what you don't know can hurt you
Showing 1 - 18 of 18 RSS Feed

Files from Eduardo Braun Prado

Real NameEduardo Braun Prado
Email addressprivate
First Active2006-02-20
Last Active2019-03-13
View User Profile

Personal Background

"The more I research security vulnerabilities the more I want to research"


Microsoft Windows MSHTML Engine Edit Remote Code Execution
Posted Mar 13, 2019
Authored by Eduardo Braun Prado

The Microsoft Windows MSHTML Engine is prone to a vulnerability that allows attackers to execute arbitrary code on vulnerable systems because of improper validation of specially crafted web documents (html, xhtml, etc).

tags | exploit, web, arbitrary
systems | windows
advisories | CVE-2019-0541
MD5 | f319a8657955eabd715a9358f82d0668
Microsoft Windows VCF Arbitrary Code Execution
Posted Jan 22, 2019
Authored by Eduardo Braun Prado, hyp3rlinx

Microsoft Windows VCF or Contact file URL manipulation arbitrary code execution proof of concept exploit. Tested on Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. Both x86 and x64 architectures were tested.

tags | exploit, arbitrary, x86, code execution, proof of concept
systems | windows, 7
MD5 | 094fed868f7fb979125879d67bb9e5a4
Mozilla Firefox Picture Drag And Drop Security Bypass
Posted Oct 13, 2018
Authored by Eduardo Braun Prado

Proof of concept exploit for a Mozilla Firefox picture drag and drop security bypass vulnerability. Tested on versions 3.6.10 up to 62.0.3. Password to decompress this archive is ff2018.

tags | exploit, proof of concept, bypass
MD5 | c0ab6d5441042f89254f529c0672f9ba
Microsoft Windows SCF File Feature Bypass
Posted Aug 6, 2018
Authored by Eduardo Braun Prado

Microsoft Windows suffers from an SCF open file security warning feature bypass vulnerability.

tags | exploit, bypass
systems | windows
MD5 | 6040e3240487f072def3a3791d8f65ff
Microsoft Windows ADODB.Record Object File Overwrite
Posted Jun 29, 2018
Authored by Eduardo Braun Prado

Microsoft Windows suffers from an ADODB.Record object file overwrite vulnerability. The password for the proof of concept zip is adorecord.

tags | exploit, proof of concept
systems | windows
MD5 | fcb2505c4c86719bf35019b73b7da0fe
Microsoft Internet Explorer HTML Help Control 4.74 Bypass
Posted Jun 26, 2018
Authored by Eduardo Braun Prado

Microsoft Internet Explorer HTML Help Control version 4.74 local zone bypass exploit. Proof of concept code for an ancient vulnerability.

tags | exploit, local, proof of concept, bypass
advisories | CVE-2004-1043
MD5 | 31b8cba305e7c04047d7eace49fd4d94
Microsoft Windows Paint Security Feature Bypass / Unsafe File Creation
Posted May 25, 2018
Authored by Eduardo Braun Prado

Microsoft Windows Paint suffers from security feature bypass and unsafe file creation vulnerabilities.

tags | exploit, vulnerability
systems | windows
MD5 | da3594505f62c1e8ec64fd08c44fb673
Microsoft Office 2007 Groove Security Bypass / Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Groove contains a security bypass issue regarding 'Workspace Shortcut' files (.GLK) because it allows arbitrary (registered) URL Protocols to be passed, when only 'grooveTelespace://' URLs should be allowed, which allows execution of arbitrary code upon opening a 'GLK' file.

tags | exploit, arbitrary, protocol, bypass
MD5 | feede813360a000cae37b988d155103d
Microsoft Excel Remote Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Excel contains a remote code execution vulnerability upon processing OLE objects. Versions 2007, 2010, 2013, and 2016 are affected on both architectures.

