exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 320 RSS Feed

Files from rgod

First Active2005-06-18
Last Active2024-09-01
Nortel Contact Recording Centralized Archive 6.5.1 SQL Injection
Posted Sep 15, 2011
Authored by rgod | Site retrogod.altervista.org

Nortel Contact Recording Centralized Archive version 6.5.1 EyrAPIConfiguration web service getSubKeys() remote SQL injection exploit.

tags | exploit, remote, web, sql injection
SHA-256 | 27b12eef97e781f64f7591895d2eaea4644f23580af43939185669da95e9c35c
Embarcadero ER/Studio XE2 Server Portal Code Execution
Posted Sep 8, 2011
Authored by rgod | Site retrogod.altervista.org

Embarcadero ER/Studio XE2 Server Portal Tom Sawyer's default GET extension active-x control suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, activex
SHA-256 | a3dc3fcf45b92326f26568939ecf5eef117cc6fff591f24725b29fca5935e142
CA Arcserve D2D GWT RPC Credential Information Disclosure
Posted Aug 2, 2011
Authored by rgod, bannedit | Site metasploit.com

This Metasploit module exploits an information disclosure vulnerability in the CA Arcserve D2D r15 web server. The information disclosure can be triggered by sending a specially crafted RPC request to the homepage servlet. This causes CA Arcserve to disclosure the username and password in cleartext used for authentication. This username and password pair are Windows credentials with Administrator access.

tags | exploit, web, info disclosure
systems | windows
SHA-256 | 7c8e30e3bf5a9fd18f843efebdc225b819266ca4ca82d428c51238a4afa9d1c6
CA ARCserve D2D r15 Bypass / Disclosure / Command Execution
Posted Jul 26, 2011
Authored by rgod | Site retrogod.altervista.org

CA ARCserve D2D r15 GWT RPC request authentication bypass, credential disclosure, and command execution exploit.

tags | exploit
SHA-256 | ba437467db2d0ae23ae1583f986c67fb9286a047550ea40e3d8174f579d96061
Dell IT Assistant detectIESettingsForITA.ocx Remote Registry Dump
Posted Jul 16, 2011
Authored by rgod | Site retrogod.altervista.org

Dell IT Assistant detectIESettingsForITA.ocx Active-X control readRegVal() remote registry dump exploit.

tags | exploit, remote, registry, activex
SHA-256 | 972fe47b27217c4fe43b9ab5056484e368ca06d298659a3290fa514440134e4e
WebSVN 2.3.2 Command Injection
Posted Jun 3, 2011
Authored by rgod | Site retrogod.altervista.org

WebSVN version 2.3.2 suffers from a remote command injection vulnerability due to an improper escaping of metacharacters in exec().

tags | exploit, remote
SHA-256 | 3d71e294f43a329b86bfe387487039af66e0febf9f453059a607db635ff99824
Real Networks Arcade Games StubbyUtil.ProcessMgr ActiveX Arbitrary Code Execution
Posted Apr 9, 2011
Authored by rgod, sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability in Real Networks Arcade Game's ActiveX control. The "exec" function found in InstallerDlg.dll (v2.6.0.445) allows remote attackers to run arbitrary commands on the victim machine.

tags | exploit, remote, arbitrary, activex
advisories | OSVDB-71559
SHA-256 | 8e0b21948326bf7dcfead8b16e89ae5430d77ad38d73a587297aaf84585e210b
RealNetworks RealGames Active-X Code Execution
Posted Apr 2, 2011
Authored by rgod | Site retrogod.altervista.org

RealNetworks RealGames StubbyUtil.ShellCtl.1 active-x control InstallerDlg.dll version 2.6.0.445 suffers from remote command and code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution, activex
systems | linux
SHA-256 | bef5ff39600c8ed4480d55ae5f8b546151b62229b78838293a97d7a48c18a089
HP Photo Creative 2.x Active-X Control Buffer Overflow
Posted Jan 1, 2011
Authored by rgod | Site retrogod.altervista.org

HP Photo Creative version 2.x audio.Record.1 active-x control remote stack based buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, activex, proof of concept
SHA-256 | b40f5d91faa7207d4ba5b1f0d38e4f40264160d22c13257e58a51dba29630ecb
Chilkat Software FTP2 ActiveX Code Execution
Posted Dec 29, 2010
Authored by rgod | Site retrogod.altervista.org

Chilkat Software FTP2 ActiveX component (ChilkatFtp2.DLL version 2.6.1.1) remote code execution proof of concept exploit.

tags | exploit, remote, code execution, activex, proof of concept
SHA-256 | 1be60aacf90140597a4d6917a51a0c31334daed2001fe839a5375afa0481c9f3
Microsoft Windows Fax Services Cover Page Editor Memory Corruption
Posted Dec 28, 2010
Authored by rgod | Site retrogod.altervista.org

Microsoft Windows Fax Services Cover Page Editor (.cov) memory corruption exploit.

