what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from germaya_x

First Active2009-08-05
Last Active2010-01-17
Internet Explorer wshom.ocx Active-X Insecure Method
Posted Jan 17, 2010
Authored by D3V!L FucK3r, germaya_x

Internet Explorer suffers from a wshom.ocx Active-X insecure method remote code execution vulnerability.

tags | exploit, remote, code execution, activex
SHA-256 | a6952c754fdd899da306161524244dba96352d426a0c95f354394937c39c051b
Internet Explorer wshom.ocx Active-X Code Execution
Posted Jan 17, 2010
Authored by D3V!L FucK3r, germaya_x

Internet Explorer suffers from a wshom.ocx Active-X remote code execution vulnerability.

tags | exploit, remote, code execution, activex
SHA-256 | 259fffc5d5c985f46cb32cbf7f80b74c255dd4c5c26f2b4e757dcd20769d2691
JcomBand ActiveX Buffer Overflow
Posted Jan 7, 2010
Authored by D3V!L FucK3r, germaya_x

JcomBand Toolbar version 2.5 on Internet Explorer Active-X buffer overflow proof of concept exploit that spawns calc.exe.

tags | exploit, overflow, activex, proof of concept
SHA-256 | b017938670139dcb5c76147172c20264dd2bb621b6fbec6eda5fd463695ed5cd
Audio Workstation 6.4.2.4.3 pls Buffer Overflow
Posted Dec 31, 2009
Authored by germaya_x, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2009-0476
SHA-256 | d9f34d3ca724495af9e1703e2053bf024bceb6935e3dacafc2b68f298b46fb9a
Xenorate 2.50(.xpl) universal Local Buffer Overflow Exploit (SEH)
Posted Dec 31, 2009
Authored by hack4love, germaya_x, jduck, loneferret | Site metasploit.com

This Metasploit module exploits a stack overflow in Xenorate 2.50 By creating a specially crafted xpl file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 55d0fc5c30e52b4fa3196de380c9ba074f6b1b00caae59fe14a607e2123f1414
Xenorate 2.50 Local Buffer Overflow
Posted Dec 13, 2009
Authored by germaya_x

Xenorate version 2.50 universal local buffer overflow exploit that creates a malicious .xpl file.

tags | exploit, overflow, local
SHA-256 | 753f9d0b80827515eccc9e2846f7764cb82c02d4cad8f4b8b4098ab59bf0b3af
Audio Workstation 6.4.2.4.3 pls Buffer Overflow
Posted Dec 10, 2009
Authored by germaya_x, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 593143f44effe2b32ffd67b8e869a2f456c444c6dc61974d452d7589d17700e8
Icarus 2.0 Buffer Overflow
Posted Sep 10, 2009
Authored by germaya_x

Icarus version 2.0 buffer overflow proof of concept exploit that creates a malicious .pgn file.

tags | exploit, overflow, proof of concept
SHA-256 | 5512427182df5879ba61ee7150955bcbd4fbe3a4cd10024402dbe8ba06923764
Playlistmaker 1.5 Stack Overflow
Posted Aug 6, 2009
Authored by germaya_x

Playlistmaker version 1.5 local stack overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | c584207ab986f5817177ac4e5b6fba43eb94b4b4064c7912671705b9079fe2ed
jetAudio 7.1.9.4030 Buffer Overflow
Posted Aug 6, 2009
Authored by germaya_x

jetAudio version 7.1.9.4030 plus vx universal buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | 0d680cbd9ab8adee4eab17871d4550fa96237010e411f50e1166d134577ba650
MediaCoder 0.7.1.4486 Buffer Overflow
Posted Aug 5, 2009
Authored by germaya_x

MediaCoder version 0.7.1.4486 universal buffer overflow exploit that creates a malicious .lst file.

tags | exploit, overflow
SHA-256 | 7d8b23538d95e05bf0a5054e1dee0d30343d336ad23c5a17f558ec2d9e8d0dbe
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close