exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from webDEViL

Email addressw3bd3vil at gmail.com
First Active2008-09-17
Last Active2014-11-17
Safari 8.0 Crash Proof Of Concept
Posted Nov 17, 2014
Authored by webDEViL

Safari version 8.0 on OS X 10.10 crash proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | apple, osx
SHA-256 | 437eafb52bef71c294744b306d459d357ec21d1f6d232fc3c079998fd5a24784
Firefox onreadystatechange Event DocumentViewerImpl Use After Free
Posted Aug 8, 2013
Authored by webDEViL, sinn3r, juan vazquez, temp66, Nils | Site metasploit.com

This Metasploit module exploits a vulnerability found on Firefox 17.0.6, specifically an use after free of a DocumentViewerImpl object, triggered via an specially crafted web page using onreadystatechange events and the window.stop() API, as exploited in the wild on 2013 August to target Tor Browser users.

tags | exploit, web
advisories | CVE-2013-1690, OSVDB-94584
SHA-256 | e39e25d6845ff273ea20decb29f0fdfaca25648ab187f57278e8c2b631ce94c2
Invision Power Board 3.3.4 Unserialize REGEX Bypass
Posted Nov 8, 2012
Authored by webDEViL

Invision Power Board versions 3.3.4 and below unserialize REGEX bypass exploit.

tags | exploit, bypass
SHA-256 | ad210687f42887baff2de52193e65980c72d969f3690120bb695a84ed8356c42
Excel SLYK Format Parsing Buffer Overflow
Posted Aug 9, 2011
Authored by webDEViL

Excel SLYK format parsing buffer overrun proof of concept denial of service exploit.

tags | exploit, denial of service, overflow, proof of concept
advisories | CVE-2011-1276
SHA-256 | c515ec3b3b89acbd7783600d443052f2af54c8a1f404a889d035b223d4e2871f
Microsoft Office Excel Buffer Overflow
Posted Apr 29, 2011
Authored by webDEViL

Microsoft Office Excel Axis properties record parsing buffer overflow proof of concept exploit that leverages the issue discussed in MS11-021.

tags | exploit, overflow, proof of concept
advisories | CVE-2011-0978
SHA-256 | e2b8a20317fcb2c65a108738183b164cb42f48896b69cc8d703724161298a74a
Adobe ColdFusion - Directory Traversal
Posted Mar 16, 2011
Authored by webDEViL | Site metasploit.com

This Metasploit module exploits a directory traversal bug in Adobe ColdFusion. By reading the password.properties a user can login using the encrypted password itself. This should work on version 8 and below.

tags | exploit
advisories | CVE-2010-2861, OSVDB-67047
SHA-256 | 30d24479f36de7b6cb78e0669b676ca8ad8705ff92ec0b9d808502f823261cc0
Windows Task Scheduler Privilege Escalation
Posted Nov 24, 2010
Authored by webDEViL

Microsoft Windows task scheduler privilege escalation exploit.

tags | exploit
systems | windows
SHA-256 | bca5b384d4ee263828f222a4b6f60e975a131a639b63689c25912cab251c49d9
Microsoft Excel Stack Overflow
Posted Jul 15, 2010
Authored by webDEViL

Microsoft Excel 0x5D record stack overflow exploit.

tags | exploit, overflow
advisories | CVE-2010-0822
SHA-256 | 663a8f6c7c8c3ffa90aea8fb5d6529116f428e29f3dbb8e5e8939cc3d1fba554
Real Player 12.0.0.879 Exploit
Posted Jul 10, 2010
Authored by webDEViL

Real Player version 12.0.0.879 0-day exploit for Windows XP.

tags | exploit
systems | windows
SHA-256 | a9c693f51a571de7cd8bcdc9f7a606bd8e2f9369e1646f386955b0d443cf517d
Microsoft Windows 2003 EOT File BSOD Crash Exploit
Posted Aug 11, 2009
Authored by webDEViL

Microsoft Windows 2003 EOT file BSOD crash exploit.

tags | exploit
systems | windows
SHA-256 | 514c42533cf5970170afb6c5ce199f2f1f171f1e7825a7d778f2d2819af3fc7d
Apple QuickTime CRGN Atom Overflow
Posted Jun 15, 2009
Authored by webDEViL

Apple QuickTime CRGN Atom stack overflow exploit that creates a malicious .mov file.

tags | exploit, overflow
systems | apple
SHA-256 | fb8e543a1b14d05da7d1eaf72adb2dc68be619562fc03383b54d35808421f260
Apple QuickTime Image Description Atom Sign
Posted Jun 4, 2009
Authored by webDEViL

Apple QuickTime image description atom sign extension vulnerability proof of concept exploit.

tags | exploit, proof of concept
systems | apple
SHA-256 | 5ad33984128407af0101e9e88f8c89419b476dab4ef79fc88483a2e37a5530da
Internet Explorer 7 Memory Corruption For Win2k3 SP2
Posted Feb 20, 2009
Authored by webDEViL

Microsoft Internet Explorer 7 memory corruption exploit that leverages the vulnerability listed in MS09-002. Written for 2K3 SP2.

tags | exploit
SHA-256 | ea20d5bbe51604a1a76dd0af9b738fa01461f0c874d138c5bd4b6d80a63953a3
Amaya Web Browser Buffer Overflow
Posted Dec 15, 2008
Authored by webDEViL

Amaya Web Browser versions 10.0.1 and 10.1-pre5 buffer overflow proof of concept exploit.

tags | exploit, web, overflow, proof of concept
SHA-256 | cb4e1f5e826cad6a48620c692036cfe39e35ce46593f1dffe98c6adbc4056061
banking-flaws.pdf
Posted Nov 4, 2008
Authored by webDEViL

Whitepaper entitled Internet Banking Flaws In India.

tags | paper
SHA-256 | 5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
twiki-exec.txt
Posted Sep 22, 2008
Authored by webDEViL

TWiki versions 4.2.2 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | a99d6105ce282f0c5ea462dfe5cab8682dcdcb326e1b0bce1acc9cd7836ec976
technote-rfi.txt
Posted Sep 17, 2008
Authored by webDEViL

Technote 7 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 689ca3e963f221dc3daa0aeccdbcb970cb07b86a9ea3d539f1369ad3b65be698
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close