Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files from Eduardo Braun Prado

Real NameEduardo Braun Prado
Email addressprivate
First Active2006-02-20
Last Active2017-10-01
View User Profile

Personal Background

"The more I research security vulnerabilities the more I want to research"


Microsoft Office 2007 Groove Security Bypass / Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Groove contains a security bypass issue regarding 'Workspace Shortcut' files (.GLK) because it allows arbitrary (registered) URL Protocols to be passed, when only 'grooveTelespace://' URLs should be allowed, which allows execution of arbitrary code upon opening a 'GLK' file.

tags | exploit, arbitrary, protocol, bypass
MD5 | feede813360a000cae37b988d155103d
Microsoft Excel Remote Code Execution
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Excel contains a remote code execution vulnerability upon processing OLE objects. Versions 2007, 2010, 2013, and 2016 are affected on both architectures.

tags | exploit, remote, code execution
advisories | CVE-2017-0199
MD5 | a89385c666364082a80a0ea4883429aa
Microsoft Office 2007 Word Information Disclosure
Posted Oct 1, 2017
Authored by Eduardo Braun Prado

Microsoft Office 2007 Word suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
MD5 | d686982e4ceeea6c798b900fd87cb2b2
Microsoft Word Local Machine Zone Remote Code Execution
Posted Jul 21, 2015
Authored by Eduardo Braun Prado

Microsoft Word, Excel, and Powerpoint 2007 contain a remote code execution vulnerability because it is possible to reference documents such as Works document (.wps) as HTML. It will process HTML and script code in the context of the local machine zone of Internet Explorer which leads to arbitrary code execution. By persuading users into opening eg. specially crafted .WPS, ".doc ", ".RTF " (with a space at the end) it is possible to trigger the vulnerability and run arbitrary code in the context of the logged on Windows user. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, arbitrary, local, code execution
systems | windows
advisories | CVE-2015-0097
MD5 | e59aef6fcb1d5f48ddca084672ddfa46
Microsoft Windows Help / Support Center DoS / Overflow
Posted Apr 7, 2014
Authored by Eduardo Braun Prado

Microsoft Windows Help and Support Center contains multiple vulnerabilities that can be exploited by attackers to run arbitrary code when a drag and drop operation is performed on a webpage, cause a buffer overrun condition, and Denial of Service (DOS). Proof of concept code included.

tags | exploit, denial of service, overflow, arbitrary, vulnerability, proof of concept
systems | windows
MD5 | f1afbabc3b40c5647ffc10552fe483e5
Microsoft Windows Help HLP File Loading Hijack
Posted Apr 7, 2014
Authored by Eduardo Braun Prado

Microsoft Windows Help (Winhlp32) contains an HLP file loading hijack vulnerability because programs that invokes help from HLP files passes relative paths, causing it to load HLP files from the directory in which it was started, if they exist. Proof of concept code included.

tags | exploit, proof of concept
systems | windows
MD5 | 651f3c5e49bb186b583e94dfe44d6c83
MS13-071 Microsoft Windows Theme File Handling Arbitrary Code Execution
Posted Sep 20, 2013
Authored by juan vazquez, Eduardo Braun Prado | Site metasploit.com

This Metasploit module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows 2003. The vulnerability exists in the handling of the Screen Saver path, in the [boot] section. An arbitrary path can be used as screen saver, including a remote SMB resource, which allows for remote code execution when a malicious .theme file is opened, and the "Screen Saver" tab is viewed.

tags | exploit, remote, arbitrary, code execution
systems | windows, xp
advisories | CVE-2013-0810, OSVDB-97136
MD5 | 5b024ccf59e4977c948fb7340c41f235
Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack
Posted Jul 5, 2013
Authored by Luigi Auriemma, Eduardo Braun Prado

Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.

tags | exploit, vulnerability, proof of concept
systems | linux, windows, 9x
MD5 | 69b1395597072062ce9c6404beb68260
First Remote Code Execution Vulnerablity Affecting Microsoft Notepad
Posted Mar 10, 2010
Authored by Eduardo Braun Prado | Site secumania.net

The MS HTML Help control activex is prone to a remote CHM help file hijack vulnerability when applications invoke help. Multiple built-in applications are vulnerable to this. The impact of the vulnerability is the loading of the incorrect CHM help file when it resides in the same directory the application invoking help starts in. This proof of concept exploit leverages Notepad to demonstrate the vulnerability.

tags | exploit, remote, activex, proof of concept
MD5 | 3f0edb83fb8c525b3c7a93556ab16cc7
xpFireConvince.txt
Posted Apr 1, 2006
Authored by Eduardo Braun Prado

By naming a file without a name, the Windows XP firewall may inadvertently trick a user into allowing a malicious application to run.

tags | advisory
systems | windows, xp
MD5 | b9b91a76ab66e00166b5897ec186d1e7
MirabilizICQ.txt
Posted Feb 20, 2006
Authored by Eduardo Braun Prado

A bug in Mirabiliz ICQ could allow an attacker to trick users into executing files inside an uploaded directory.

tags | advisory
MD5 | 3f206b58cafc29cdbb11e29e76240871
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close