what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 71 RSS Feed

Files from metacom

Email addressmetacom27 at gmail.com
First Active2012-11-13
Last Active2020-08-04
Documalis Free PDF Editor 5.7.2.26 / Documalis Free PDF Scanner 5.7.2.122 Buffer Overflow
Posted Aug 4, 2020
Authored by metacom | Site metasploit.com

Documalis Free PDF Editor version 5.7.2.26 and Documalis Free PDF Scanner version 5.7.2.122 do not appropriately validate the contents of JPEG images contained within a PDF. Attackers can exploit this vulnerability to trigger a buffer overflow on the stack and gain remote code execution as the user running the Documalis Free PDF Editor or Documalis Free PDF Scanner software.

tags | exploit, remote, overflow, code execution
SHA-256 | a470639faa2ee4a0b417e12596275b4d8fa9a29716deb25f60c4b8b3b2b5cd5c
Documalis Free PDF Scanner Buffer Overflow
Posted Jun 16, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in Documalis Free PDF Scanner.

tags | exploit, overflow
SHA-256 | 2c04b098924f8dbd8524dfd0cc49188136596902ca04a1d2b90f854e85544f85
Documalis Free PDF Editor Buffer Overflow
Posted Jun 16, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in Documalis Free PDF Editor.

tags | exploit, overflow
SHA-256 | 048d7b3d61bd1296bc8a3e9bbdbfcb46a98e72731804eaa769fc654de6d1da3c
Xinfire DVD Player 5.5.0.0 Buffer Overflow
Posted Apr 20, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow in Xinfire DVD Player Pro and Standard version 5.5.0.0. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as DVD X Player and BlazeDVD.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 8e1432aa8dfb148fc7ae4a9837d2ea55ca221408cff178051aabf9226be0a5aa
Xinfire TV Player 6.0.1.2 Buffer Overflow
Posted Apr 20, 2020
Authored by metacom | Site metasploit.com

This Metasploit module exploits a buffer overflow in Xinfire TV Player Pro and Standard version 6.0.1.2. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as Aviosoft Digital TV Player and BlazeVideo HDTV Player.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 9463cf45b8b1073ed995c1985d68fef0a4a21171729609e9b8c086b4e5a256f6
PDF Shaper Buffer Overflow
Posted Nov 30, 2016
Authored by metacom | Site metasploit.com

PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.

tags | exploit
SHA-256 | 532694bd13e7b2f1c5f5de642204ad78bd9869bdcf6309f2f674565cf0afddfb
Watermark Master Buffer Overflow (SEH)
Posted Oct 8, 2015
Authored by metacom, Andrew Smith aka jakx | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in Watermark Master 2.2.23 when processing a specially crafted .WCF file. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing a user of Watermark Master to open a malicious .WCF file.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2013-6935, OSVDB-99226
SHA-256 | 2851660cb4d62d8f9a40addd3ae13ca6e19d4f8f869bc1c54774ff4435357d12
PDF Shaper 3.5 Remote Buffer Overflow
Posted Aug 22, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

PDF Shaper version 3.5 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 1a862bd6f348439cf319bf9e523b76685ab407b894d14f0f8869b6561ddf0418
ChiefPDF Buffer Overflow
Posted Aug 22, 2015
Authored by metacom

Multiple ChiefPDF software such as PDF to Image Converter and PDF to Tiff Converter suffer from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | ffed99b419802af6605e6b28fb1865cc96f61850767f2496d2612b3364bc82e0
VideoCharge Studio Buffer Overflow (SEH)
Posted Aug 17, 2015
Authored by metacom, Christian Mehlmauer, Andrew Smith aka jakx | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC file. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing a user of VideoCharge Studio to open a malicious .VSC file.

tags | exploit, remote, overflow, arbitrary
advisories | OSVDB-69616
SHA-256 | 5afb52ddd9c049208eb1441710497e2625b20e4833296328ac22be987e5b2017
PDF Shaper Buffer Overflow
Posted Aug 11, 2015
Authored by metacom | Site metasploit.com

PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.

