what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 132 of 132 RSS Feed

Files from jduck

Email addressmetasploit at qoop.org
First Active2009-11-18
Last Active2024-09-01
HTML Help Workshop 4.74 (hhp Project File) Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by bratax, jduck | Site metasploit.com

This Metasploit module exploits a stack overflow in HTML Help Workshop 4.74. By creating a specially crafted hhp file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 82e01542fb818ed7b5e9120ef5f8dd54a33c4cfbb41b7de8c7a3d88ba717a6a9
HTML Help Workshop 4.74 (hhp Project File) Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by Encrypt3d.M!nd, jduck, loneferret | Site metasploit.com

This Metasploit module exploits a stack overflow in HTML Help Workshop 4.74 By creating a specially crafted hhp file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-0133
SHA-256 | 40bdbca4a822c1c8a058b1ad97daee10c5ee39712e47900750b8a660df207251
Wu-ftpd SITE EXEC/INDEX Format String Vulnerability
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a format string vulnerability in versions of the Washington University FTP server older than 2.6.1. By executing specially crafted SITE EXEC or SITE INDEX commands containing format specifiers, an attacker can corrupt memory and execute arbitrary code.

tags | exploit, arbitrary
advisories | CVE-2000-0573
SHA-256 | 17811a8ac377764adfb49c164f93cdcf698df0df9d68af1e9617fc9029a4ec99
Sun Java JRE AWT setDiffICM Buffer Overflow
Posted Dec 31, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a flaw in the setDiffICM function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier. NOTE: Although all of the above versions are reportedly vulnerable, only 1.6.0_u11 and 1.6.0_u16 on Windows XP SP3 were tested.

tags | exploit, java
systems | windows
advisories | CVE-2009-3869
SHA-256 | 15c0e94e60ddaf304a0db8722ab90a4346f35a28d6a122802f19e8681d79283f
Adobe U3D CLODProgressiveMeshDeclaration Array Overrun
Posted Dec 31, 2009
Authored by Felipe Andres Manzano, jduck | Site metasploit.com

This Metasploit module exploits an array overflow in Adobe Reader and Adobe Acrobat. Affected versions include < 7.1.4, < 8.1.7, and < 9.2. By creating a specially crafted pdf that a contains malformed U3D data, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-2990
SHA-256 | fdb0c241722cd2aa67d4eb9f05c46f52ce09ac8fae6eb7afb1cb35f20897926e
Adobe Collab.getIcon() Buffer Overflow
Posted Nov 26, 2009
Authored by MC, jduck, Didier Stevens | Site metasploit.com

This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.4. By creating a specially crafted pdf that a contains malformed Collab.getIcon() call, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-0927
SHA-256 | d4a91c898b2b649b678e2e14b004ed1827360112073820eebd1bb1198e2c3e7a
Free Download Manager Torrent Parsing Buffer Overflow
Posted Nov 18, 2009
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Free Download Manager 3.0 Build 844. Arbitrary code execution could occur when parsing a specially crafted torrent file.

tags | exploit, overflow, arbitrary, code execution
advisories | CVE-2009-0184
SHA-256 | bcfa2ab0e58219edf62f560a2a8bc25af546cb9b3279c2b78321b59a6704d8c6
Page 6 of 6
Back23456Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close