exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files from dookie

First Active2009-11-26
Last Active2013-09-19
A-PDF WAV to MP3 1.0.0 Buffer Overflow
Posted Sep 19, 2013
Authored by Dr_IDE, dookie, d4rk-h4ck3r | Site metasploit.com

This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 version 1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
advisories | OSVDB-67241
SHA-256 | c36f8e21b4b97cee5ba878b04ceb9d74b2c3487cf9055592c90c45c97711c507
HP Data Protector 6.11 Remote Buffer Overflow
Posted Jul 2, 2011
Authored by muts, dookie

HP Data Protector version 6.11 remote buffer overflow exploit with DEP bypass.

tags | exploit, remote, overflow
SHA-256 | 9e8e5a84de486e78b0670c124724bc4754ef8447902faec7f282f582cbf86f0c
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 12, 2011
Authored by dookie, xsploited Security, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.

tags | exploit, overflow
systems | windows
SHA-256 | 1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
KMPlayer 3.0.0.1440 Buffer Overflow
Posted Jun 7, 2011
Authored by dookie, ronin

KMPlayer version 3.0.0.1440 buffer overflow exploit with DEP bypass that creates a malicious mp3 file.

tags | exploit, overflow
SHA-256 | 132a8a91ab46b94954a941964bc52cf820ea67a4c8ae0be94d92b5e07513bded
Foxit PDF Reader v4.1.1 Title Stack Buffer Overflow
Posted Nov 23, 2010
Authored by corelanc0d3r, jduck, dookie | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Foxit PDF Reader prior to version 4.2.0.0928. The vulnerability is triggered when opening a malformed PDF file that contains an overly long string in the Title field. This results in overwriting a structured exception handler record. NOTE: This exploit does not use javascript.

tags | exploit, overflow, javascript
advisories | OSVDB-68648
SHA-256 | b07f351411d99f75f345a772bc24aa52c70ef746199fb1964b1d843455480d94
Foxit Reader 4.1.1 Stack Overflow
Posted Nov 16, 2010
Authored by dookie

Foxit Reader version 4.1.1 stack overflow exploit with egghunter shellcode.

tags | exploit, overflow, shellcode
SHA-256 | 9780b51aa733813b396e6fc1a53431ca2e325e1962af0b5c9d51ca76f2250eef
Fat Player Media Player 0.6b0 Buffer Overflow
Posted Oct 20, 2010
Authored by dookie, James Fitts | Site metasploit.com

This Metasploit module exploits a buffer overflow in Fat Player 0.6b. When the application is used to import a specially crafted wav file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 7b207e157e03544e160929ab34671bcd3b540a6779b07f615673383d33fa2fef
A-PDF WAV to MP3 v1.0.0 Buffer Overflow
Posted Aug 24, 2010
Authored by Dr_IDE, dookie, d4rk-h4ck3r | Site metasploit.com

This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 v1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 98f77271a20e935a5608bf3a7851354616670e5d252200c33c57d725a70cc30e
WM Downloader 3.1.2.2 Buffer Overflow
Posted Aug 12, 2010
Authored by dookie, fdisk | Site metasploit.com

This Metasploit module exploits a buffer overflow in WM Downloader v3.1.2.2. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 87a0644ca5d9a7d534b11ef5d0d3292366fd92e4752fed31c5dd3bfb55b114bc
UFO - Alien Invasion 2.2.1 Remote Code Execution
Posted Jun 29, 2010
Authored by dookie

UFO: Alien Invasion version 2.2.1 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | c283ab68b69766b9ff26b5845ef311943524c123c5b5c1849acfca98295ccec5
MacOS X EvoCam HTTP GET Overflow
Posted Jun 15, 2010
Authored by dookie, Paul Harrington | Site metasploit.com

This Metasploit module exploits a stack overflow in the web server provided with the EvoCam program for Mac OS X. We use Dino Dai Zovi's exec-from-heap technique to copy the payload from the non-executable stack segment to heap memory. Vulnerable versions include 3.6.6, 3.6.7, and possibly earlier versions as well. EvoCam version 3.6.8 fixes the vulnerability.

tags | exploit, web, overflow
systems | apple, osx
SHA-256 | 1c923c534030db638a49cbc2059c3e52cb7a34e60ab4c8b6bd58d2cf5b383ff5
FeedDemon 3.1.0.12 Stack Buffer Overflow
Posted Jun 4, 2010
Authored by fl0 fl0w, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0546
SHA-256 | 8afb9bc6b6e5ed13de0b34861110cee4952239ed2ad8726c5bcc1f02b21ecbf8
PointDev IDEAL Migration Buffer Overflow
Posted May 12, 2010
Authored by Dr_IDE, jduck, dookie | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions v9.7 through v10.5 of IDEAL Administration and versions 4.5 and 4.51 of IDEAL Migration. All versions are suspected to be vulnerable. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code. NOTE: IDEAL Administration 10.5 is compiled with /SafeSEH

tags | exploit, overflow, arbitrary
advisories | CVE-2009-4265
SHA-256 | d487bf3a03cfdebd126e3b50fa65fc5bba22a39f6bc020af9d9f9429f2ff2e0c
Magneto Software Net Resource Active-X 4.0.0.5 NetFileClose Universal SEH Exploit
Posted Apr 16, 2010
Authored by dookie

