exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 86 RSS Feed

Files from Francis Provencher

First Active2009-08-25
Last Active2017-01-12
Adobe Flash 24.0.0.186 Code Execution
Posted Jan 12, 2017
Authored by Francis Provencher

This documented vulnerability allows a remote attacker to execute malicious code or access to a part of the dynamically allocated memory using a user interaction visiting a Web page or open a specially crafted SWF file, an attacker is able to create an "out of bound" memory corruption. A file with an "ActionRecord" structure that contains an invalid value in "ActionGetURL2" could lead to remote code execution in the context of the current user. Proof of concept code included.

tags | exploit, remote, web, code execution, proof of concept
advisories | CVE-2017-2930
SHA-256 | a82caebb5c5fc9804ff5b2892d98866fc05cb593b2b4a76497466e64a24e0c5a
Cisco Webex Player T29.10 Use-After-Free Memory Corruption
Posted Oct 13, 2016
Authored by Francis Provencher

Cisco Webex Player version T29.10 suffers from a .wrf use-after-free memory corruption vulnerability.

tags | exploit
systems | cisco
advisories | CVE-2016-1464
SHA-256 | e0ff7bc989af814b4c67fc1a215c0c9c5b753220fb884757fa81ba1faab1c1c4
Cisco Webex Player T29.10 Out-Of-Bounds Memory Corruption
Posted Oct 13, 2016
Authored by Francis Provencher

Cisco Webex Player version T29.10 suffers from a .arf out-of-bounds memory corruption vulnerability.

tags | exploit
systems | cisco
advisories | CVE-2016-1415
SHA-256 | a011619db8c6fd4ad93cbef076bea08ee8225e2099c8f79385d859e2926070b0
Adobe Flash Player 23.0.0.162 ConstantPool Memory Corruption
Posted Oct 13, 2016
Authored by Francis Provencher

Adobe Flash Player version 23.0.0.162 suffers from a .swf ConstantPool critical memory corruption vulnerability.

tags | exploit
advisories | CVE-2016-4273
SHA-256 | b21e6f4153b4cfbee102aa28f303f491feffd16661307457dbafe88dcf09dcca
Microsoft Office Word 2013 / 2016 Denial Of Service
Posted Aug 16, 2016
Authored by Francis Provencher

Microsoft Office Word 2013 and 2016 suffer from a sprmSdyaTop denial of service vulnerability as described in MS16-099.

tags | exploit, denial of service
advisories | CVE-2016-3316
SHA-256 | 1d08affda8ea6047713326103a60d74176d11268a3f9b5d83d8075f46d7fae20
Apple Quicktime FPX / PSD File Parsing Memory Corruption
Posted Mar 30, 2016
Authored by Francis Provencher

Apple Quicktime versions prior to 7.7.79.80.95 suffer from .fpx and .psd file parsing memory corruption vulnerabilities. Multiple proof of concepts included.

tags | exploit, vulnerability, proof of concept
systems | linux, apple
advisories | CVE-2016-1767, CVE-2016-1768, CVE-2016-1769
SHA-256 | 75dc3f56f008a8dff11a4e6782315336b04b08630b92550374fb4ef2d5ccb3a4
Adobe Photoshop CC 16.1.1 / Bridge CC 6.1.1 Memory Corruption
Posted Feb 12, 2016
Authored by Francis Provencher

Adobe Photoshop CC versions 16.1.1 (2015.1.1) and below and Bridge CC versions 6.1.1 and below suffer from multiple memory corruption vulnerabilities. Proof of concept files included.

tags | exploit, vulnerability, proof of concept
systems | linux
advisories | CVE-2016-0951, CVE-2016-0952, CVE-2016-0953
SHA-256 | c47fea6ad11b93329fb19de9eea9fb407d4dffd7dd33d618f48d7e6208f37393
WPS Office .xls Heap Memory Corruption
Posted Feb 2, 2016
Authored by Francis Provencher

WPS Office versions prior to 2016 suffer from a .xls heap memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | 476cf15eec088f70e8100ad310c3ea2867b0456828496bd8916bb8ae5071d3ea
WPS Office .ppt drawingContainer Memory Corruption
Posted Feb 2, 2016
Authored by Francis Provencher

WPS Office versions prior to 2016 suffer from a .ppt drawingContainer length header handling issue that leads to memory corruption.

tags | exploit
systems | linux
SHA-256 | a411e27867ca1ba40e37aa3138020d8f7128ac0da4a8986309e91e0f7b740381
WPS Office .doc OneTableDocumentStream Memory Corruption
Posted Feb 2, 2016
Authored by Francis Provencher

WPS Office versions prior to 2016 suffer from a .doc handling heap memory corruption issue when dealing with an invalid value in the OneTableDocumentStream data section.

tags | exploit
systems | linux
SHA-256 | 76a44964834b2694d4565f55fc042db4605bc079d54cd337da01eb554b69d3ea
WPS Office .ppt Heap Memory Corruption
Posted Feb 2, 2016
Authored by Francis Provencher

WPS Office versions prior to 2016 suffer from a .ppt handling heap memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | c923f6074303a0b1c0816b423632b29ed089c5110ee83b92336cde422deca0ad
VLC Media Player 2.2.1 Heap Memory Corruption
Posted Jan 28, 2016
Authored by Francis Provencher

