exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from Krystian Kloskowski

Email addressh07 at interia.pl
First Active2006-06-26
Last Active2010-08-16
Apple QuickTime 7.6.6 Invalid SMIL URI Buffer Overflow
Posted Aug 16, 2010
Authored by Krystian Kloskowski, jduck | Site metasploit.com

This Metasploit module exploits a buffer overflow in Apple QuickTime 7.6.6. When processing a malformed SMIL uri, a stack-based buffer overflow can occur when logging an error message.

tags | exploit, overflow
systems | apple
advisories | CVE-2010-1799
SHA-256 | eb6f5cf465624dd5e4de136d92a011d658eff5c54e74834f9b55ac758fdc68b2
Apple Safari 4.0.5 parent.close() Code Execution
Posted May 12, 2010
Authored by Krystian Kloskowski

Apple Safari version 4.0.5 parent.close() memory corruption code execution exploit.

tags | exploit, code execution
systems | apple
SHA-256 | ec04bbdd890c422fd0bf99cfa6580ba3c2940087c9f7ba1dbbb3e82ee2f42968
flashget-overflow.txt
Posted Aug 13, 2008
Authored by Krystian Kloskowski

FlashGet version 1.9 FTP PWD Response remote proof of concept buffer overflow exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 4717be597074ab3666f0b2540eefa529deec56009bc49551b3a090ceed9c8bd3
dap-overflow.txt
Posted Jul 10, 2008
Authored by Krystian Kloskowski

Download Accelerator Plus (DAP) version 8.x local buffer overflow exploit that creates a malicious .m3u file. Spawns calc.exe.

tags | exploit, overflow, local
SHA-256 | 6f546dc00e082a471c7ae2f75f1191a548b07ff1fb9cb103ca056da71d1971e6
caarcserve-overflow.txt
Posted Mar 17, 2008
Authored by Krystian Kloskowski

CA BrightStor ARCserve Backup version r11.5 ActiveX remote buffer overflow exploit.

tags | exploit, remote, overflow, activex
SHA-256 | 686426ea3916584ba4cadfae8aaf21ecc6342864c5ae1657f6404f85c6eaeb16
yahoomusic-overflow3.txt
Posted Feb 4, 2008
Authored by Krystian Kloskowski

Yahoo! Music Jukebox version 2.2 AddImage() ActiveX buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 6947ffae23313b8e716a14e1e54d557674e4e5851ab0b5fd48aae788c8abe89e
yahoomusic-overflow.txt
Posted Feb 4, 2008
Authored by Krystian Kloskowski, exceed

Yahoo! Music Jukebox version 2.2 AddImage() ActiveX buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | df37882abb85f6ce73587340034ce330e71fcebeb93beb8807a3f219f98866ff
comodo-exec.txt
Posted Jan 24, 2008
Authored by Krystian Kloskowski

Comodo AntiVirus version 2.0 ExecuteStr() remote command execution exploit.

tags | exploit, remote
SHA-256 | 860eaa5b7ca93f42fedbecfe93bbdec266a10c29dab3d1d52b87859defc21004
aquick-seh.txt
Posted Nov 27, 2007
Authored by Krystian Kloskowski

Apple QuickTime versions 7.2 and 7.3 RTSP response remote SEH overwrite proof of concept exploit.

tags | exploit, remote, proof of concept
systems | apple
SHA-256 | 1abb1003c68a86a94d9fd143e56f2c034b7307792175cfce74fc912a96b3ba15
jetaudio-local.txt
Posted Oct 15, 2007
Authored by Krystian Kloskowski

jetAudio version 7.x local SEH overwrite exploit that uses a malformed .m3u file.

tags | exploit, local
SHA-256 | 9cbbf505e4562de3e43a9ccb55cfb1cecdd917e362c69a59686131211ab1b251
xitami-overflow.txt
Posted Sep 25, 2007
Authored by Krystian Kloskowski

Xitami Web Server version 2.5 remote buffer overflow exploit that spawns calc.exe.

tags | exploit, remote, web, overflow
SHA-256 | 60660998d133283bc88a1ec5a304f2ebfe9239ed5de4ef86b8b7f70b2f86b6e5
jetaudio-exec.txt
Posted Sep 20, 2007
Authored by Krystian Kloskowski

jetAudio version 7.x ActiveX code execution exploit that makes use of DownloadFromMusicStore().

tags | exploit, code execution, activex
SHA-256 | 5625d7033969e6c0c3e5ba1813662b2381af214cef565714cce7e8a9033a88cd
msdxmedia-exec.txt
Posted Aug 11, 2007
Authored by Krystian Kloskowski

Micrsoft DXMedia SDK6 "SourceUrl" ActiveX remote code execution exploit.

tags | exploit, remote, code execution, activex
SHA-256 | 8440922a3a5e7b87aaf529b1f60ac8a8c3362ddc802ba0be6e2692afabf1b754
virc-oday.txt
Posted Jul 7, 2007
Authored by Krystian Kloskowski

ViRC version 2.0 JOIN response remote SEH overwrite exploit. Tested on Visual IRC 2.0 / 2k SP4 Polish. Executes calc.exe.

tags | exploit, remote
SHA-256 | c6782288f12a3ccf5a191e0a8e8953d94108243ace96aad60878b3fe1aadaddc
eudora-seh-overwrite.txt
Posted May 31, 2007
Authored by Krystian Kloskowski

Eudora version 7.1.0.9 (IMAP FLAGS) remote SEH overwrite exploit that executes calc.exe.

tags | exploit, remote, imap
SHA-256 | c484749017d563fcc11f7881719d8778f52e3cf736979fc61598546693928422
eudora71-overflow.txt
Posted May 17, 2007
Authored by Krystian Kloskowski

Eudora version 7.1 SMTP ResponseRemote remote buffer overflow exploit that spawns calc.exe.

tags | exploit, remote, overflow
SHA-256 | dee4298443c6b9d9f415fc207a19503a11daee971e419b00b9f6a8fd6f8c4484
wftpd_exp.c
Posted Aug 27, 2006
Authored by Krystian Kloskowski

WFTPD server version 3.23 (SIZE) remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 7914ac75638a3567f909d4690b5f4cdaefdeaf62139121344bbc3778b0a2c588
easy-py.txt
Posted Aug 27, 2006
Authored by Krystian Kloskowski

Easy File Sharing ftp server version 2.0 remote proof of concept exploit.

tags | exploit, remote, proof of concept
SHA-256 | 600f9e36332033b9a64f2b63f27cdda2ed523db9b876baee3ee689a3652e8f64
CesarFTP099g-py.txt
Posted Jun 26, 2006
Authored by Krystian Kloskowski

CesarFTP 0.99g (MKD) remote buffer overflow exploit written in Python.

tags | exploit, remote, overflow, python
SHA-256 | 7d60c0f56642df3ce5a9064c2b901c45ffd58da4a1221862f3b9e8cda35ff116
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close