what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Nanika

First Active2005-04-19
Last Active2010-04-01
Internet Explorer DTHML Behaviors Use After Free
Posted Apr 1, 2010
Authored by Nanika, Trancer | Site metasploit.com

This Metasploit module exploits a use-after-free vulnerability within the DTML behaviors functionality of Microsoft Internet Explorer versions 6 and 7. This bug was discovered being used in-the-wild and was previously known as the "iepeers" vulnerability. The name comes from Microsoft's suggested workaround to block access to the iepeers.dll file. According to Nico Waisman, "The bug itself is when trying to persist an object using the setAttribute, which end up calling VariantChangeTypeEx with both the source and the destination being the same variant. So if you send as a variant an IDISPATCH the algorythm will try to do a VariantClear of the destination before using it. This will end up on a call to PlainRelease which decref the reference and clean the object." NOTE: Internet Explorer 8 and Internet Explorer 5 are not affected.

tags | exploit
advisories | CVE-2010-0806
SHA-256 | 2050b221f455e1fa58a8d196ecf708064b18b0b04314d24c17d3d8356494d06e
weURL.txt
Posted Jul 9, 2006
Authored by Nanika | Site hitcon.org

When Windows Explorer (explorer.exe) parses a malformed .url file it is susceptible to a denial of service.

tags | advisory, denial of service
systems | windows
SHA-256 | c3856e94dae33fcecb3dd9550d99ff03a19ebbd7adf295e105b72716f12a1615
excel-ohday.txt
Posted Jul 9, 2006
Authored by Nanika

Excel 2000/XP/2003 suffers from a vulnerability in repair mode.

tags | advisory
SHA-256 | cd59caca350390059cebc85f53cc911f37183dc30a7fcad05e9b5ef91c9b59e0
Nanika.tgz
Posted Jul 9, 2006
Authored by Nanika

Proof of concept Excel 2000/XP/2003 exploit.

tags | exploit, proof of concept
SHA-256 | b4994db39df4f6c26fbf9f58890ffcbc1fffdb06e037a36c4f5ac527f24b8885
msjet101.c
Posted Apr 19, 2005
Authored by Nanika | Site chroot.org

This is a slightly modified version of Stuart Pearson's original exploit for the malformed MDB parsing vulnerabilities in Microsoft Access.

tags | exploit, vulnerability
SHA-256 | 21907bea8baebb0eabf8d5cb55470e6622f00c5110265a1be7900b93ce98dd5a
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close