Exploit the possiblities
Showing 1 - 22 of 22 RSS Feed

Files

ex_almail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of AL-Mail32 Ver1.10. It overflows when that receives the long message of From: or Reply-To:. If the POP3 server send the long reply message that contains the exploit code, client executes any code. This exploit code execute any command on the target windows.

tags | exploit, overflow
systems | windows
MD5 | bbb93b32d0fbcc24ab0bd8704e8d3ed6
ex_anhttpd.txt
Posted Nov 5, 1999
Authored by shadowpenguin

The test CGIs which are distributed with AN-HTTPd 1.20b contain the remote command execution problem.

tags | exploit, remote, cgi
systems | windows
MD5 | ee1ef9dca35316c2d83174c399085960
ex_chocoa.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of CHOCOA 1.0beta7R. It overflows when that receives the long TOPIC. If the server send the long TOPIC that contains the exploit code, client executes any code. This exploit code execute any command on the target windows.

tags | exploit, overflow
systems | windows
MD5 | 6d894b1c72bd7f83bb486b38132a9c97
ex_cmail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of CMail Server 2.3 SP2. It overflows when that receives the long MAIL FROM: in SMTP handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the CMail Server 2.3 SP2.

tags | exploit, overflow
systems | windows
MD5 | 4639d4625068233955e1ce9df9281ac7
ex_emc.c
Posted Nov 5, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

Buffer overflow in E-MailClub Ver1.0.0.5. It overflows when that receives the long From: in POP3 handling. If the host recives the mail which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example generates the e-mail which contains the exploit code that reboot the target host. This exploit is coded for Windows98 Japanese edition, but if you change some parameters written in the sample exploit program, it will may works on Windows95 and WindowsNT.

tags | exploit, overflow
systems | windows
MD5 | f1fa3e703ec2bd44f3d36fa744003039
ex_fuse.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of FuseMail 2.7. It overflows when that receives the long USER or PASS in POP3 handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the CMail FuseMail 2.7.

tags | exploit, overflow
systems | windows
MD5 | 84fd9aa0fb63734015ecee0164137530
ex_hpprint.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of IBM HomePagePrint 1.0.7. If the visitors "print" or "preview" the web page which contains the long IMG SRC tags, the buffer overflow occurs. If this application reads the IMG SRC tag which is contained the exploit code, the host will be cracked. This sample generates a HTML file which is contained the exploit code that executes any command on the users' host.

tags | exploit, web, overflow
systems | windows
MD5 | 2a77280e95e84112cb74a84234c723a8
ex_ie4.c
Posted Nov 5, 1999
Authored by shadowpenguin

Microsoft Internet Explorer 4/5 overflows when the handling of "file://" specification. We coded the following sample codes. This codes generates the HTML file that reboots the client PC if the visitor uses IE4 for Windows98.

tags | exploit, overflow
systems | windows
MD5 | 706d99f197cfd8f922486be4a951d4e1
ex_ie5.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is overflow exploit for IE5.

tags | exploit, overflow
systems | windows
MD5 | 6ac8ac08d5a0b80ab44588d211625499
ex_imagemap.c
Posted Nov 5, 1999
Authored by shadowpenguin

Imagemap CGI which is written by C language is distributed with OmniHTTPd Pro2.04(shareware) and Ver1.01 (freeware), it has a security hole by the buffer overflow. Any instructions can be executed on the victim host by using this buffer overflow bug.

tags | exploit, overflow, cgi
systems | windows
MD5 | b85e476f7a4a74c9fae25a19f31a3f46
ex_irfan.c
Posted Nov 5, 1999
Authored by shadowpenguin

The popular Image viewer "Irfan View32" contains the buffer overflow problem, this problem exists in the handling of Adobe Photoshop image file. This code generates the jpg file which contains the exploit code that generates "exp.com" in "c:\" and executes it. "exp.com" is a simple demo program, there is no danger.

tags | exploit, overflow
systems | windows
MD5 | 21678e1095ed9bf229ab8c6803678bfc
ex_midiplug.c
Posted Nov 5, 1999
Authored by shadowpenguin

