exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Miguel Angel de Castro Simon

First Active2013-05-03
Last Active2013-09-02
WinArchiver 3.2 SEH Buffer Overflow
Posted Sep 2, 2013
Authored by Pedro Guillen Nunez, Miguel Angel de Castro Simon, Josep Pi Rodriguez

WinArchiver version 3.2 suffers from a SEH-based buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2013-5660
SHA-256 | 6e206a8a5bb2693cb96ef406b23482f125a2165e42334ccf58a79646e69b5217
Wiz 5.0.3 User Mode Write Access Violation
Posted Sep 2, 2013
Authored by Pedro Guillen Nunez, Miguel Angel de Castro Simon, Josep Pi Rodriguez

Wiz version 5.0.3 suffers from a user mode write access violation vulnerability.

tags | advisory
advisories | CVE-2013-5659
SHA-256 | 63d43930c87c789aa57942fdecbe974ffb10518802ad97ec2eb9eb227bbc7784
PWStore 2010.8.30.0 Cross Site Scripting / Denial Of Service
Posted Sep 2, 2013
Authored by Pedro Guillen Nunez, Miguel Angel de Castro Simon, Josep Pi Rodriguez

PWStore version 2010.8.30.0 suffers from cross site scripting and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, xss
advisories | CVE-2013-5657, CVE-2013-5658
SHA-256 | 62cf2734ff3e28570fd22dd8b33efaa47690cdfc48bd30e61e0caf0cb757102d
FuzeZip 1.0 SEH Buffer Overflow
Posted Sep 2, 2013
Authored by Pedro Guillen Nunez, Miguel Angel de Castro Simon, Josep Pi Rodriguez

FuzeZip version 1.0.0.131625 suffers from a SEH based overflow and stack based overflow which is protected by stack cookies.

tags | advisory, overflow
advisories | CVE-2013-5656
SHA-256 | 7997f627ad9bdf3236c4f71c63ca741f2fbd67c404def236820282873b3f4e8d
Winarchiver 3.2 Buffer Overflow
Posted May 3, 2013
Authored by Pedro Guillen Nunez, Miguel Angel de Castro Simon, Josep Pi Rodriguez

Winarchiver version 3.2 structured exception handler buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | e03c150650d0c093092de920a5d5778e57636907dea5df9c2351fec4f6e3d06d
FuzeZip 1.0.0.131625 Buffer Overflow
Posted May 3, 2013
Authored by Pedro Guillen Nunez, Miguel Angel de Castro Simon, Josep Pi Rodriguez

FuzeZip version 1.0.0.131625 structured exception handler buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | 16af598a8a9110ba118802425d3aee66e98d1676f712385eb4834b602a3e7d53
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close