exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Liu Die Yu

First Active2003-09-13
Last Active2005-03-17
winblox-open-2005.03.11.tar.gz
Posted Mar 17, 2005
Authored by Liu Die Yu | Site umbrella.name

Winblox is a User-mode WINAPI-level and open-source tool for controlling the behavior of applications running on Windows workstations.

systems | windows
SHA-256 | b850313d2dbfbb30337ae7d5d686ca25b1e9fd33f445771d7cf1c56d3e2e0793
doubleByte.txt
Posted Dec 11, 2004
Authored by Liu Die Yu | Site umbrella.name

On Double Byte Character Set Locale systems, such as Chinese, Japanese, etc, there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field.

tags | advisory, spoof
SHA-256 | 3a77f862571fc252998d7700222e875fc627c98ac39e82150f4091acce5c76cd
mozShell.txt
Posted Jul 9, 2004
Authored by Liu Die Yu

Mozilla has a flaw that allows for a remote attacker to trick a user into launching an executable via the SHELL: directive.

tags | advisory, remote, shell
SHA-256 | fd7d9b4c544c63f7beb0438f89709b6c5360fb586f6c3dd818704e9f0530c84a
ie6xss.txt
Posted Jun 22, 2004
Authored by Liu Die Yu

Information regarding proper exploitation of a cross site scripting flaw affecting Internet Explorer 6 SP1 running on Windows XP.

tags | advisory, xss
systems | windows
SHA-256 | fa7c800af3ddd9495112ac117250468eeb5035d63765176288113058bd094d62
createfile.cpp.txt
Posted Mar 30, 2004
Authored by Liu Die Yu | Site umbrella.name

WinBlox is a command line utility that can record, filter, and prevent file I/O operations. In record mode the WinBlox logs all I/O operation activity. A typical log record includes a date stamp, the operation type, the program name conducting the operation, and the target of I/O operation.

systems | windows
SHA-256 | e05e96d6664ad70dda00e55a3b95e7a18f3b7db5c0473f9d3cf6e74e974d8c66
combofun.txt
Posted Nov 27, 2003
Authored by Liu Die Yu

Utilizing the MHTML parsing vulnerability in conjunction with the BackToFramedJpu vulnerability, a malicious attacker can obtain full MYCOMPUTER security zone access to a victim machine.

tags | advisory
SHA-256 | 8fc2fdff885ad4c4d244ca251097a58a30fe147f299629978d607b790d85fb22
mhtmlredir.txt
Posted Nov 27, 2003
Authored by Liu Die Yu

A flaw exists in the way Microsoft Internet Explorer performs MHTML redirection that can lead to a victim having executables downloaded and run. Link to a demonstration included.

tags | advisory
SHA-256 | 5c306ddeb0aa01ef9333f01161239c18011c97126963ca69abcbbe7de0d0f94f
IEcache2.txt
Posted Nov 26, 2003
Authored by Liu Die Yu

By combining the Microsoft Internet Explorer cache file disclosure vulnerability with several other unpatched vulnerabilities, a malicious INTERNET page can reach the MYCOMPUTER zone. Link to two demonstrations included.

tags | advisory, vulnerability
SHA-256 | cc43c3bb8c3472af6421059b2f7d473dcbcc23680fa944324c5fc42c247a1411
IEcache.txt
Posted Nov 26, 2003
Authored by Liu Die Yu

Microsoft Internet Explorer v6.SP1 and below has a vulnerable download function that can be exploited by a malicious attacker to gain access to a user's cache directory. Link to two demonstrations included.

tags | advisory
SHA-256 | dcaee30b8ef3a1cceeae51d751d897cc6278c21e1025eac9cf682ea1ae4fd7ab
BackToFramedJpu.txt
Posted Nov 26, 2003
Authored by Liu Die Yu

A cross-zone scripting vulnerability has been found in Internet Explorer. If a web page contains some sub-frame, its security zone may be compromised. Link to a demonstration included.

tags | advisory, web
SHA-256 | a7c936db9ccb610dafbe96908b866aeba03e8da8fc499b043cc313c4e16d79ef
hijack2.txt
Posted Nov 26, 2003
Authored by Liu Die Yu

After applying the patch for MS03-048, Windows is still susceptible to the Hijack Click attack when performed in conjunction with the method caching attack which can make the window.move accessible again. Link to a demonstration included.

tags | advisory
systems | windows
SHA-256 | a06ff9d109e90948b1621c8cc5f4399cd3f2acd4266b9a925067a1f7cac1a306
execdror5-Demo.zip
Posted Nov 15, 2003
Authored by Liu Die Yu | Site safecenter.net

Six step cache attach for Internet Explorer v6sp1 (up to date on 10/30/2003) which combines several older unpatched and recently discovered vulnerabilities to execute code remotely by viewing a web page or HTML email. More information available here.

tags | exploit, web, vulnerability
SHA-256 | 94ea12a634a074b51cb882c92f07466864fecdcb97c1c35652f1946575389bb0
msIEvulns.txt
Posted Sep 13, 2003
Authored by Liu Die Yu | Site secunia.com

Secunia Research Advisory - Multiple remotely exploitable vulnerabilities have been discovered in Microsoft Internet Explorer, including cross site scripting problems, exposure of sensitive information, and system access. Vulnerable versions are 5.01, 5.5, and 6.

tags | advisory, vulnerability, xss
SHA-256 | 4e79f2cf181ab7bc26673e30bb7e89b6032c9f17fa3926229fc65644418bf5f5
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close