VLC Media Player version 2.2.1 suffers from a heap memory corruption vulnerability when handling malformed mp4 files.

tags | exploit
systems | linux
SHA-256 | 43dc83338e58a0b5197ace97ec0c305748e3b03d919076f55f3174e828eb1787
Foxit Reader 7.1.3.320 Memory Corruption
Posted Apr 29, 2015
Authored by Francis Provencher

Foxit Reader versions 7.1.3.320 and below suffer from a pdf parsing memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | bd04944c6132e51165de2cd47879e4605bc439659bd47936955cab36552e79aa
Foxit Products GIF Conversion LZWMinimumCodeSize Memory Corruption
Posted Mar 12, 2015
Authored by Francis Provencher

An error when handling LZWMinimumCodeSize can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.

tags | exploit
systems | linux
SHA-256 | f0c85a37d1c0b5a864932883f936775184d1bcb3b408cff939fbe3ce6e6c3926
Foxit Products GIF Conversion DataSubBlock Memory Corruption
Posted Mar 12, 2015
Authored by Francis Provencher

An error when handling the Size member of a GIF DataSubBlock data structure can be exploited to cause memory corruption via a specially crafted GIF file in Foxit products.

tags | exploit
systems | linux
SHA-256 | 2facc4e061e1780dcb0bd1fda6ce9fa298d7501977716091944f0a23ec52e6d6
Microsoft Windows MS15-020 Memory Corruption
Posted Mar 12, 2015
Authored by Francis Provencher

Microsoft Windows suffers from a text services related memory corruption vulnerability as outlined in MS-15-020.

tags | exploit
systems | linux, windows
SHA-256 | 0ecbc49866334b3e8e307ae1fa0c605feb34a13137c5fbe89d520c89305150fc
Oracle Outside-In DOCX File Parsing Memory Corruption
Posted Apr 18, 2014
Authored by Francis Provencher

Oracle Outside-In suffers from a memory corruption vulnerability when parsing docx files.

tags | exploit
systems | linux
SHA-256 | 79fc87eb887121eb743d08718db0785e9a718662ed4993f3ba621df1404086ad
Cool PDF Image Stream Buffer Overflow
Posted Mar 20, 2013
Authored by Francis Provencher, Chris Gabriel, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image stream. This Metasploit module has been tested successfully on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP1.

tags | exploit, overflow
systems | windows
advisories | CVE-2012-4914, OSVDB-89349
SHA-256 | b2cb27956204683b3f3b2b5177e1be282a14b7dbbf83dcb82f490a969c5a32f1
Novell Groupwise Internet Agent Overflow
Posted Nov 14, 2012
Authored by Francis Provencher

An overflow error occurs in GroupWise Internet Agent (gwia.exe) when the LDAP service process receives an overly long BIND Request. Successful exploitation may allow execution of arbitrary code. Versions 8.0.2 HP3 and 2012 are affected. Proof of concept code included.

tags | exploit, overflow, arbitrary, proof of concept
SHA-256 | 98eedb4ebf1ead9211c4ee8e6803edef89885b9d7e3884dac106b273c25e0aa7
IrfanView 4.33 RLE Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a RLE image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | c7280f0bbcb5f8e1f959afbe12d0a3869c8de4db879212848a1273b635432924
IrfanView 4.33 TIF Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a TIF image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 72b8882cb0faee2b7373d6e6e4b71c5ed206922b7475df22542144a2d004de0d
Cyme ChartFX Client Server Array Indexing
Posted Oct 4, 2012
Authored by Francis Provencher

Cyme ChartFX client server suffers from a vulnerability that is caused due to an indexing error in the "ShowPropertiesDialog()" method (ChartFX.ClientServer.Core.dll) of the ChartFX ActiveX Control. This can be exploited to write a single byte value to an arbitrary memory location via the "pageNumber" parameter. Successful exploitation may allow execution of arbitrary code.

tags | exploit, arbitrary, activex
SHA-256 | 5710bd2cdef00b1beebd3eb5db71e3e75a63f51295473d4c9d8eb9549ef60db6
Novell Groupwise 8.0.2 HP3 / 2012 Integer Overflow
Posted Sep 17, 2012
Authored by Francis Provencher

Novell Groupwise versions 8.0.2 HP3 and 2012 suffers from an integer overflow vulnerability.

tags | exploit, overflow
SHA-256 | f82e2a8cfbd871bf746381353b9d597a48d059ad35b2d45116b4b230fc917e0f
Adobe Photoshop CS6 PNG Parsing Heap Overflow
Posted Sep 1, 2012
Authored by Francis Provencher

Adobe Photoshop CS6 version 13.x suffers from a PNG parsing heap overflow vulnerability. Proof of concept PNG file include.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 80a53ff72f5790f602424285c5a3993b1990d8e6e206c276ea6e96b7e79484e5
Oracle Outside-In FPX File Parsing Heap Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-In FPX file parsing suffers from a heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 3ffbb6827d9d2382b9a76b9305e37a7d6d37e039b353eabc680e393957f21ada
Page 1 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close