exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 71 RSS Feed

Files from metacom

Email addressmetacom27 at gmail.com
First Active2012-11-13
Last Active2020-08-04
Documalis Free PDF Editor 5.7.2.26 / Documalis Free PDF Scanner 5.7.2.122 Buffer Overflow
Posted Aug 4, 2020
Authored by metacom | Site metasploit.com

Documalis Free PDF Editor version 5.7.2.26 and Documalis Free PDF Scanner version 5.7.2.122 do not appropriately validate the contents of JPEG images contained within a PDF. Attackers can exploit this vulnerability to trigger a buffer overflow on the stack and gain remote code execution as the user running the Documalis Free PDF Editor or Documalis Free PDF Scanner software.

tags | exploit, remote, overflow, code execution
SHA-256 | a470639faa2ee4a0b417e12596275b4d8fa9a29716deb25f60c4b8b3b2b5cd5c
Documalis Free PDF Scanner Buffer Overflow
Posted Jun 16, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in Documalis Free PDF Scanner.

tags | exploit, overflow
SHA-256 | 2c04b098924f8dbd8524dfd0cc49188136596902ca04a1d2b90f854e85544f85
Documalis Free PDF Editor Buffer Overflow
Posted Jun 16, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in Documalis Free PDF Editor.

tags | exploit, overflow
SHA-256 | 048d7b3d61bd1296bc8a3e9bbdbfcb46a98e72731804eaa769fc654de6d1da3c
Xinfire DVD Player 5.5.0.0 Buffer Overflow
Posted Apr 20, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow in Xinfire DVD Player Pro and Standard version 5.5.0.0. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as DVD X Player and BlazeDVD.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 8e1432aa8dfb148fc7ae4a9837d2ea55ca221408cff178051aabf9226be0a5aa
Xinfire TV Player 6.0.1.2 Buffer Overflow
Posted Apr 20, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow in Xinfire TV Player Pro and Standard version 6.0.1.2. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as Aviosoft Digital TV Player and BlazeVideo HDTV Player.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 9463cf45b8b1073ed995c1985d68fef0a4a21171729609e9b8c086b4e5a256f6
PDF Shaper Buffer Overflow
Posted Nov 30, 2016
Authored by metacom | Site metasploit.com

PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.

tags | exploit
SHA-256 | 532694bd13e7b2f1c5f5de642204ad78bd9869bdcf6309f2f674565cf0afddfb
Watermark Master Buffer Overflow (SEH)
Posted Oct 8, 2015
Authored by metacom, Andrew Smith aka jakx | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in Watermark Master 2.2.23 when processing a specially crafted .WCF file. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing a user of Watermark Master to open a malicious .WCF file.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2013-6935, OSVDB-99226
SHA-256 | 2851660cb4d62d8f9a40addd3ae13ca6e19d4f8f869bc1c54774ff4435357d12
PDF Shaper 3.5 Remote Buffer Overflow
Posted Aug 22, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

PDF Shaper version 3.5 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 1a862bd6f348439cf319bf9e523b76685ab407b894d14f0f8869b6561ddf0418
ChiefPDF Buffer Overflow
Posted Aug 22, 2015
Authored by metacom

Multiple ChiefPDF software such as PDF to Image Converter and PDF to Tiff Converter suffer from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | ffed99b419802af6605e6b28fb1865cc96f61850767f2496d2612b3364bc82e0
VideoCharge Studio Buffer Overflow (SEH)
Posted Aug 17, 2015
Authored by metacom, Christian Mehlmauer, Andrew Smith aka jakx | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC file. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing a user of VideoCharge Studio to open a malicious .VSC file.

tags | exploit, remote, overflow, arbitrary
advisories | OSVDB-69616
SHA-256 | 5afb52ddd9c049208eb1441710497e2625b20e4833296328ac22be987e5b2017
PDF Shaper Buffer Overflow
Posted Aug 11, 2015
Authored by metacom | Site metasploit.com

PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.