tags | exploit, remote, code execution
advisories | CVE-2017-0199
MD5 | a89385c666364082a80a0ea4883429aa
Microsoft Office 2007 Word Information Disclosure
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Word suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
MD5 | d686982e4ceeea6c798b900fd87cb2b2
Microsoft Word Local Machine Zone Remote Code Execution
Posted Jul 21, 2015
Authored by Eduardo Braun Prado

Microsoft Word, Excel, and Powerpoint 2007 contain a remote code execution vulnerability because it is possible to reference documents such as Works document (.wps) as HTML. It will process HTML and script code in the context of the local machine zone of Internet Explorer which leads to arbitrary code execution. By persuading users into opening eg. specially crafted .WPS, ".doc ", ".RTF " (with a space at the end) it is possible to trigger the vulnerability and run arbitrary code in the context of the logged on Windows user. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, arbitrary, local, code execution
systems | windows
advisories | CVE-2015-0097
MD5 | e59aef6fcb1d5f48ddca084672ddfa46
Microsoft Windows Help / Support Center DoS / Overflow
Posted Apr 7, 2014
Authored by Eduardo Braun Prado

Microsoft Windows Help and Support Center contains multiple vulnerabilities that can be exploited by attackers to run arbitrary code when a drag and drop operation is performed on a webpage, cause a buffer overrun condition, and Denial of Service (DOS). Proof of concept code included.

tags | exploit, denial of service, overflow, arbitrary, vulnerability, proof of concept
systems | windows
MD5 | f1afbabc3b40c5647ffc10552fe483e5
Microsoft Windows Help HLP File Loading Hijack
Posted Apr 7, 2014
Authored by Eduardo Braun Prado

Microsoft Windows Help (Winhlp32) contains an HLP file loading hijack vulnerability because programs that invokes help from HLP files passes relative paths, causing it to load HLP files from the directory in which it was started, if they exist. Proof of concept code included.

tags | exploit, proof of concept
systems | windows
MD5 | 651f3c5e49bb186b583e94dfe44d6c83
MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution
Posted Sep 20, 2013
Authored by juan vazquez, Eduardo Braun Prado | Site metasploit.com

This Metasploit module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows 2003. The vulnerability exists in the handling of the Screen Saver path, in the [boot] section. An arbitrary path can be used as screen saver, including a remote SMB resource, which allows for remote code execution when a malicious .theme file is opened, and the "Screen Saver" tab is viewed.

tags | exploit, remote, arbitrary, code execution
systems | windows, xp
advisories | CVE-2013-0810, OSVDB-97136
MD5 | 5b024ccf59e4977c948fb7340c41f235
Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack
Posted Jul 5, 2013
Authored by Luigi Auriemma, Eduardo Braun Prado

Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.

tags | exploit, vulnerability, proof of concept
systems | linux, windows, 9x
MD5 | 69b1395597072062ce9c6404beb68260
First Remote Code Execution Vulnerablity Affecting Microsoft Notepad
Posted Mar 10, 2010
Authored by Eduardo Braun Prado | Site secumania.net

The MS HTML Help control activex is prone to a remote CHM help file hijack vulnerability when applications invoke help. Multiple built-in applications are vulnerable to this. The impact of the vulnerability is the loading of the incorrect CHM help file when it resides in the same directory the application invoking help starts in. This proof of concept exploit leverages Notepad to demonstrate the vulnerability.

tags | exploit, remote, activex, proof of concept
MD5 | 3f0edb83fb8c525b3c7a93556ab16cc7
xpFireConvince.txt
Posted Apr 1, 2006
Authored by Eduardo Braun Prado

By naming a file without a name, the Windows XP firewall may inadvertently trick a user into allowing a malicious application to run.

tags | advisory
systems | windows, xp
MD5 | b9b91a76ab66e00166b5897ec186d1e7
MirabilizICQ.txt
Posted Feb 20, 2006
Authored by Eduardo Braun Prado

A bug in Mirabiliz ICQ could allow an attacker to trick users into executing files inside an uploaded directory.

tags | advisory
MD5 | 3f206b58cafc29cdbb11e29e76240871
Page 1 of 1
Back1Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    14 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close