tags | exploit
systems | windows
SHA-256 | 38392677c85a82b9969b7d0008e18d2146a9d58995622384260f9a6004234ec8
AOL Radio AmpX ActiveX Control ConvertFile() Buffer Overflow
Posted Nov 26, 2009
Authored by rgod, Trancer | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in AOL IWinAmpActiveX class (AmpX.dll) version 2.4.0.6 installed via AOL Radio website. By setting an overly long value to 'ConvertFile()', an attacker can overrun a buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
SHA-256 | b255bff048b696b83be33b74127329a23af7e1d356d9b41e180802e9add63785
AOL IWinAmpActiveX Class ConvertFile() Buffer Overflow
Posted May 19, 2009
Authored by rgod | Site retrogod.altervista.org

AOL IWinAmpActiveX Class ConvertFile() remote overflow exploit for Internet Explorer versions 6 and 7 that leverages AmpX.dll version 2.4.0.6. Old unreleased exploit from the rgod archive.

tags | exploit, remote, overflow, activex
SHA-256 | a87724d13c90191ac2aa44040cfd28b63ab9f526cdd557bc96e6c9a805782485
dlink-overflow.txt
Posted Feb 26, 2008
Authored by rgod | Site retrogod.altervista.org

D-Link MPEG4 SHM Audio Control remote overflow exploit that makes use of VAPGDecoder.dll version 1.7.0.5.

tags | exploit, remote, overflow
SHA-256 | 3155a104305a8783639733d34e284568fe9b92635193881c099dff3599f43c26
msdirectspeech-overflow.txt
Posted Feb 11, 2008
Authored by rgod | Site retrogod.altervista.org

Microsoft DirectSpeechSynthesis module remote buffer overflow exploit that makes use of XVoice.dll version 4.0.4.3303.

tags | exploit, remote, overflow
SHA-256 | 7718f8446822b64a7c81ea9b0388ff3cdb8304d505ab0e6503dff8ede1143bdb
imageshack-poc.txt
Posted Jan 25, 2008
Authored by rgod | Site retrogod.altervista.org

ImageShack Toolbar version 4.5.7 FileUploader class insecure method proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 00d868858565241dd37da4195ce062c98b6b7264a20be4df86f24e004f8495c6
ddc-overflow.txt
Posted Jan 18, 2008
Authored by rgod | Site retrogod.altervista.org

Digital Data Communications RtspVaPgCtrl Class remote buffer overflow exploit that makes use of RtspVapgDecoder.dll version 1.1.0.29.

tags | exploit, remote, overflow
SHA-256 | af015133b5fb852204dcbe8a9e537fb0c262cb3e6f6a5107a22e3410079835b1
rtssentry-overflow.txt
Posted Jan 16, 2008
Authored by rgod | Site retrogod.altervista.org

RTS Sentry Digital Surveillance buffer overflow exploit that makes use of CamPanel.dll version 2.1.0.2.

tags | exploit, overflow
SHA-256 | a107188cb89bc1cffd2b55b52f95827b328468e2f2ac2e5e5b9117e0368872c5
nuvico-heap.txt
Posted Jan 14, 2008
Authored by rgod | Site retrogod.altervista.org

NUVICO DVR NVDV4 / PdvrAtl module with PdvrAtl.DLL version 1.0.1.25 remote heap overflow exploit for Internet Explorer 7 on Windows XP SP2.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 9ee68690af569f2155d52e1d0bea6ce85186e02b540a9a4924aeebc6c338d350
docebo-sql.txt
Posted Jan 11, 2008
Authored by rgod | Site retrogod.altervista.org

Docebo versions 3.5.02 and below SQL injection exploit that makes use of lib.regset.php.

tags | exploit, php, sql injection
SHA-256 | d5128df2988a271ca9ff69c11ac5b41342bc66c604855efb747764d4465690cc
imesh-heap.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

iMesh versions 7.1.0.x and below IMWebControl Class remote heap exploit that takes advantage of IMWeb.dll 7.0.0.x.

tags | exploit, remote
SHA-256 | bda7d1cdc934e1f0e4484e108927329c7550e60068d4168673d120bed0940cf7
surgemail-crash.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

SurgeMail version 38k4 webmail Host header denial of service exploit.

tags | exploit, denial of service
SHA-256 | 49a73d329f08f1ae216aa0a1afcac1586fb07eb9337bcfd4563e094053c43add
raidhttpdudo.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

RaidenHTTPD version 2.0.19 ulang command execution proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 673b614fe243897edcb2b2bdcbd71a1f52312222617148de6b1adb3a887a63ac
gomplayer-overflow.txt
Posted Oct 29, 2007
Authored by rgod | Site retrogod.altervista.org

GOM Player version 2.1.6.3499 remote overflow exploit that makes use of GomWeb3.dll version 1.0.0.12. Spawns calc.exe.

tags | exploit, remote, overflow
SHA-256 | 906d927f7281a8d6b9f463de5a38983fe8e053fcbf3c0fe5cc7a02137c97ef19
cyberlink-dos.txt
Posted Oct 2, 2007
Authored by rgod | Site retrogod.altervista.org

CyberLink PowerDVD CLAVSetting module arbitrary remote rewrite denial of service exploit.

tags | exploit, remote, denial of service, arbitrary
SHA-256 | dc99ac5c0ba7789ad4c2e98c65ba7f59a828327c71d0b166f22e8d6ecd713169
Page 5 of 13
Back34567Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close