exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files

ex_almail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of AL-Mail32 Ver1.10. It overflows when that receives the long message of From: or Reply-To:. If the POP3 server send the long reply message that contains the exploit code, client executes any code. This exploit code execute any command on the target windows.

tags | exploit, overflow
systems | windows
SHA-256 | 707e8900f91b20b7c4ce906c63a00e36b79aa06a48654a492b594792e64b7447
ex_anhttpd.txt
Posted Nov 5, 1999
Authored by shadowpenguin

The test CGIs which are distributed with AN-HTTPd 1.20b contain the remote command execution problem.

tags | exploit, remote, cgi
systems | windows
SHA-256 | 2b6555ec7dadb833a618b2504a1b544225684da50219f4b22cbe90e83f51425b
ex_chocoa.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of CHOCOA 1.0beta7R. It overflows when that receives the long TOPIC. If the server send the long TOPIC that contains the exploit code, client executes any code. This exploit code execute any command on the target windows.

tags | exploit, overflow
systems | windows
SHA-256 | 1d808b55df808f181f7c029bf9268dfc7cd5c39061fb3906cefe50db633b1825
ex_cmail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of CMail Server 2.3 SP2. It overflows when that receives the long MAIL FROM: in SMTP handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the CMail Server 2.3 SP2.

tags | exploit, overflow
systems | windows
SHA-256 | c5662e8f3a1f97a425d8e0c04ec0eb3a1a5d42a218a8a4a487fe02fc9ace09fd
ex_emc.c
Posted Nov 5, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

Buffer overflow in E-MailClub Ver1.0.0.5. It overflows when that receives the long From: in POP3 handling. If the host recives the mail which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example generates the e-mail which contains the exploit code that reboot the target host. This exploit is coded for Windows98 Japanese edition, but if you change some parameters written in the sample exploit program, it will may works on Windows95 and WindowsNT.

tags | exploit, overflow
systems | windows
SHA-256 | eb5bb461b617975286628c613e3683c4e15675996639c870d9fababc85a7a212
ex_fuse.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of FuseMail 2.7. It overflows when that receives the long USER or PASS in POP3 handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the CMail FuseMail 2.7.

tags | exploit, overflow
systems | windows
SHA-256 | 309610ace7f1c7fb6114ed72658bed907b4988c547c4ac6b184fd6b386bdd773
ex_hpprint.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of IBM HomePagePrint 1.0.7. If the visitors "print" or "preview" the web page which contains the long IMG SRC tags, the buffer overflow occurs. If this application reads the IMG SRC tag which is contained the exploit code, the host will be cracked. This sample generates a HTML file which is contained the exploit code that executes any command on the users' host.

tags | exploit, web, overflow
systems | windows
SHA-256 | 5b41c9cf0b6067f3542e27cb0432a55a0de1c7f63f761bf8d438001347254958
ex_ie4.c
Posted Nov 5, 1999
Authored by shadowpenguin

Microsoft Internet Explorer 4/5 overflows when the handling of "file://" specification. We coded the following sample codes. This codes generates the HTML file that reboots the client PC if the visitor uses IE4 for Windows98.

tags | exploit, overflow
systems | windows
SHA-256 | 042079790a6a4e9b858fb430e1f60928c5954d79784d84570c99351187dc48e4
ex_ie5.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is overflow exploit for IE5.

tags | exploit, overflow
systems | windows
SHA-256 | af06e379b7a306fde53304718b7a6241229b6901fa31f4561c882f3b0b99c9d2
ex_imagemap.c
Posted Nov 5, 1999
Authored by shadowpenguin

Imagemap CGI which is written by C language is distributed with OmniHTTPd Pro2.04(shareware) and Ver1.01 (freeware), it has a security hole by the buffer overflow. Any instructions can be executed on the victim host by using this buffer overflow bug.

tags | exploit, overflow, cgi
systems | windows
SHA-256 | 23049799fe2224b9687d2345582b6e2e023c1ecd39d0e9ef35a33a70b0a2fc7d
ex_irfan.c
Posted Nov 5, 1999
Authored by shadowpenguin

The popular Image viewer "Irfan View32" contains the buffer overflow problem, this problem exists in the handling of Adobe Photoshop image file. This code generates the jpg file which contains the exploit code that generates "exp.com" in "c:\" and executes it. "exp.com" is a simple demo program, there is no danger.

tags | exploit, overflow
systems | windows
SHA-256 | 5a4c0197a83f99d759c5a6f2d4a089f21af960881b1053185810e9ea7530d600
ex_midiplug.c
Posted Nov 5, 1999
Authored by shadowpenguin

