what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from germaya_x

First Active2009-08-05
Last Active2010-01-17
Internet Explorer wshom.ocx Active-X Insecure Method
Posted Jan 17, 2010
Authored by D3V!L FucK3r, germaya_x

Internet Explorer suffers from a wshom.ocx Active-X insecure method remote code execution vulnerability.

tags | exploit, remote, code execution, activex
SHA-256 | a6952c754fdd899da306161524244dba96352d426a0c95f354394937c39c051b
Internet Explorer wshom.ocx Active-X Code Execution
Posted Jan 17, 2010
Authored by D3V!L FucK3r, germaya_x

Internet Explorer suffers from a wshom.ocx Active-X remote code execution vulnerability.

tags | exploit, remote, code execution, activex
SHA-256 | 259fffc5d5c985f46cb32cbf7f80b74c255dd4c5c26f2b4e757dcd20769d2691
JcomBand ActiveX Buffer Overflow
Posted Jan 7, 2010
Authored by D3V!L FucK3r, germaya_x

JcomBand Toolbar version 2.5 on Internet Explorer Active-X buffer overflow proof of concept exploit that spawns calc.exe.

tags | exploit, overflow, activex, proof of concept
SHA-256 | b017938670139dcb5c76147172c20264dd2bb621b6fbec6eda5fd463695ed5cd
Audio Workstation 6.4.2.4.3 pls Buffer Overflow
Posted Dec 31, 2009
Authored by germaya_x, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2009-0476
SHA-256 | d9f34d3ca724495af9e1703e2053bf024bceb6935e3dacafc2b68f298b46fb9a
Xenorate 2.50(.xpl) universal Local Buffer Overflow Exploit (SEH)
Posted Dec 31, 2009
Authored by hack4love, germaya_x, jduck, loneferret | Site metasploit.com

This Metasploit module exploits a stack overflow in Xenorate 2.50 By creating a specially crafted xpl file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 55d0fc5c30e52b4fa3196de380c9ba074f6b1b00caae59fe14a607e2123f1414
Xenorate 2.50 Local Buffer Overflow
Posted Dec 13, 2009
Authored by germaya_x

Xenorate version 2.50 universal local buffer overflow exploit that creates a malicious .xpl file.

tags | exploit, overflow, local
SHA-256 | 753f9d0b80827515eccc9e2846f7764cb82c02d4cad8f4b8b4098ab59bf0b3af
Audio Workstation 6.4.2.4.3 pls Buffer Overflow
Posted Dec 10, 2009
Authored by germaya_x, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 593143f44effe2b32ffd67b8e869a2f456c444c6dc61974d452d7589d17700e8
Icarus 2.0 Buffer Overflow
Posted Sep 10, 2009
Authored by germaya_x

Icarus version 2.0 buffer overflow proof of concept exploit that creates a malicious .pgn file.

tags | exploit, overflow, proof of concept
SHA-256 | 5512427182df5879ba61ee7150955bcbd4fbe3a4cd10024402dbe8ba06923764
Playlistmaker 1.5 Stack Overflow
Posted Aug 6, 2009
Authored by germaya_x

Playlistmaker version 1.5 local stack overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | c584207ab986f5817177ac4e5b6fba43eb94b4b4064c7912671705b9079fe2ed
jetAudio 7.1.9.4030 Buffer Overflow
Posted Aug 6, 2009
Authored by germaya_x

jetAudio version 7.1.9.4030 plus vx universal buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | 0d680cbd9ab8adee4eab17871d4550fa96237010e411f50e1166d134577ba650
MediaCoder 0.7.1.4486 Buffer Overflow
Posted Aug 5, 2009
Authored by germaya_x

MediaCoder version 0.7.1.4486 universal buffer overflow exploit that creates a malicious .lst file.

tags | exploit, overflow
SHA-256 | 7d8b23538d95e05bf0a5054e1dee0d30343d336ad23c5a17f558ec2d9e8d0dbe
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close