exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 73 RSS Feed

Files

IrfanView 4.33 TIF Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a TIF image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 72b8882cb0faee2b7373d6e6e4b71c5ed206922b7475df22542144a2d004de0d

Related Files

IrfanView 4.57 Denial Of Service / Code Execution
Posted Feb 17, 2021
Authored by Samandeep Singh | Site sec-consult.com

IrfanView version 4.57 with WPG.dll version 2.0.0.0 suffer from access violation and out-of-bounds write vulnerabilities that can lead to denial of service or code execution.

tags | advisory, denial of service, vulnerability, code execution
advisories | CVE-2021-27224
SHA-256 | 25da92fa817b5a113c55b9e18072698748b07fb0bb80d1febb128c957f5b2d19
IrfanView 4.44 SEH Buffer Overflow
Posted Mar 2, 2018
Authored by bzyo

IrfanView email plugin version 4.44 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 3cb99ffaeb3ff9b458094a24a5c8e5ce9602e65d2b5d09dcd252ec6d3b4e123f
IrfanView 4.50 SEH Unicode Buffer Overflow
Posted Mar 2, 2018
Authored by bzyo

IrfanView email plugin version 4.50 SEH unicode buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 7cb5e57b65ee11d382c98d41edbd12ab10f38857e49dfbaad8e91f57cd6a8da5
IrfanView 4.44 Denial Of Service
Posted Apr 29, 2017
Authored by Dreivan Orprecio

IrfanView version 4.44 suffers from an overflow vulnerability.

tags | exploit, denial of service, overflow
SHA-256 | 733c379ee42e567d696579edf278a3b20d3e2978a16e590732cfd712a558e9a1
Foxit Reader 7.1.3.320 Memory Corruption
Posted Apr 29, 2015
Authored by Francis Provencher

Foxit Reader versions 7.1.3.320 and below suffer from a pdf parsing memory corruption vulnerability.

tags | exploit
systems | linux
SHA-256 | bd04944c6132e51165de2cd47879e4605bc439659bd47936955cab36552e79aa
Oracle Outside-In DOCX File Parsing Memory Corruption
Posted Apr 18, 2014
Authored by Francis Provencher

Oracle Outside-In suffers from a memory corruption vulnerability when parsing docx files.

tags | exploit
systems | linux
SHA-256 | 79fc87eb887121eb743d08718db0785e9a718662ed4993f3ba621df1404086ad
IrfanView 4.33 IMXCF.DLL Code Execution
Posted Dec 11, 2012
Authored by beford

IrfanView version 4.33 suffers from a code execution vulnerability in IMXCF.DLL.

tags | exploit, code execution
systems | linux
SHA-256 | 0a1f142ba76135c7bcf860c32266bf1a855ad2cd191192fcf8ec2176558f0b9c
Novell Groupwise Internet Agent Overflow
Posted Nov 14, 2012
Authored by Francis Provencher

An overflow error occurs in GroupWise Internet Agent (gwia.exe) when the LDAP service process receives an overly long BIND Request. Successful exploitation may allow execution of arbitrary code. Versions 8.0.2 HP3 and 2012 are affected. Proof of concept code included.

tags | exploit, overflow, arbitrary, proof of concept
SHA-256 | 98eedb4ebf1ead9211c4ee8e6803edef89885b9d7e3884dac106b273c25e0aa7
IrfanView 4.33 RLE Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a RLE image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | c7280f0bbcb5f8e1f959afbe12d0a3869c8de4db879212848a1273b635432924
Secunia Security Advisory 49856
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ecaab2e98606754f083cbeaf42919774e548699df825d9a5acb059002933a0bb
Cyme ChartFX Client Server Array Indexing
Posted Oct 4, 2012
Authored by Francis Provencher

Cyme ChartFX client server suffers from a vulnerability that is caused due to an indexing error in the "ShowPropertiesDialog()" method (ChartFX.ClientServer.Core.dll) of the ChartFX ActiveX Control. This can be exploited to write a single byte value to an arbitrary memory location via the "pageNumber" parameter. Successful exploitation may allow execution of arbitrary code.

tags | exploit, arbitrary, activex
SHA-256 | 5710bd2cdef00b1beebd3eb5db71e3e75a63f51295473d4c9d8eb9549ef60db6
Adobe Photoshop CS6 PNG Parsing Heap Overflow
Posted Sep 1, 2012
Authored by Francis Provencher

