what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Stuart Pearson

Email addressspearson at computerterrorism.com
First Active2005-04-18
Last Active2012-01-13
Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution
Posted Jan 13, 2012
Authored by Benjamin Tobias Franz, Stuart Pearson, Sam Sharps | Site metasploit.com

This bug is triggered when the browser handles a JavaScript 'onLoad' handler in conjunction with an improperly initialized 'window()' JavaScript function. This exploit results in a call to an address lower than the heap. The javascript prompt() places the shellcode near where the call operand points to. The module calls prompt() multiple times in separate iframes to place our return address. The module hides the prompts in a popup window behind the main window and then it will spray the heap a second time with the shellcode and point the return address to the heap. It then uses a fairly high address to make this exploit more reliable. IE will crash when the exploit completes. Also, please note that Internet Explorer must allow popups in order to continue exploitation.

tags | exploit, javascript, shellcode
advisories | CVE-2005-1790
SHA-256 | dfbe6b34adf9a6a1783c641f7329756e98c1bb69d235bba9e36f55dd9ec0f6b0
CT09-01-2007.txt
Posted Jan 14, 2007
Authored by Stuart Pearson | Site computerterrorism.com

Microsoft Outlook is a popular personal communication manager that provides end users with a unified place to manage e-mail, calendar and contact information. As part of its standard offering, Outlook also includes an Advanced Search facility (Finder.exe) enabling end-users to query any aspect of their repository information. Unfortunately, it transpires that Outlook/Finder is susceptible to a remote Buffer overflow vulnerability, when processing the contents of a specially crafted Office Saved Search (.oss) file.

tags | advisory, remote, overflow
advisories | CVE-2007-0034
SHA-256 | 28bbbedc553e8ff09d850b01cf55df16440175c5cebf3bd1df3d95a9fa647df5
CT12-09-2006.txt
Posted Sep 13, 2006
Authored by Stuart Pearson

Adobe Flash Player versions 8.0.24.0 and below, Adobe Flash Professional 8, Flash Basic, Adobe Flash MX 2004, and Adobe Flex 1.5 suffer from a remote code execution vulnerability through the simple invocation of a maliciously constructed web page.

tags | advisory, remote, web, code execution
SHA-256 | c2e62732e89a3add14dd48ce53da3fbb131196dafa28c9ee09bbf5a3edb3beb8
CT12-09-2006-2.txt
Posted Sep 13, 2006
Authored by Stuart Pearson | Site computerterrorism.com

Microsoft Publisher versions 2000, 2002, and 2003 suffer from a remote, arbitrary code execution vulnerability that yields full system access running in the context of a target user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2006-0001
SHA-256 | b11478ca1b4f1ca6846df7f7f3ed6ee5ff4d59deabf85210e4d91b95bb0635c0
poc.tgz
Posted Nov 30, 2005
Authored by Stuart Pearson | Site computerterrorism.com

Proof of concept html that demonstrates the code execution flaw in the Microsoft Internet Explorer JavaScript Window() vulnerability previously considered to be simply a denial of service flaw.

tags | exploit, denial of service, javascript, code execution, proof of concept
advisories | CVE-2005-1790
SHA-256 | 617a8516e87cb9951f301659df5d7232892ba0344c9836a98fce3a000bf703ef
msjet.c
Posted Apr 18, 2005
Authored by Stuart Pearson | Site computerterrorism.com

Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll. Tested against Windows 2000 SP4, Windows XP SP0 and SP1.

tags | exploit
systems | windows
SHA-256 | 4dae4b7e50491725c307cdd1f876883074a7cc46887580c6ace3bd07a956b421
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close