exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Gynvael Coldwind

Email addressgynvael at vexillium.org
First Active2007-08-21
Last Active2011-01-12
Exploiting The Otherwise Non-Exploitable
Posted Jan 12, 2011
Authored by Gynvael Coldwind, Matthew Jurczyk

Whitepaper called Exploiting the otherwise non-exploitable - Windows Kernel-mode GS Cookies subverted.

tags | paper, kernel
systems | windows
SHA-256 | 9cb55c04b174ac68214accb5e07ace84657f40f962aea69afc09f7ac5daa6f55
GDT And LDT In Windows Kernel Vulnerability Exploitation
Posted Jan 18, 2010
Authored by Gynvael Coldwind, Matthew Jurczyk

Whitepaper called GDT and LDT in Windows kernel vulnerability exploit. This paper discusses using 1 or 4 byte write-what-where conditions to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0).

tags | paper, kernel
systems | windows
SHA-256 | 5c8da344b3b6b9b298c6abf88c6abc9b8388ea7855997e8d22f4bdd058f0fb20
firefox20011bmp-dos.txt
Posted Feb 18, 2008
Authored by Gynvael Coldwind

Opera version 9.50 beta and FireFox versions 2.0.0.11 suffer from a vulnerability during BMP file handling.

tags | advisory, denial of service
SHA-256 | 0fd7ba70c6bbc35bddaa4373858635fd6aa10424df74190fbc8037207d7c3efa
sdl-overflow.txt
Posted Jan 24, 2008
Authored by Gynvael Coldwind

SDL_Image versions 1.2.6 and below suffer from a GIF handling buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 013e44ffbd053ccc714332adb0917f693c76ce4e1a1854c18fcc279af2d8b8e3
opera9-dos.txt
Posted Dec 6, 2007
Authored by Gynvael Coldwind

Opera is vulnerable to a remote denial of service attack, using specially crafted BMP files, that causes the browser to freeze for a short amount of time (around 4 minutes on fast computer).

tags | advisory, remote, denial of service
SHA-256 | 93b879e9a06d7e933fad2efbb0ff9f866107dcf04c983da9154afa99bd7a2b12
magellan-traverse.txt
Posted Sep 7, 2007
Authored by Gynvael Coldwind

Magellan Explorer version 3.32 build 305 suffers from a remote directory traversal vulnerability. Proof of concept code included.

tags | exploit, remote, proof of concept, file inclusion
SHA-256 | e310a478305527fa2aa12b4bb1abf80a9eb24ad2d2f92d8240de3aa598e25bc6
xdiesel-traverse.txt
Posted Sep 7, 2007
Authored by Gynvael Coldwind

X-Diesel Unreal Commander version 0.92 suffers from a remote directory traversal vulnerability. Proof of concept code included.

tags | exploit, remote, proof of concept, file inclusion
SHA-256 | 5870174e59874a1e138c04a3fec453157f93e9da0d787391dcc503796e5d699d
tc701-traverse.txt
Posted Sep 7, 2007
Authored by Gynvael Coldwind

The Total Commander FTP client versions 7.01 and below suffer from a remote directory traversal vulnerability. Proof of concept code included.

tags | exploit, remote, proof of concept, file inclusion
SHA-256 | a7ea0b06af33c34252186cbffb41cb9f7c141a2e1b54c2551be1be4462e60615
blizzard-dos.txt
Posted Aug 30, 2007
Authored by Gynvael Coldwind

Blizzard StarCraft Brood War version 1.15.1 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 32a78f48606c7a8339245472c40865d4197517ce3a37de6dcb1e758a0288ee14
hispasec-unreal.txt
Posted Aug 24, 2007
Authored by Gynvael Coldwind | Site blog.hispasec.com

HISPASEC Security Advisory - X-Diesel Unreal Commander version 0.92 suffers from name spoofing and directory traversal vulnerabilities.

tags | advisory, spoof, vulnerability
SHA-256 | 4b6405903518d8cc539aa225d0ae78b40266ba8b21b84f35ab602aeb57c85e05
fileinfo-multi.txt
Posted Aug 21, 2007
Authored by Gynvael Coldwind

Fileinfo version 2.0.9, the lister plugin for Total Commander, suffers from input validation vulnerabilities. Prior versions may also be affected.

tags | advisory, vulnerability
SHA-256 | 9d82d6a7ac76205b121501b2e861c7404be7d611bcf04e454a41d9906704b47f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close