exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 118 of 118 RSS Feed

Files from Ivan Fratric

Email addressifratric at google.com
First Active2007-03-08
Last Active2023-03-20
Microsoft Internet Explorer textarea.defaultValue Memory Disclosure
Posted Mar 21, 2017
Authored by Ivan Fratric, Google Security Research

Microsoft Internet Explorer textarea.defaultValue suffers from a memory disclosure vulnerability.

tags | exploit
advisories | CVE-2017-0059
SHA-256 | ac793dbfcfd50f86e76daaec9db6ea8bbe858fab353e8120a1fd34fc827042c7
Google Chrome Layout Out-Of-Bounds Read
Posted Feb 24, 2017
Authored by Ivan Fratric, Google Security Research

Google Chrome suffers from an out-of-bounds read in layout.

tags | exploit
SHA-256 | 2d3757be67305e873ee9adecfd5373daa82c75610751deda2131394581490717
Microsoft Edge / Internet Explorer HandleColumnBreakOnColumnSpanningElement Type Confusion
Posted Feb 24, 2017
Authored by Ivan Fratric, Google Security Research

Microsoft Edge and Internet Explorer suffer from a type confusion in HandleColumnBreakOnColumnSpanningElement.

tags | exploit
advisories | CVE-2017-0037
SHA-256 | acb3a39defa5f6c4a6541be344f794bfefad5affcf45b6f3a062c6bf6cbb9b2b
Apple WebKit HTMLFormElement::reset() Use-After-Free
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Apple WebKit suffers from a use-after-free vulnerability in HTMLFormElement::reset().

tags | exploit
systems | apple
advisories | CVE-2017-2362
SHA-256 | b158536bb0befe5398fad33dbc0a172677fb99626b2fbd089843ca3ebaffd3b0
Apple WebKit Renderbox Type Confusion
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Apple WebKit suffers from a type confusion vulnerability in RenderBox with accessibility enabled.

tags | exploit
systems | apple
advisories | CVE-2017-2373
SHA-256 | aecb62d731142db1516e19c7ad3ff31de9aea06eb36764a6f5dabffe85b7646b
Apple WebKit HTMLKeygenElement Type Confusion
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Apple WebKit suffers from a HTMLKeygenElement type confusion vulnerability.

tags | exploit
systems | apple
advisories | CVE-2017-2369
SHA-256 | a3741d7c8f28b927fce34f6b61f23d32e35c5958bb3e06f77f2721bd8c990e10
Google Chrome HTMLKeygenElement::shadowSelect() Type Confusion
Posted Feb 1, 2017
Authored by Ivan Fratric, Google Security Research

Google Chrome suffers from a HTMLKeygenElement::shadowSelect() type confusion vulnerability.

tags | exploit
SHA-256 | 92924ae358d484104a755cd03581b22f99405cbbdad6c145f777ffe6269d3fad
Microsoft Internet Explorer Option Element Use-After-Free
Posted Jan 10, 2013
Authored by Ivan Fratric, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability in Microsoft Internet Explorer. A memory corruption may occur when the Option cache isn't updated properly, which allows other JavaScript methods to access a deleted Option element, and results in code execution under the context of the user.

tags | exploit, javascript, code execution
advisories | CVE-2011-1996
SHA-256 | 307b7adfa8d05c300b48db94ceb041a3ced231d646f14a788423d6874081b7c4
Microsoft Internet Explorer 8 Code Execution
Posted Feb 29, 2012
Authored by Ivan Fratric

This is a proof of concept exploit that allows an attacker to execute arbitrary code via vectors involving a dereferenced memory address in Microsoft Internet Explorer 8. It leverages the issue discussed in MS11-081. The exploit is slightly crippled by the author.

tags | exploit, arbitrary, proof of concept
advisories | CVE-2011-1999
SHA-256 | 31cef28f3ae91f47c652ada6f2b786f3ba4d464050c6d2c3cfd46b5a0f99df82
Internet Explorer Code Execution
Posted Oct 14, 2011
Authored by Ivan Fratric