Midi-Plugin program "YAMAHA MidiPlug 1.10b" for Windows IE4/5 contains the buffer overflow bug. If the long "TEXT" variable is specified in EMBED tag, the buffer overflow occurs. If attacker sets the exploit on the webpage, visitor's host will be cracked by the any instructions written in the "TEXT" variable.

tags | exploit, overflow
systems | windows
SHA-256 | 2a70605bc9b04a24265c00812b131cf21426f0181e4073c6572a7373e6ba4550
ex_netsrv.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of NetcPlus SmartServer3. It overflows when that receives the long MAIL FROM: in SMTP handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the NetcPlus SmartServer3. T

tags | exploit, overflow
systems | windows
SHA-256 | 49069946261916158d6a9396a9ecd8ea197a8009a2efbd25d17a2127840d6082
ex_nextftp.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of NextFTP Ver1.82. It overflows when that receives the long message of CWD reply. This exploit code execute any command on the target windows, but, if you modify the exploit code, you can send any codes such as the format or remove program, virus, trojan, and so on.

tags | exploit, overflow, trojan, virus
systems | windows
SHA-256 | 47d7736f87fb1530ec150962846999918098ac81ec6b671d35f46b6d4f89c748
ex_pms-tr.c
Posted Nov 5, 1999
Authored by shadowpenguin

This is another personal mail server remote exploit. I also publish the exploit program that can send a trojan program which is prepared in the attacker host. Of course, it can be executed remotely. If the trojan program is sent, the victim machine will be controlled remotely.

tags | exploit, remote, trojan
systems | windows
SHA-256 | 1af18d870379d2efed6f956b9fbb2f89036673b7b62305dd1f0f23b667612eba
ex_pms.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of Personal Mail Server 3.072-3.09. It overflows when that receives the long MAIL FROM: in SMTP handling. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the Personal Mail Server 3.072-3.09

tags | exploit, overflow
systems | windows
SHA-256 | 17339bed057ac8c0881bb3241b027969045a6a6d6911f4b0556a91f69c0c65c8
ex_servu.c
Posted Nov 5, 1999
Authored by shadowpenguin

The buffer overflow bug is also in Serv-U Versuin 2.5 ftp daemon. In this case, the buffer overflow is cased if the daemon recives the long "cwd" message, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the Serv-U Versuin 2.5. This exploit is coded for Windows98, but if you change some parameters written in the sample exploit program, it will may works on Windows95 and WindowsNT.

tags | exploit, overflow
systems | windows
SHA-256 | 7cb5a35c00e3e6f1813452aca09d14fdb57fd4a3ba89c8b26856789214ff4507
ex_ssmail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of Skyfull Mail Server 1.1.4. It overflows when that receives the long MAIL FROM: in SMTP handling.If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the Skyfull Mail Server 1.1.4.

tags | exploit, overflow
systems | windows
SHA-256 | 0057b545eb9da1b22336a25403153460dec69e5aaa9e5f39e32cb6f0c487e3fa
ex_tinyftpd.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of TinyFTPd Ver0.51. It overflows when that receives the long user name. If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This example sends the exploit code that executes any command on the host which is running the TinyFTPd Ver0.51.

tags | exploit, overflow
systems | windows
SHA-256 | b192ded779312b596b0f4526c4736bedf144020badf03074e1420cae3448d82f
ex_urllive.txt
Posted Nov 5, 1999
Authored by shadowpenguin

URL Live! 1.0 WebServer for Windows95/98/NT which is released by Pacific Software Publishing, Inc. (http://www.urllive.com/) has a "../" security problem, any users can download any files on the victim host.

tags | exploit, web
systems | windows
SHA-256 | dacc942f693a3194c253179e986fa6b5f04314b4f85b01771f5f40b38603f0f1
ex_webbbs.c
Posted Nov 5, 1999
Authored by Unyun, shadowpenguin | Site shadowpenguin.backsection.net

At the initial authorization handling of WebBBS, If the long longin name or password has been received, this CGI overflows. This overflow overwrites the RET address, EIP can be controlled. This overflow is used to execute any instructions which are included in the user name and password.

tags | exploit, overflow, cgi
systems | windows
SHA-256 | 6fabd952734503ddb8a5be6907794eb1cc3ef1ea5818b6ffc671fea9adf2308e
ex_zommail.c
Posted Nov 5, 1999
Authored by shadowpenguin

We found the overflow bug of ZOM-MAIL 1.09. It overflows when that receives the long attachment file name. If ZOM-MAIL 1.09 recives the e-mail which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. This program can send the e-mail to any e-mail address, which is contained an exploit code that removes a "c:\windows\test.txt" file on the host.

tags | exploit, overflow
systems | windows
SHA-256 | e7d4cc605a7a1bf256d1c94b4051fe6008fbc9ed9b3cb9cd250ed29ca9985b11
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close