exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

IrfanView 4.57 Denial Of Service / Code Execution
Posted Feb 17, 2021
Authored by Samandeep Singh | Site sec-consult.com

IrfanView version 4.57 with WPG.dll version 2.0.0.0 suffer from access violation and out-of-bounds write vulnerabilities that can lead to denial of service or code execution.

tags | advisory, denial of service, vulnerability, code execution
advisories | CVE-2021-27224
SHA-256 | 25da92fa817b5a113c55b9e18072698748b07fb0bb80d1febb128c957f5b2d19

Related Files

IrfanView 4.44 SEH Buffer Overflow
Posted Mar 2, 2018
Authored by bzyo

IrfanView email plugin version 4.44 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 3cb99ffaeb3ff9b458094a24a5c8e5ce9602e65d2b5d09dcd252ec6d3b4e123f
IrfanView 4.50 SEH Unicode Buffer Overflow
Posted Mar 2, 2018
Authored by bzyo

IrfanView email plugin version 4.50 SEH unicode buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 7cb5e57b65ee11d382c98d41edbd12ab10f38857e49dfbaad8e91f57cd6a8da5
IrfanView 4.44 Denial Of Service
Posted Apr 29, 2017
Authored by Dreivan Orprecio

IrfanView version 4.44 suffers from an overflow vulnerability.

tags | exploit, denial of service, overflow
SHA-256 | 733c379ee42e567d696579edf278a3b20d3e2978a16e590732cfd712a558e9a1
IrfanView 4.33 IMXCF.DLL Code Execution
Posted Dec 11, 2012
Authored by beford

IrfanView version 4.33 suffers from a code execution vulnerability in IMXCF.DLL.

tags | exploit, code execution
systems | linux
SHA-256 | 0a1f142ba76135c7bcf860c32266bf1a855ad2cd191192fcf8ec2176558f0b9c
IrfanView 4.33 RLE Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a RLE image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | c7280f0bbcb5f8e1f959afbe12d0a3869c8de4db879212848a1273b635432924
IrfanView 4.33 TIF Image Decompression Buffer Overflow
Posted Nov 13, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a TIF image decompression buffer overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 72b8882cb0faee2b7373d6e6e4b71c5ed206922b7475df22542144a2d004de0d
Secunia Security Advisory 49856
Posted Nov 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ecaab2e98606754f083cbeaf42919774e548699df825d9a5acb059002933a0bb
Irfanview JPEG2000 4.3.2.0 jp2 Stack Buffer Overflow
Posted Jul 2, 2012
Authored by Parvez Anwar, mr_me, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in versions 4.3.2.0 and below of Irfanview's JPEG2000.dll plugin. This exploit has been tested on a specific version of irfanview (v4.3.2), although other versions may work also. The vulnerability is triggered via parsing an invalid qcd chunk structure and specifying a malformed qcd size and data. Payload delivery and vulnerability trigger can be executed in multiple ways. The user can double click the file, use the file dialog, open via the icon and drag/drop the file into Irfanview\'s window. An egg hunter is used for stability.

tags | exploit, overflow
advisories | CVE-2012-0897, OSVDB-78333
SHA-256 | c5cce711dbd4abe77f358a5360b9fd21367c38e3811ab24c191fb5a02cb79609
Irfanview Plugins 4.33 Overflow
Posted Jun 29, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

IrfanView Formats PlugIn is prone to an overflow condition. The JLS Plugin (jpeg_ls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. Proof of concept included. Irfanview Plugins version 4.33 is affected.

tags | exploit, overflow, arbitrary, proof of concept
systems | linux
advisories | CVE-2012-3585
SHA-256 | cd8bb7da17eb6fd5c44d2f4ceac57a18c44aca435eea690d9247652a97f176d8
IrfanView 4.33 Heap Overflow
Posted Jun 25, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a DJVU image processing heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | e436390561dec51d8a5dee5ab9cec39964b18ee239173724fdeb63a1dfbb24c1
Secunia Security Advisory 49176
Posted Jun 22, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in IrfanView Formats PlugIn, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4aab7b55fac10269055188d8782bedc1c5003b831ba88acae3d6e07377f19f37
IrfanView 4.33 Format Plugin Overflow
Posted Jun 3, 2012
Authored by Francis Provencher

