 | a1448bcd0d8740d3db37283f486bc15f2158a7b7818ccafbfc0569b5d3cb8984
Ricoh DC Software DL-10 FTP Server 1.1.0.6 Buffer Overflow
Posted Mar 22, 2012
Authored by Julien Ahrens

Ricoh DC Software DL-10 FTP server (SR10.exe) versions 1.1.0.6 and below remote buffer overflow proof of concept exploit that sends a malformed request.

tags | exploit, remote, overflow, proof of concept
SHA-256 | e13e1ecd389948511c8683234485d24ca0d9825e618486eaf3a184e64db4cf90
Dell Webcam CrazyTalk4Native.dll Buffer Overflow
Posted Mar 20, 2012
Authored by rgod | Site retrogod.altervista.org

The Dell Webcam software bundled active-x control CrazyTalk4Native.dll suffers from a remote buffer overflow vulnerability.

tags | exploit, remote, overflow, activex
SHA-256 | 4602832995fbcf6a2ccdc7e3b461f2c912eb866acd281ca2f1041eff63882cc0
Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020000 Buffer Overflow
Posted Feb 10, 2012
Authored by AbdulAziz Hariri | Site metasploit.com

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet to the 6905/UDP port. The module has been successfully tested on Windows Server 2003 SP2, Windows 7, and Windows XP SP3.

tags | exploit, remote, overflow, udp
systems | windows
advisories | OSVDB-75780
SHA-256 | 5d732951640be5f0d7a3bbb2123ba314dbfea24dfb6b7fe3d4aa47cf4fcea31a
CoDeSys 2.3 Buffer Overflow
Posted Dec 1, 2011
Authored by Celil Unuver

CoDeSys SCADA version 2.3 remote buffer overflow exploit that spawns a shell on port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 246e63e61f456255caf013a451fa1ec3a7bfd1fcb05a38899d181f2bf21a75d4
Wireshark 1.4.4 DECT Dissector Buffer Overflow
Posted Nov 23, 2011
Authored by ipv

Wireshark versions 1.4.4 and below DECT dissector remote buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2011-1591
SHA-256 | 91fcc95ca27f4ef01b2a8297dc35149955807464bfbe20fa97d69586760f6ff2
AbsoluteFTP 2.2.10 Buffer Overflow
Posted Nov 9, 2011
Authored by Node

AbsoluteFTP versions 1.9.6 through 2.2.10 remote buffer overflow exploit that leverages LIST.

tags | exploit, remote, overflow
SHA-256 | 872f01e2a854cf7a032dcfdef483fd45566641df3e165e3e32f59442959ff147
ScriptFTP 3.3 Remote Buffer Overflow
Posted Oct 10, 2011
Authored by mr_me, TecR0c | Site metasploit.com

AmmSoft's ScriptFTP client is susceptible to a remote buffer overflow vulnerability that is triggered when processing a sufficiently long filename during a FTP LIST command resulting in overwriting the exception handler. Social engineering of executing a specially crafted ftp file by double click will result in connecting to our malicious server and perform arbitrary code execution which allows the attacker to gain the same rights as the user running ScriptFTP.

tags | exploit, remote, overflow, arbitrary, code execution
advisories | CVE-2011-3976, OSVDB-75633
SHA-256 | 83a230051d7cd6708a4d86afbe83ebbe437a5ab42fac5587f0c6034133b2f3f5
KnFTP 1.0.0 USER Buffer Overflow
Posted Sep 19, 2011
Authored by mr.pr0n

KnFTP server version 1.0.0 remote buffer overflow exploit that leverages the USER command.

tags | exploit, remote, overflow
SHA-256 | ad1af12d60d187a995b54043229d49d25f922fbb2e08bf4d92ad939e4049bace
Bison FTP Server 3.5 Buffer Overflow
Posted Sep 4, 2011
Authored by KedAns-Dz

This Metasploit module exploits a remote buffer overflow in Bison FTP Server version 3.5. It leverages the XMKD, MKD, REST, and ACCL commands to cause a denial of service.

tags | exploit, remote, denial of service, overflow
SHA-256 | fd0d9f5b757bdeb86dbd65362248c57c98b61dddd1e7dd0d3a0594dc8339ff84
BisonFTP 3.5 Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz

BisonFTP server version 3.5 MKD remote buffer overflow crash exploit.

tags | exploit, remote, overflow
SHA-256 | 6157ac1b4d0108188bcfac3f9ccdadb47a302240c656b2fa5c72bfb65f934e09
Cerberus FTP Server 4.0.9.8 Buffer Overflow
Posted Sep 2, 2011
Authored by KedAns-Dz

Cerberus FTP Server version 4.0.9.8 REST remote buffer overflow crash exploit.

tags | exploit, remote, overflow
SHA-256 | 4ffb43902001c39a48c6ed0bb68c9a86be4f2acf228608af5c8b5dfb4e6c2a2d
Simple HTTPd 1.42 PUT Buffer Overflow
Posted Aug 15, 2011
Authored by nion

Simple HTTPd version 1.42 PUT request remote buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2011-2900
SHA-256 | 0252f9817102dd7dc326bcc8709a4f571708533f062b11b61019aeedce1db410
EChat Server 2.5 Buffer Overflow
Posted Aug 13, 2011
Authored by Juan Sacco

EChat Server versions 2.5 and below remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 5a3c92e65db932fc1ae8d33b82dcd54b99f4007305f90ef654948d67cc16f572
BisonFTP Server 3.5 Buffer Overflow
Posted Aug 11, 2011
Authored by localh0t

BisonFTP Server version 3.5 and below remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 1a88851fa0310e4f3e25543a4517d18bd038aecacb30feaebe7528df23dfe67b
HP Data Protector 6.11 Remote Buffer Overflow
Posted Jul 2, 2011
Authored by muts, dookie

HP Data Protector version 6.11 remote buffer overflow exploit with DEP bypass.

tags | exploit, remote, overflow
SHA-256 | 9e8e5a84de486e78b0670c124724bc4754ef8447902faec7f282f582cbf86f0c
Page 1 of 4
Back1234Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close