Exploit the possiblities
Showing 1 - 13 of 13 RSS Feed

Files from Greg Linares

Email addressglinares.code at gmail.com
First Active2006-11-07
Last Active2016-02-29
Comodo Anti-Virus GeekBuddy DLL Hijacking
Posted Feb 29, 2016
Authored by Greg Linares

The Comodo Anti-Virus GeekBuddy component suffers from a dll hijacking vulnerability.

tags | exploit, virus
systems | windows
MD5 | edbcd3f392bd1c4df7f439304be2317b
EEYE-bitdefender.txt
Posted Nov 26, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered a critical remote code execution condition within OScan8.ocx and Oscan81.ocx included by default in BitDefender Online Anti-Virus Scanner 8.0 released on May 24th 2006.

tags | advisory, remote, code execution, virus
MD5 | 4799d99db7d7b71c17ec8dac9f47f60d
EEYE-flac.txt
Posted Nov 16, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered 14 vulnerabilities in the processing of FLAC (Free-Lossless Audio Codec) files affecting various applications. Processing a malicious FLAC file within a vulnerable application could result in the execution of arbitrary code at the privileges of the application or the current user (depending on OS).

tags | advisory, arbitrary, vulnerability
MD5 | 706194b7826e52d2af09ba987033b92e
EEYE-cabright.txt
Posted Oct 12, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered a remote vulnerability in CA BrightStor ARCserve Backup Server that allows an attacker to execute arbitrary code as SYSTEM without any user interaction. The exploit is extremely reliable and can be successfully delivered either across the Internet or within local networks via a random TCP port that is disclosed by the BrightStor portmapper service on TCP/111.

tags | advisory, remote, arbitrary, local, tcp
MD5 | 10aac82704a7a304ec3cd8cea6cade18
EEYE-mp2007.txt
Posted Jul 11, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered a critical vulnerability in PUBCONV.DLL (version 12.0.4518.1014) included with Microsoft's Publisher 2007. PUBCONV.DLL is the Publisher conversion library used by Publisher to translate previous Publisher version files to be "properly" rendered in Publisher 2007. However, when attempting to load a malformed legacy Publisher document (i.e. Publisher 98), PUBCONV.DLL can be forced to call an arbitrary function pointer resulting in the execution of attacker supplied code in the context the of logged-in user.

tags | advisory, arbitrary
MD5 | c32e70dbed9a4380b6d1e9b83f68649a
EEYE-Yahoo.txt
Posted Jun 11, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered two critical vulnerabilities in ywcupl.dll (version 2.0.1.4) and ywcvwr.dll (version 2.0.1.4) included by default in all releases of Yahoo! Messenger 8.x.

tags | advisory, vulnerability
MD5 | 8e62e5ea987627c89d6cf20460ac4e00
blazevideo.txt
Posted Dec 6, 2006
Authored by Greg Linares

BlazeVideo HDTV Player versions 2.1 and below malformed PLF buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | 5f17838629967b7725af835c06997f18
xmplay-3.txt
Posted Nov 22, 2006
Authored by Greg Linares

XMPlay version 3.3.0.4 .PLS filename local/remote buffer overflow exploit that executes CALC.exe.

tags | exploit, remote, overflow, local
MD5 | 26100e0eaeda250da4bb39563265b489
xmplay-2.txt
Posted Nov 22, 2006
Authored by Greg Linares

XMPlay version 3.3.0.4 .ASX filename local buffer overflow exploit that executes CALC.exe.

tags | exploit, overflow, local
MD5 | 88b42793681626a2165ae070aa42af96
xmplay-1.txt
Posted Nov 22, 2006
Authored by Expanders, Greg Linares

XMPlay version 3.3.0.4 .M3U filename local buffer overflow exploit that executes CALC.exe.

tags | exploit, overflow, local
MD5 | 863a37a16135b9e651098390601fbffb
universal1050.txt
Posted Nov 16, 2006
Authored by Greg Linares, Parvez Anwar

Remote denial of service exploit for UniversalFTP version 1.0.50.

tags | exploit, remote, denial of service
MD5 | ae71b89be20b407422a7d58946e6b00e
efsStream.txt
Posted Nov 7, 2006
Authored by Greg Linares

EFS Easy Address Book web server versions 1.2 and below remote file stream exploit.

tags | exploit, remote, web
MD5 | a0e60c4c0b0df7017a24f65de41eef52
easyFilePwn.txt
Posted Nov 7, 2006
Authored by Greg Linares

Easy File Sharing Web Server version 4 remote information stealing exploit.

tags | exploit, remote, web
MD5 | 69d0257dcbcbdabff405d804a597d5dc
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close