what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Paul From Greyhats

Email addresspaul at greyhats.cjb.net
First Active2004-07-11
Last Active2005-02-28
firefoxFlaw.txt
Posted Feb 28, 2005
Authored by Paul From Greyhats | Site greyhatsecurity.org

A minor security vulnerability exists in the way that Firefox handles cross-domain image dragging. Versions 1.0.0 and 1.0.1 are affected.

tags | advisory
SHA-256 | 604755feb72dffe2d9395f16b529878dd681ec358f99151df391db07efaa368d
MSXPSP2-ieEXP.txt
Posted Jan 1, 2005
Authored by http-equiv, Michael Evanchik, Paul From Greyhats | Site michaelevanchik.com

Internet Explorer HTML Help Control Local Zone bypass exploit that can be used against Microsoft Windows XP versions SP2 and below.

tags | exploit, local
systems | windows
SHA-256 | f0270bd2a77960daa6990750e5a46b0c50df9742d4ff6f78a288c4f82917ef38
msieDHTML.txt
Posted Dec 30, 2004
Authored by Paul From Greyhats

The MSIE DHTML Edit Control code is susceptible to a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | a2fa0ec2b881347447d64fdd1223cffc003f89298b518e83dc245a833c9ccd93
crossZone.txt
Posted Jul 20, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

IEXPLORE.EXE file version 6.0.2800.1106 and MSHTML.DLL file version 6.00.2800.1400 are both susceptible to cross site/zone scripting flaws.

tags | advisory
SHA-256 | adf292c1753dbb9a45642cd37fcc3a60abe2952a1004a4a51d48cb8e38659b95
methodCache.txt
Posted Jul 17, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

Microsoft Internet Explorer gives too much trust to the location variant when it comes to method cache.

tags | advisory
SHA-256 | dfcc5befe5b4cbb0775285dc6081d07b23ee805c7630f7a4a7e2a864aef1038d
hotmailXSS.txt
Posted Jul 15, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

Microsoft Hotmail is vulnerable to a cross site scripting attack.

tags | advisory, xss
SHA-256 | fac53ad1625eb0829847db8b6e5be732ea19aec830faef6e35e5f8c2e301bde9
msoeJavascript.txt
Posted Jul 11, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

Microsoft Outlook Express is susceptible to a vulnerability which will allow javascript to be execute in the message window. Tested against Microsoft Outlook Express version 6.0.2800.1123 on Microsoft Windows XP SP2.

tags | advisory, javascript
systems | windows
SHA-256 | 154f9ceed006b384227ef5e980324be03cdb572bf6e83c732153c6d9bca688df
winmediaExec.txt
Posted Jul 11, 2004
Authored by Paul From Greyhats | Site geryhats.cjb.net

A flaw exists in Windows Media Player that allows a malicious asx file to be executed running javascript in a local zone. Tested against MSDXM.DLL file version 6.4.09.1128 on Microsoft Windows 2000.

tags | advisory, local, javascript
systems | windows
SHA-256 | 4f558821d20390a8682b804e4d30cbba5b5a8295e1f45ed01601ec06dbd27d24
hijackclick3.txt
Posted Jul 11, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

A flaw in Microsoft Internet Explorer allows malicious remote users the ability to manipulate access controls in popup.show() resulting in executable mouse click actions.

tags | advisory, remote
SHA-256 | 478d2ec0688e6a3727f322bebdb3a65d2f80c8b71d4207953847cde3ef686b65
spoofVulnMSIE.txt
Posted Jul 11, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

MSIE suffers from a file spoofing vulnerability that tricks the browser into opening a file as something it is not. Tested against: IEXPLORE.EXE file version 6.0.2800.1106, MSHTML.DLL file version 6.00.2800.1400, Microsoft Windows XP SP2.

tags | advisory, spoof
systems | windows
SHA-256 | 78bd7580033ce5f26217a1ea1b16f2a3d2c5b54744f10ad739d696ee11b98ded
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close