Magneto Software Net Resource Active-X control version 4.0.0.5 NetFileClose universal SEH exploit.

tags | exploit, activex
SHA-256 | dafefbd5a052860e28f1d8e9700565ab0968b540cdced6a2cbaa906f1feb6536
Magneto Software Net Resource Active-X 4.0.0.5 NetConnectionEnum Universal SEH Exploit
Posted Apr 16, 2010
Authored by dookie

Magneto Software Net Resource Active-X control version 4.0.0.5 NetConnectionEnum universal SEH exploit.

tags | exploit, activex
SHA-256 | b9d10fbbbac55c6ecb0fb0eba1ffc33a39c1f7370d0dd65dc9d8ebf8764a0ca6
MagnetoSoft NetworkResources Active-X NetShareEnum Universal Exploit
Posted Apr 16, 2010
Authored by dookie

MagnetoSoft NetworkResources Active-X control version 4.0.0.5 universal NetShareEnum exploit.

tags | exploit, activex
SHA-256 | e5e9dd457a5d47a4167714edcf50f29f18d400bc390885e0b371d105f6e66821
VariCAD 2010-2.05 EN (DWB File) Stack Buffer Overflow
Posted Mar 20, 2010
Authored by n00b, MC, dookie | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in VariCAD 2010-2.05 EN. An attacker must send the file to victim and the victim must open the file.

tags | exploit, overflow
SHA-256 | 606044200780a7d9d63b6fcf47963bd052e8a437c8822a35a6d9f1cb62286b98
Audiotran 1.4.1 (PLS File) Stack Buffer Overflow
Posted Feb 5, 2010
Authored by Sebastien Duquette, dookie | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.

tags | exploit, overflow
advisories | CVE-2009-0476
SHA-256 | fe48caf317027e30bd5da8dd119e9fa08b7127b8f16f258298a6f1979a6d973f
Audiotran 1.4.1 (PLS File) Stack Overflow.
Posted Jan 11, 2010
Authored by Sebastien Duquette, dookie | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.

tags | exploit, overflow
SHA-256 | 339082146c5bb1630c37aae3bf1b184da498e5a3a69f394d4eac5e7a0c043bce
NetTransport Download Manager 2.90.510 Buffer Overflow
Posted Jan 4, 2010
Authored by dookie, Lincoln | Site metasploit.com

This exploits a stack overflow in NetTransport Download Manager, part of the NetXfer suite. This Metasploit module was tested successfully against version 2.90.510.

tags | exploit, overflow
SHA-256 | bf6500a66ae079ee9bf77addffc2d579c17c8d0c7c04d2cb70fdae113cbc6cd9
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by Dr_IDE, Francis Provencher, jduck, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.

tags | exploit, overflow
advisories | CVE-2009-3837
SHA-256 | 03aa5d1fb353fd0b0a186d111853941e220644c617f4997fc853286c33067088
NCTAudioFile2 v2.x ActiveX Control SetFormatLikeSample() Buffer Overflow
Posted Dec 31, 2009
Authored by MC, jduck, dookie | Site metasploit.com

This Metasploit module exploits a stack overflow in the NCTAudioFile2.Audio ActiveX Control provided by various audio applications. By sending a overly long string to the "SetFormatLikeSample()" method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-0018
SHA-256 | 572cd45f169e8ae99680a260fbe93c3ec15696fd145b671b14f7ce7d7656216b
Adobe Illustrator CS4 v14.0.0
Posted Dec 31, 2009
Authored by Nine:Situations:Group::pyrokinesis, dookie | Site metasploit.com

Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) overlong DSC Comment Buffer Overflow Exploit

tags | exploit, overflow
advisories | CVE-2009-4195
SHA-256 | fa7d623818aa870797cedbdfe793f36edde2119163f962043b50da8da39732e1
IDEAL Administration 2009 Buffer Overflow
Posted Dec 31, 2009
Authored by Dr_IDE, dookie | Site metasploit.com

This Metasploit module exploits a stack overflow in IDEAL Administration v9.7. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 671e32b58eafc179c66a2c75065bd9266308aadcc36d69ae7c4a2f035130544f
Audio Workstation 6.4.2.4.3 pls Buffer Overflow
Posted Dec 31, 2009
Authored by germaya_x, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2009-0476
SHA-256 | d9f34d3ca724495af9e1703e2053bf024bceb6935e3dacafc2b68f298b46fb9a
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close