seeing is believing
Showing 1 - 19 of 19 RSS Feed

Files from Nick Freeman

Email addressnick.freeman at security-assessment.com
First Active2009-08-25
Last Active2014-08-28
Aerohive Hive Manager / Hive OS Complete Fail
Posted Aug 28, 2014
Authored by Nick Freeman, Thomas Hibbert, Denis Andzakovic, Carl Purvis, Pedro Worcel, Scott Bell | Site security-assessment.com

Aerohive Hive Manager (Stand-alone and Cloud) versions greater than and equal to 6.1R3 and HiveOS version 6.1R3 suffer from bypass, code execution, cross site scripting, file disclosure, local file inclusion, arbitrary file upload, missing passphrase, and password disclosure vulnerabilities.

tags | advisory, arbitrary, local, vulnerability, code execution, xss, file inclusion, file upload
MD5 | 0e50cec8ee468c9b9a606da101ef597a
StoryBoard Quick 6 Memory Corruption
Posted Nov 5, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in StoryBoard Quick 6.

tags | exploit, overflow
MD5 | 0835edee84e10b7f41972a5f80740f49
Final Draft 8 File Format Stack Buffer Overflow
Posted Nov 5, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Final Draft 8. Multiple fields are vulnerable to the overflow, however Word in IgnoredWords is the only field to accept mixed-case characters.

tags | exploit, overflow
MD5 | 9b7f42a8e2c69c0ac74cb89fdf648f2c
Avid Media Composer 5.5 - Avid Phonetic Indexer Stack Overflow
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process AvidPhoneticIndexer.exe (port 4659), which comes as part of the Avid Media Composer 5.5 Editing Suite. This daemon sometimes starts on a different port; if you start it standalone it will run on port 4660.

tags | exploit, overflow
MD5 | 3b8faf6963fc783e259dc9fc505280d9
Final Draft 8 File Format Stack Buffer Overflow
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Final Draft 8. Multiple fields are vulnerable to the overflow, however Word in IgnoredWords is the only field to accept mixed-case characters. This version of the exploit was deemed "old" by Metasploit.

tags | exploit, overflow
MD5 | 9b7f42a8e2c69c0ac74cb89fdf648f2c
StoryBoard Quick 6 Memory Corruption
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in StoryBoard Quick 6. This version of the exploit was deemed "old" by Metasploit.

tags | exploit, overflow
MD5 | 0835edee84e10b7f41972a5f80740f49
Avid Media Composer 5.5 - Avid Phonetic Indexer Stack Overflow
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process AvidPhoneticIndexer.exe (port 4659), which comes as part of the Avid Media Composer 5.5 Editing Suite. This daemon sometimes starts on a different port; if you start it standalone it will run on port 4660. This version of the exploit was deemed "old" by Metasploit.

tags | exploit, overflow
MD5 | 3b8faf6963fc783e259dc9fc505280d9
Avid Media Composer 5.5 - Avid Phonetic Indexer Stack Overflow
Posted Dec 3, 2011
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process AvidPhoneticIndexer.exe (port 4659), which comes as part of the Avid Media Composer 5.5 Editing Suite. This daemon sometimes starts on a different port; if you start it standalone it will run on port 4660.

tags | exploit, overflow
advisories | OSVDB-77376
MD5 | c4fdcbd39db3ab6e312ae7a02000ae94
Avid Media Composer 5.5 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.

tags | exploit, remote, overflow
systems | linux
MD5 | 05ba0f866778968b71f98de51b05bb15
StoryBoard Quick 6 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | a2936d026b1079a3ef6f8d76b49e48e5
Muster Render Farm Management System 6.1.6 Arbitrary File Download
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.

tags | exploit, arbitrary
systems | linux
MD5 | 71664b4aded114d1ca22b0fa618e8420
Final Draft 8 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Final Draft version 8 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | c0e59b67f15d5777bd6aa600c2deae50
Hacking Hollywood Presentation Slides
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.

tags | paper, vulnerability, proof of concept
MD5 | 312ad3c5b5dbc495b7789bb12a1e8b75
BroadWorks Arbitrary Call Detail Record Eavesdropping
Posted Nov 2, 2010
Authored by Nick Freeman | Site security-assessment.com

BroadWorks suffers from an arbitrary call detail record eavesdropping vulnerability. Versions R16 and below are affected.

tags | exploit, arbitrary
MD5 | db891a834d3bd5ccce88a4ac0e76c361
Exploiting Cross Context Scripting Vulnerabilities In Firefox
Posted Apr 23, 2010
Authored by Roberto Suggi Liverani, Nick Freeman | Site security-assessment.com

Whitepaper called Exploiting Cross Context Scripting in Firefox.

tags | paper
MD5 | 0b61c21eb9fe5c2e181163d79e773c75
Yoono Firefox Extension Injection
Posted Jan 14, 2010
Authored by Nick Freeman | Site security-assessment.com

Yoono Firefox extension versions prior to 6.1.1 suffer from a code injection vulnerability.

tags | advisory
MD5 | 3ff8a585e9865e068215a0194934299e
Feed Sidebar Firefox Extension Code Injection
Posted Aug 25, 2009
Authored by Nick Freeman | Site security-assessment.com

Feed Sidebar Firefox extension versions prior to 3.2 suffer from a code injection vulnerability.

tags | exploit
MD5 | e999d3eee3c3d631d21568a60a819067
ScribeFire Firefox Extension Code Injection
Posted Aug 25, 2009
Authored by Nick Freeman | Site security-assessment.com

ScribeFire Firefox Extension versions prior to 3.4.2 suffer from a code injection vulnerability.

tags | exploit
MD5 | 7fc3eaf4cac5c42aad50e04ac96b2b25
WizzRSS Code Injection
Posted Aug 25, 2009
Authored by Nick Freeman | Site security-assessment.com

WizzRSS versions prior to 3.1.0.0 and WizzRSS Lite versions prior to 3.0.0.9b suffer from a code injection vulnerability.

tags | exploit
MD5 | 9561794d949396f501dba2e440aa10f1
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    22 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close