The Format plugin in IrfanView version 4.33 suffers from a TTF file parsing stack based overflow vulnerability. Proof of concept TTF file included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | ef722236a74014bdcead5b4e91a1c08b978a058a903f4d9df3043c15edb2afa7
IrfanView 4.33 Heap Overflow
Posted Jun 2, 2012
Authored by Francis Provencher

IrfanView version 4.33 suffers from a format plugin ECW decompression heap overflow vulnerability. Proof of concept included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | c43538eed93169fc8652f2b6ea9ae40400dd1b5be469cc38d6a0f59a42a293b4
Secunia Security Advisory 49319
Posted Jun 1, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in IrfanView Formats PlugIn, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | fa1c106f2e8e06a4b01e5865a823fe79486090346f4cc03cf23a11cec077c887
Secunia Security Advisory 49204
Posted May 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in IrfanView Formats PlugIn, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ebea45f930875aa38ecb4607ce1c3ae21622343b3c11f6709af1ffd9e5fefe0e
Secunia Security Advisory 48772
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in the FlashPix PlugIn for IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 621d0dd4ee0bb7549e55417521a577ee845b46b52f0875ba7da3206428ea9969
Secunia Security Advisory 47333
Posted Mar 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 7882522a6b7e678051422106268225b9b71cb26c89f9aef09f874e4d1f268cab
Secunia Security Advisory 47360
Posted Jan 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in IrfanView PlugIns, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4be452173132d2488810a10d149c25ba71aa23cc5982353371097ae927f0a0c5
IrfanView FlashPix Plugin Double-Free
Posted Dec 21, 2011
Authored by Francis Provencher

A vulnerability in the IrfanView FlashPix plugin exists due to the "Free_All_Memory()" function not properly setting certain decoder elements to NULL after freeing them, which can be exploited to cause a double-free condition via specially crafted FPX images. Proof of concept exploit included.

tags | exploit, proof of concept
systems | linux
SHA-256 | fd583f5874fee2012eada88e8599ffeaa35b493c3a60e8084c24257dfd12afb7
IrfanView TIFF Image Processing Buffer Overflow
Posted Dec 21, 2011
Authored by Francis Provencher

IrfanView suffers from a heap-based buffer overflow vulnerability when parsing malicious TIFF images. Proof of concept exploit included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 0d475986f882b8c441677da90e11f68d6d58c3d8306b9fea5575d224ba69b2d2
Secunia Security Advisory 47065
Posted Dec 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | c8127bbecbe094a401f09d85dea5ede276d9e3471d7a1f9f2107dc545bbe5685
Secunia Security Advisory 47322
Posted Dec 20, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in the FlashPix PlugIn for IrfanView, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3f5283717b2b01f47b0adf179b76ae23538ab43c693a17b9a318cd2bd61deb18
IrfanView 4.28 .ICO Without Transparent Colour Denial Of Service
Posted Apr 10, 2011
Authored by BraniX

IrfanView version 4.28 .ICO file without transparent colour denial of service exploit.

tags | exploit, denial of service
SHA-256 | 0b08bcd459993385237d031eb341a2acac82577acd468f0dcd6b9d813bb7154a
IrfanView 4.28 .ICO With Transparent Colour Denial Of Service
Posted Apr 10, 2011
Authored by BraniX

IrfanView version 4.28 .ICO file with transparent colour denial of service exploit.

tags | exploit, denial of service
SHA-256 | 3a63a85f18060a1bd03245f0f21730729638010886e098858a173c8b21e84f9c
IrfanView 4.28 Denial Of Service
Posted Jan 10, 2011
Authored by BraniX

Multiple denial of service exploits for IrfanView version 4.28.

tags | exploit, denial of service
SHA-256 | 45064f50eac6cfb52a766828005b803b64967167082a5952d82725008f6ee4f7
Page 1 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close