exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Marcin Ressel

First Active2009-11-18
Last Active2020-04-23
AMD Radeon DirectX 11 Driver 8.17.10.0871 Memory Corruption
Posted Apr 23, 2020
Authored by Marcin Ressel

AMD Radeon DirectX 11 Driver version 8.17.10.0871 suffers from a memory corruption vulnerability.

tags | exploit
SHA-256 | 0de14ea2d6e635df7244593dd7f398331162c4971243f548ce644e988a64bdf7
Microsoft Internet Explorer 111 CMarkup::DestroySplayTree Use-After-Free
Posted May 3, 2017
Authored by Marcin Ressel

Microsoft Internet Explorer 11 suffers from a CMarkup::DestroySplayTree use-after-free vulnerability.

tags | exploit
SHA-256 | 5dce039f3c0952ac842f5a2982be1c61994e5965e15d0ff81f3cda32b86fc4ce
Mozilla Firefox Use-After-Free
Posted Jan 13, 2017
Authored by Marcin Ressel

Mozilla Firefox versions prior to 50.1.0 use-after proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2016-9899
SHA-256 | a0abe49b2a8d81d50d03d1b3cab082178a4422664af16a7ab829a975ef39fb2f
Microsoft Internet Explorer 11.0.9600.18482 Use-After-Free
Posted Sep 14, 2016
Authored by Marcin Ressel

Microsoft Internet Explorer version 11.0.9600.18482 use-after-free exploit.

tags | exploit
SHA-256 | 0e3af4b4a6dbce4ae5a6cba4e7aaaba1d681fb748ed27e9320ff2812bf7d01f0
net2ftp Stable 0.98 Remote / Local File Inclusion
Posted Dec 9, 2010
Authored by Marcin Ressel

net2ftp version Stable 0.98 suffers from remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | b090055348374a5ab55d0c844227af2eb10073929561a312b0e8ecd2a0de6035
Opea 10.50 Integer Overflow
Posted Mar 3, 2010
Authored by Marcin Ressel

Opera versions 10.10 through 10.50 integer overflow exploit.

tags | exploit, overflow
SHA-256 | 9a1f1a9cf0bfc1ba896452fd1ab726e986267ff92d738bef82fa08ecdf80215a
Thunderbird / Seamonkey Denial Of Service
Posted Nov 18, 2009
Authored by Marcin Ressel

Mozilla Thunderbird version 2.0.0.23 and Seamonkey version 2.0 suffer from a null pointer dereference denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 9818409ac58b963655daac1ce56a25d83dee37dd7cbc574fc25f1b897f1935d2
Page 1 of 1
Back1Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    8 Files
  • 29
    Sep 29th
    14 Files
  • 30
    Sep 30th
    19 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close