what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from porkythepig

Email addressporkythepig at anspi.pl
First Active2006-03-08
Last Active2007-12-20
hp-activex.txt
Posted Dec 20, 2007
Authored by porkythepig

Yet another remotely exploitable flaw has been discovered in the HP notebook preinstalled software. This particular vulnerability takes advantage of an Active-X control. Exploits included.

tags | exploit, activex
SHA-256 | 0938f61f030446326f1fe8a640b91330ddb96c48edfd101bc39fe524d7822fbf
hpcompaq-exec.txt
Posted Dec 12, 2007
Authored by porkythepig

Multiple Hewlett-Packard notebook series are prone to a remote code execution attack. The manufacturer's preinstalled software contains a critical flaw within the software built to support one-touch button quick feature access. This exploit takes advantage of this issue.

tags | exploit, remote, code execution
SHA-256 | f8a884d19a803a1f671c6424c652cfe1d289e0a558f068b80368e115afd2c057
mssploit.txt
Posted Jan 24, 2007
Authored by porkythepig

Microsoft Visual C++ 6.0 is prone to a stack based memory corruption vulnerability during the processing of .RC resource files. Exploit included.

tags | exploit
SHA-256 | 8696e5a5416cd2f40b051e194616ca6a631f2a6140fa34b75255ec156816cf72
hpj-x01.cpp
Posted Jan 20, 2007
Authored by porkythepig

Proof of concept exploit for the .HPJ project file buffer overflow vulnerability in Microsoft Help Workshop version 4.03.0002.

tags | exploit, overflow, proof of concept
SHA-256 | 2176350da42f6699691043843040ceb6141b11c25ebe25cf004b226832127ea2
mhw-hpj.txt
Posted Jan 20, 2007
Authored by porkythepig

Microsoft Help Workshop is prone to stack based memory corruption vulnerability during processing (.HPJ) help project files. This vulnerability could be exploited to execute arbitrary code within the remote user context.

tags | advisory, remote, arbitrary
SHA-256 | 9526f9c77e0380edc2c0eb2b0975468780e4be72aa61b3f7d912c2d771fd4f8e
cnt-exploit.txt
Posted Jan 20, 2007
Authored by porkythepig

There is a stack based memory corruption flaw in Microsoft Help Workshop version 4.03.0002 while processing .CNT Help Contents files.

tags | exploit
SHA-256 | 28e74c4a2361a0b2c829f60c9ac1aabe3af7d1601df5e32a1159e08b9c459611
javaDoS.txt
Posted Mar 8, 2006
Authored by porkythepig

There is a vulnerability in the Internet Explorer java applet handling engine. It occurs while running the Sun Microsystems Java VM and is caused by improper HTML 'INPUT' control focus handling.

tags | advisory, java
SHA-256 | 7fc80c9a3057321503601fb3558a3314e44fb3cb052789ba63e99397266d1ddd
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close