Two code execution vulnerabilities have been discovered in Internet Explorer. One vulnerability is caused by incorrectly validating integer parameter passed to the 'add' method of the Select HTML element. Another vulnerability is caused by a use-after-free bug triggered by accessing a previously deleted Option element.

tags | advisory, vulnerability, code execution
advisories | CVE-2011-1999, CVE-2011-1996
SHA-256 | 00ed6913fc28235fa406b329358c7b4198e80bad1be3a6a32de2641d3a1cb323
Microsoft GDI+ TIFF Processing Memory Corruption
Posted Oct 15, 2009
Authored by Ivan Fratric

There is a memory corruption vulnerability in TIFF file processing in Microsoft GDI+ that can be used to crash a vulnerable application and also to execute arbitrary code.

tags | advisory, arbitrary
advisories | CVE-2009-2503
SHA-256 | bdd741e4995e907c04dc70b34e10d128524fc033d85598a7865541896555676f
Windows Media Audio Voice Decoder Code Execution
Posted Oct 15, 2009
Authored by Ivan Fratric

There is a vulnerability in Windows Media Audio Voice decoder distributed with Windows Media Player that allows remote code execution by opening a specially crafted web page.

tags | advisory, remote, web, code execution
systems | windows
advisories | CVE-2009-0555
SHA-256 | b13d4b308ea79c8f831f71e5cd1f0456f63eb50ba6410288c818e83acdcbdff6
ie6js-exec.txt
Posted Oct 16, 2008
Authored by Ivan Fratric

Microsoft Internet Explorer 6 suffers from a javascript vulnerability that allows for remote memory disclosure and remote code execution.

tags | advisory, remote, javascript, code execution
advisories | CVE-2008-3475
SHA-256 | 4df8eab8ee9d106ddee39f7fe4a638d19b5f617740aec69742d8195eb8d78922
Zero Day Initiative Advisory 08-069
Posted Oct 15, 2008
Authored by Tipping Point, Ivan Fratric | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the componentFromPoint() method exposed through JavaScript. A problem in the implementation of this method for a particular object can be used to arbitrarily control memory access. By exploiting this an attacker can gain access to the target system under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, javascript
advisories | CVE-2008-3475
SHA-256 | 9be0acd20b531207b7045fac59a05cffd27dc61dad5ba2ffc9c186e175757549
Zero Day Initiative Advisory 08-056
Posted Sep 9, 2008
Authored by Tipping Point, Ivan Fratric | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows XP, Server and Vista. User interaction is required in that a user must open a malicious image file or browse to a malicious website. The specific flaws exist in the GDI+ subsystem when parsing maliciously crafted GIF files. By supplying a malformed graphic control extension an attacker can trigger an exploitable memory corruption condition. Successful exploitation can result in arbitrary code execution under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
systems | windows
advisories | CVE-2008-3013
SHA-256 | 784909feca5f4676ce81ef75d3597d094f3a2f00e9f073866ec59152c5f86d2c
php521-overflow.txt
Posted Apr 10, 2007
Authored by Ivan Fratric

There is an integer overflow in PHP versions 5.2.1 and below in ext/gd/libgd/wbmp.c in the function readwbmp.

tags | advisory, overflow, php
SHA-256 | aa74b34ae08f9f37b439284153a51e2cc96cf731a3e5258a9d508e00d2e5d7c6
webwiz805-sql.txt
Posted Mar 21, 2007
Authored by Ivan Fratric | Site ifsec.blogspot.com

The MySQL version of Web Wiz version 8.05 suffers from a SQL injection vulnerability.

tags | exploit, web, sql injection
SHA-256 | 46e06067662bde321441a6d0fe076931e11a8bd16508818d4205deda46b5aa56
wp-compromise.txt
Posted Mar 8, 2007
Authored by Ivan Fratric

It appears that the WordPress blogging software was compromised and backdoored on Feb 25th, 2007 on the WordPress site.

tags | exploit
SHA-256 | 34ddea36404bae61b3ed5fc2e049d2e8e59f33ea3c70b17cba90e92bcbaf2098
Page 5 of 5
Back12345Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close