what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 30 of 30 RSS Feed

Files from dookie

First Active2009-11-26
Last Active2013-09-19
Millenium MP3 Studio 2.0 (PLS File) Stack Buffer Overflow
Posted Dec 31, 2009
Authored by jduck, dookie, Molotov | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Millenium MP3 Studio 2.0. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extension is registered to Millenium MP3 Studio. This functionality has not been tested in this module.

tags | exploit, overflow
SHA-256 | 06d85f2491d1615ca33ae611b3a98c687a542e8e52b5e87ca2f1e88fad8e5e4d
Millenium MP3 Studio 2.0 (PLS File) Stack Overflow.
Posted Dec 13, 2009
Authored by dookie, Molotov | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Millenium MP3 Studio 2.0. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Millenium MP3 Studio. This functionality has not been tested in this module.

tags | exploit, overflow
SHA-256 | 4a1e117ec7a07c9369020bc7ebc32cb7a03208c810258087037afadadb98fa5d
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit
Posted Dec 10, 2009
Authored by Dr_IDE, Francis Provencher, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message.

tags | exploit, overflow
SHA-256 | 215303af9fa1743f8f050624ab0a364dc6fdc4218fbee1b68806a9c6c18c6bd6
Audio Workstation 6.4.2.4.3 pls Buffer Overflow
Posted Dec 10, 2009
Authored by germaya_x, dookie | Site metasploit.com

This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
SHA-256 | 593143f44effe2b32ffd67b8e869a2f456c444c6dc61974d452d7589d17700e8
Amaya Browser v11.0 bdo tag overflow
Posted Nov 26, 2009
Authored by Rob Carter, dookie | Site metasploit.com

This Metasploit module exploits a stack overflow in the Amaya v11 Browser. By sending an overly long string to the "bdo" tag, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-0323
SHA-256 | 412b394380677fab8c8871f5e96e3347d60f33fa5e46d1fa954bd1b5be97d7b8
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close