what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Expanders

Email addressexpanders at gmail.com
First Active2005-04-17
Last Active2010-02-05
AstonSoft DeepBurner (DBR File) Path Buffer Overflow
Posted Feb 5, 2010
Authored by Expanders, fl0 fl0w | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.9.0.228, 1.8.0, and possibly other versions of AstonSoft's DeepBurner (Pro, Lite, etc). An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded DBR file within a browser, since the DBR extension is registered to DeepBurner.

tags | exploit, overflow
advisories | CVE-2006-6665
SHA-256 | 6aadc69d3bc6b1f7513f995d00471a16d1534088f0b0cfb9a3bbad503d044aa7
xmplay-1.txt
Posted Nov 22, 2006
Authored by Expanders, Greg Linares

XMPlay version 3.3.0.4 .M3U filename local buffer overflow exploit that executes CALC.exe.

tags | exploit, overflow, local
SHA-256 | 082bb5e1b00a07a7d2af2a365a3da3b5aa70c31d6de463b58cf200a19606e19f
XHNB-Novell-eDirectory_remote_bof.c
Posted Nov 7, 2006
Authored by Expanders, Manuel Santamarina Suarez

Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 1acfa7a13ca13f316e5a4c8f1d11e2f197cda1019616c5dc3401e0d70f57d958
streamripper-2.txt
Posted Aug 30, 2006
Authored by Expanders

Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.

tags | exploit, web, overflow
SHA-256 | a01cbeda0ca3af143a437e3f105f122b5ca65dd6fed028ccf124d6b599630770
XH-FreeFTPD_remote_bof.c
Posted Nov 20, 2005
Authored by barabas, Expanders | Site x0n3-h4ck.org

FreeFTPd remote USER buffer overflow exploit for versions 1.0.8 and below.

tags | exploit, remote, overflow
SHA-256 | 8da2a5f3da96fa0cafbeead497312b5e06fcdbd17ce4badd50add24f1c732a7c
XH-Hasbani-HTTPD-DoS.c
Posted Oct 30, 2005
Authored by Expanders | Site x0n3-h4ck.org

Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.

tags | exploit, remote, web, denial of service
SHA-256 | e7ea5226541a9e30177def6562f8d6efcb06aad03e47001f1f145555549dc8b9
mailenable_bof_advisory.txt
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | 3c903a1c75d2c6ce2dc58166691a78cc53abf54674742b75c0de08bc36644648
x0n3-h4ck_MailEnable_Imapd.c
Posted Apr 17, 2005
Authored by CorryL, Expanders | Site x0n3-h4ck.org

MailEnable Pro and Enterprise imapd contains a buffer overflow during the authentication phase. This remotely-exploitable bug allows for ECX and EAX to be overwritten, thereby allowing the execution of arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 2edd1ae02970c2a37df0d63b2f434b3f3acccbe4d46c6f12b8f968b4377f3bc5
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close