Adobe Photoshop CS6 version 13.x suffers from a PNG parsing heap overflow vulnerability. Proof of concept PNG file include.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 80a53ff72f5790f602424285c5a3993b1990d8e6e206c276ea6e96b7e79484e5
Oracle Outside-In FPX File Parsing Heap Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-In FPX file parsing suffers from a heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 3ffbb6827d9d2382b9a76b9305e37a7d6d37e039b353eabc680e393957f21ada
Oracle Outside-In LWP File Parsing Buffer Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-In LWP file parsing suffers from a stack based buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 953c76d252ea3d1ef9599ded5a1b13cc01db9cce40b4df74f6ac34219722ac04
Oracle Outside-In JP2 File Parsing Heap Overflow
Posted Jul 20, 2012
Authored by Francis Provencher

Oracle Outside-IN JP2 file parsing suffers from a heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 7c878849d29af52f8ddf17660a63425f5e710c5f84ddfa7cbd6a34ab807ed406
Irfanview JPEG2000 4.3.2.0 jp2 Stack Buffer Overflow
Posted Jul 2, 2012
Authored by Parvez Anwar, mr_me, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in versions 4.3.2.0 and below of Irfanview's JPEG2000.dll plugin. This exploit has been tested on a specific version of irfanview (v4.3.2), although other versions may work also. The vulnerability is triggered via parsing an invalid qcd chunk structure and specifying a malformed qcd size and data. Payload delivery and vulnerability trigger can be executed in multiple ways. The user can double click the file, use the file dialog, open via the icon and drag/drop the file into Irfanview\'s window. An egg hunter is used for stability.

tags | exploit, overflow
advisories | CVE-2012-0897, OSVDB-78333
SHA-256 | c5cce711dbd4abe77f358a5360b9fd21367c38e3811ab24c191fb5a02cb79609
Irfanview Plugins 4.33 Overflow
Posted Jun 29, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

IrfanView Formats PlugIn is prone to an overflow condition. The JLS Plugin (jpeg_ls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. Proof of concept included. Irfanview Plugins version 4.33 is affected.

tags | exploit, overflow, arbitrary, proof of concept
systems | linux
advisories | CVE-2012-3585
SHA-256 | cd8bb7da17eb6fd5c44d2f4ceac57a18c44aca435eea690d9247652a97f176d8
IrfanView 4.33 Heap Overflow
Posted Jun 25, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a DJVU image processing heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | e436390561dec51d8a5dee5ab9cec39964b18ee239173724fdeb63a1dfbb24c1
ACDSee PRO 5.1 Heap Overflows
Posted Jun 23, 2012
Authored by Francis Provencher

ACDSee PRO version 5.1 suffers from image processing heap overflow vulnerabilities. Proof of concepts included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
SHA-256 | 7a29c303284a12fafe7bde596241454a712c247046e5141fda568b7871231f44
XnView 1.98.8 Heap Overflows
Posted Jun 23, 2012
Authored by Francis Provencher

XnView version 1.98.8 suffers from GIF, PCT, and TIFF image processing heap overflow vulnerabilities. Proof of concepts included.

tags | exploit, overflow, vulnerability, proof of concept
systems | linux
SHA-256 | 7a33f45ffe3e05b1ae8eff4edeb90a2337504c569f19a6aab17d6a976045bc2b
Secunia Security Advisory 49176
Posted Jun 22, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in IrfanView Formats PlugIn, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4aab7b55fac10269055188d8782bedc1c5003b831ba88acae3d6e07377f19f37
XnView FlashPix Image Processing Heap Overflow
Posted Jun 16, 2012
Authored by Francis Provencher

A boundary error in the Xfpx.dll module when processing FlashPix images can be exploited to cause a heap-based buffer overflow via a specially crafted FPX file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | d3d27e656535c43a189940b4169f03b8e070dc18bbb730bd07e54480765d5f37
XnView ECW Image Processing Heap Overflow
Posted Jun 16, 2012
Authored by Francis Provencher

A boundary error in the NCSEcw.dll module when decompressing Enhanced Compressed Wavelet images can be exploited to cause a heap-based buffer overflow via a specially crafted ECW file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 2b805ba8e0fb396319306ee83628841d7255eb906f045dd4b7bcf89a37a9e721
XnView RAS Image Processing Heap Overflow
Posted Jun 16, 2012
Authored by Francis Provencher

An integer truncation error when processing Sun Raster images can be exploited to cause a heap-based buffer overflow via a specially crafted "Depth" value in a RAS file. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | deec59b7511a6a5f9b798bbeb76b449e5acbef7e088fb4533468afed85672740
IrfanView 4.33 Format Plugin Overflow
Posted Jun 3, 2012
Authored by Francis Provencher

The Format plugin in IrfanView version 4.33 suffers from a TTF file parsing stack based overflow vulnerability. Proof of concept TTF file included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | ef722236a74014bdcead5b4e91a1c08b978a058a903f4d9df3043c15edb2afa7
Page 1 of 3
Back123Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close