tags | exploit
SHA-256 | 4cfd17506f3532fedc41f42c5f19c5b2b9e90caff1f4fc35680379640c1a8990
Tango FTP 1.0 Active-X Heap Spray
Posted Jun 19, 2015
Authored by metacom

Tango FTP active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects version 1.0 build 136.

tags | exploit, activex
SHA-256 | 7c5d287b7285d97c773bd521ba096c6d7155b06570a00ffc57b3294319a812a1
Tango DropBox 3.1.5 Active-X Heap Spray
Posted Jun 19, 2015
Authored by metacom

Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO.

tags | exploit, activex
SHA-256 | 3c8dfe4be4054d363a2c7bf83cffe6bedd810b2e267d01f52bc1df31959e5112
1 Click Audio Converter 2.3.6 Buffer Overflow
Posted Jun 5, 2015
Authored by metacom

1 Click Audio Converter version 2.3.6 suffers from an active-x buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | ab3f148c4718d2a8ce1b5e910c5fb705d96975b4212916b4ca32116e08b62493
1 Click Extract Audio 2.3.6 Buffer Overflow
Posted Jun 5, 2015
Authored by metacom

1 Click Extract Audio version 2.3.6 suffers from an active-x buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 8b01dc114225b25899010fb32a767a37a36147e0bb4170433e6f8f3deeaa00f2
Jildi FTP Client 1.5.2 b1138 Buffer Overflow
Posted Jun 3, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

Jildi FTP Client version 1.5.2 b1138 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 3bb3e294f2460962da7a20ce9ddcd8b0adfdc8de477e3c91f61abfa2bb575c92
Jildi FTP Client 1.5.2 Build 1138 Buffer Overflow
Posted Jun 2, 2015
Authored by metacom

Jildi FTP Client version 1.5.2 build 1138 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | c38b7e307d5aea90caf8e4ffe30db8915eedeef577a8ca8c887e9dbef522ae00
WebDrive 12.2 Buffer Overflow
Posted Jun 2, 2015
Authored by metacom, Vulnerability Laboratory | Site vulnerability-lab.com

WebDrive version 12.2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 8ccccf881d85f53b2da15cd9553c01ba006036a3545662f6fc2c5980acb5b900
WebDrive 12.2 Buffer Overflow
Posted May 31, 2015
Authored by metacom

WebDrive version 12.2 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 2cd7ee4b7f9a78baeb63e80645cb1a74880486e267c923bd49e52d9fe614d1ca
Wise-FTP 8.0.2 DLL Hijack
Posted May 19, 2015
Authored by metacom

Wise-FTP version 8.0.2 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | fe835e282b179efb7d2c3818cf4922476f474a73969909a944989d0332d281d9
Staff-FTP 3.04 DLL Hijack
Posted May 19, 2015
Authored by metacom

Staff-FTP version 3.04 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 11c1ff88fbf2aec5cb130ee64073ba77c78b23e8c19fa3e3f0cf46b67b93c8b7
T-Mobile Internet Manager DLL Hijacking
Posted Jan 29, 2015
Authored by metacom

T-Mobile Internet Manager suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 166dfceb43c6b95cb0dabb5fe01c754f2762e18cdfd8ecf6925606f53ee52fd3
Congstar Internet-Manager SEH Buffer Overflow
Posted Jan 14, 2015
Authored by metacom

Congstar Prepaid Internet-Stick suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | b161408db9940a56935ea3d2849edc91522ac265879fb0edcd77fc15f1807ba5
T-Mobile Internet Manager SEH Buffer Overflow
Posted Jan 14, 2015
Authored by metacom

T-Mobile Internet Manager web'n'walk Stick Fusion version 8.01.2015 suffers from a buffer overflow vulnerability.

tags | exploit, web, overflow
SHA-256 | 6c14082d057cbbddf70192794e7aed3390eae31cd95dbd6f2dabe41eb835f51d
SkinCrafter 3.8.1.0 Buffer Overflow
Posted Jan 4, 2015
Authored by metacom

Included in this archive are three buffer overflow exploits for SkinCrafter version 3.8.1.0.

tags | exploit, overflow
systems | linux
SHA-256 | 3cb83519aae161530f2547086a5c0e9c4d87978bae697670b7dbf6e9467115e3
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close