tags | exploit
SHA-256 | 4cfd17506f3532fedc41f42c5f19c5b2b9e90caff1f4fc35680379640c1a8990
Tango FTP 1.0 Active-X Heap Spray
Posted Jun 19, 2015
Authored by metacom

Tango FTP active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects version 1.0 build 136.

tags | exploit, activex
SHA-256 | 7c5d287b7285d97c773bd521ba096c6d7155b06570a00ffc57b3294319a812a1
Tango DropBox 3.1.5 Active-X Heap Spray
Posted Jun 19, 2015
Authored by metacom

Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO.

tags | exploit, activex
SHA-256 | 3c8dfe4be4054d363a2c7bf83cffe6bedd810b2e267d01f52bc1df31959e5112
1 Click Audio Converter 2.3.6 Buffer Overflow
Posted Jun 5, 2015
Authored by metacom

1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | ab3f148c4718d2a8ce1b5e910c5fb705d96975b4212916b4ca32116e08b62493
1 Click Extract Audio 2.3.6 Buffer Overflow
Posted Jun 5, 2015
Authored by metacom

1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 8b01dc114225b25899010fb32a767a37a36147e0bb4170433e6f8f3deeaa00f2
Jildi FTP Client 1.5.2 b1138 Buffer Overflow
Posted Jun 3, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

Jildi FTP Client version 1.5.2 b1138 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 3bb3e294f2460962da7a20ce9ddcd8b0adfdc8de477e3c91f61abfa2bb575c92
Jildi FTP Client 1.5.2 Build 1138 Buffer Overflow
Posted Jun 2, 2015
Authored by metacom

Jildi FTP Client version 1.5.2 build 1138 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | c38b7e307d5aea90caf8e4ffe30db8915eedeef577a8ca8c887e9dbef522ae00
WebDrive 12.2 Buffer Overflow
Posted Jun 2, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

WebDrive version 12.2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 8ccccf881d85f53b2da15cd9553c01ba006036a3545662f6fc2c5980acb5b900
WebDrive 12.2 Buffer Overflow
Posted May 31, 2015
Authored by metacom

WebDrive version 12.2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 2cd7ee4b7f9a78baeb63e80645cb1a74880486e267c923bd49e52d9fe614d1ca
Wise-FTP 8.0.2 DLL Hijack
Posted May 19, 2015
Authored by metacom

Wise-FTP version 8.0.2 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | fe835e282b179efb7d2c3818cf4922476f474a73969909a944989d0332d281d9
Staff-FTP 3.04 DLL Hijack
Posted May 19, 2015
Authored by metacom

Staff-FTP version 3.04 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 11c1ff88fbf2aec5cb130ee64073ba77c78b23e8c19fa3e3f0cf46b67b93c8b7
T-Mobile Internet Manager DLL Hijacking
Posted Jan 29, 2015
Authored by metacom

T-Mobile Internet Manager suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 166dfceb43c6b95cb0dabb5fe01c754f2762e18cdfd8ecf6925606f53ee52fd3
Congstar Internet-Manager SEH Buffer Overflow
Posted Jan 14, 2015
Authored by metacom

Congstar Prepaid Internet-Stick suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b161408db9940a56935ea3d2849edc91522ac265879fb0edcd77fc15f1807ba5
T-Mobile Internet Manager SEH Buffer Overflow
Posted Jan 14, 2015
Authored by metacom

T-Mobile Internet Manager web'n'walk Stick Fusion version 8.01.2015 suffers from a buffer overflow vulnerability.

tags | exploit, web, overflow
SHA-256 | 6c14082d057cbbddf70192794e7aed3390eae31cd95dbd6f2dabe41eb835f51d
SkinCrafter 3.8.1.0 Buffer Overflow
Posted Jan 4, 2015
Authored by metacom

Included in this archive are three buffer overflow exploits for SkinCrafter version 3.8.1.0.

tags | exploit, overflow
systems | linux
SHA-256 | 3cb83519aae161530f2547086a5c0e9c4d87978bae697670b7dbf6e9467115e3
Page 1 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close