Midi-Plugin program "YAMAHA MidiPlug 1.10b" for Windows IE4/5 contains the buffer overflow bug. If the long "TEXT" variable is specified in EMBED tag, the buffer overflow occurs. If attacker sets the exploit on the webpage, visitor's host will be cracked by the any instructions written in the "TEXT" variable.

tags | exploit, overflow
systems | windows
MD5 | 4e23d1169262502ad9b3b4bf27d33914
ex_netsrv.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of NetcPlus SmartServer3. It overflows when that receives the long MAIL FROM: in SMTP handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the NetcPlus SmartServer3. T

tags | exploit, overflow
systems | windows
MD5 | 3f7081e0719ded1a9b93b4fc3be98dc0
ex_nextftp.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of NextFTP Ver1.82. It overflows when that receives the long message of CWD reply. This exploit code execute any command on the target windows, but, if you modify the exploit code, you can send any codes such as the format or remove program, virus, trojan, and so on.

tags | exploit, overflow, trojan, virus
systems | windows
MD5 | db519da823a966c611543097194f6ba9
ex_pms-tr.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is another personal mail server remote exploit. I also publish the exploit program that can send a trojan program which is prepared in the attacker host. Of course, it can be executed remotely. If the trojan program is sent, the victim machine will be controlled remotely.

tags | exploit, remote, trojan
systems | windows
MD5 | 5a7a80b985fcb7d75f37d8728e5efca1
ex_pms.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of Personal Mail Server 3.072-3.09. It overflows when that receives the long MAIL FROM: in SMTP handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the Personal Mail Server 3.072-3.09

tags | exploit, overflow
systems | windows
MD5 | fa5e4b5e885182d96839287f68c08942
ex_servu.c
Posted Nov 5, 1999
Authored by shadowpenguin

The buffer overflow bug is also in Serv-U Versuin 2.5 ftp daemon. In this case, the buffer overflow is cased if the daemon recives the long "cwd" message, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the Serv-U Versuin 2.5. This exploit is coded for Windows98, but if you change some parameters written in the sample exploit program, it will may works on Windows95 and WindowsNT.

tags | exploit, overflow
systems | windows
MD5 | 72facf15fe83d5d0640ff44891043b28
ex_ssmail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of Skyfull Mail Server 1.1.4. It overflows when that receives the long MAIL FROM: in SMTP handling.If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the Skyfull Mail Server 1.1.4.

tags | exploit, overflow
systems | windows
MD5 | 8502506c28d3d225385b36a323f29376
ex_tinyftpd.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of TinyFTPd Ver0.51. It overflows when that receives the long user name. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the TinyFTPd Ver0.51.

tags | exploit, overflow
systems | windows
MD5 | 503a50eaf523c1944af65290fded53ab
ex_urllive.txt
Posted Nov 5, 1999
Authored by shadowpenguin

URL Live! 1.0 WebServer for Windows95/98/NT which is released by Pacific Software Publishing, Inc. (http://www.urllive.com/) has a "../" security problem, any users can download any files on the victim host.

tags | exploit, web
systems | windows
MD5 | 650b5d71e6650071a9028cd53b722d75
ex_webbbs.c
Posted Nov 5, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

At the initial authorization handling of WebBBS, If the long longin name or password has been received, this CGI overflows. This overflow overwrites the RET address, EIP can be controlled. This overflow is used to execute any instructions which are included in the user name and password.

tags | exploit, overflow, cgi
systems | windows
MD5 | 39f137e50459f957f97c268bb91c6bb0
ex_zommail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of ZOM-MAIL 1.09. It overflows when that receives the long attachment file name. If ZOM-MAIL 1.09 recives the e-mail which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This program can send the e-mail to any e-mail address, which is contained an exploit code that removes a "c:\windows\test.txt" file on the host.

tags | exploit, overflow
systems | windows
MD5 | b822ed6e20a939f6985ecd735ab98cf7
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close