exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from Nick Freeman

Email addressnick.freeman at security-assessment.com
First Active2009-08-25
Last Active2014-08-28
Aerohive Hive Manager / Hive OS Complete Fail
Posted Aug 28, 2014
Authored by Nick Freeman, Thomas Hibbert, Denis Andzakovic, Carl Purvis, Pedro Worcel, Scott Bell | Site security-assessment.com

Aerohive Hive Manager (Stand-alone and Cloud) versions greater than and equal to 6.1R3 and HiveOS version 6.1R3 suffer from bypass, code execution, cross site scripting, file disclosure, local file inclusion, arbitrary file upload, missing passphrase, and password disclosure vulnerabilities.

tags | advisory, arbitrary, local, vulnerability, code execution, xss, file inclusion, file upload
SHA-256 | cda32b36ba6f19559448f8007c162ba158f4b31d35722a7b7f4a3f40b5f0e800
StoryBoard Quick 6 Memory Corruption
Posted Nov 5, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in StoryBoard Quick 6.

tags | exploit, overflow
SHA-256 | be9f8f5b5e74ec032e061db1790ee6ae7ad5663dd6c25860b0832e0efd98f2d3
Final Draft 8 File Format Stack Buffer Overflow
Posted Nov 5, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Final Draft 8. Multiple fields are vulnerable to the overflow, however Word in IgnoredWords is the only field to accept mixed-case characters.

tags | exploit, overflow
SHA-256 | 1b1e0b81bd8090ce9c13897364857d059b72e2077047d444b433511ccd5550d8
Avid Media Composer 5.5 - Avid Phonetic Indexer Stack Overflow
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process AvidPhoneticIndexer.exe (port 4659), which comes as part of the Avid Media Composer 5.5 Editing Suite. This daemon sometimes starts on a different port; if you start it standalone it will run on port 4660.

tags | exploit, overflow
SHA-256 | 1300424762c6a67dc6fa5b84891cd5d5326609e31ed49f16b15f85a4eadefc6f
Final Draft 8 File Format Stack Buffer Overflow
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Final Draft 8. Multiple fields are vulnerable to the overflow, however Word in IgnoredWords is the only field to accept mixed-case characters. This version of the exploit was deemed "old" by Metasploit.

tags | exploit, overflow
SHA-256 | 1b1e0b81bd8090ce9c13897364857d059b72e2077047d444b433511ccd5550d8
StoryBoard Quick 6 Memory Corruption
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in StoryBoard Quick 6. This version of the exploit was deemed "old" by Metasploit.

tags | exploit, overflow
SHA-256 | be9f8f5b5e74ec032e061db1790ee6ae7ad5663dd6c25860b0832e0efd98f2d3
Avid Media Composer 5.5 - Avid Phonetic Indexer Stack Overflow
Posted Nov 4, 2013
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process AvidPhoneticIndexer.exe (port 4659), which comes as part of the Avid Media Composer 5.5 Editing Suite. This daemon sometimes starts on a different port; if you start it standalone it will run on port 4660. This version of the exploit was deemed "old" by Metasploit.

tags | exploit, overflow
SHA-256 | 1300424762c6a67dc6fa5b84891cd5d5326609e31ed49f16b15f85a4eadefc6f
Avid Media Composer 5.5 - Avid Phonetic Indexer Stack Overflow
Posted Dec 3, 2011
Authored by Nick Freeman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in process AvidPhoneticIndexer.exe (port 4659), which comes as part of the Avid Media Composer 5.5 Editing Suite. This daemon sometimes starts on a different port; if you start it standalone it will run on port 4660.

tags | exploit, overflow
advisories | OSVDB-77376
SHA-256 | e325ea7c310110db0d0e34758f28771015fc9185c9f35054df350536e370ced2
Avid Media Composer 5.5 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.

tags | exploit, remote, overflow
systems | linux
SHA-256 | a6100e77da08ab7504d889909384925c152f4a923056b91aef442070ec7d5eeb
StoryBoard Quick 6 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | a58071791bae0e9b02ab74ae8bc27fb0a782edd806f7f95a6330d6c8d53fb41c
Muster Render Farm Management System 6.1.6 Arbitrary File Download
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.

tags | exploit, arbitrary
systems | linux
SHA-256 | 4c7c5caf872d4ace08b11d687019c73a366d5da96d3cb3fa5d8590c61b7d691a
Final Draft 8 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Final Draft version 8 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | ac3e47d5874fd1d4daad7534970506cf6afc9f213d1d90f20086b45e813dcbbd
Hacking Hollywood Presentation Slides
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.

tags | paper, vulnerability, proof of concept
SHA-256 | 011cfd9dd1552c8137cc5620c4e38a3b1986aa931e278523ef781e70dd75adf5
BroadWorks Arbitrary Call Detail Record Eavesdropping
Posted Nov 2, 2010
Authored by Nick Freeman | Site security-assessment.com

BroadWorks suffers from an arbitrary call detail record eavesdropping vulnerability. Versions R16 and below are affected.

tags | exploit, arbitrary
SHA-256 | f587e153f0630c9df6b06ef804794f88c6cb8f35b7c444fc320f6d63f1e519c3
Exploiting Cross Context Scripting Vulnerabilities In Firefox
Posted Apr 23, 2010
Authored by Roberto Suggi Liverani, Nick Freeman | Site security-assessment.com

Whitepaper called Exploiting Cross Context Scripting in Firefox.

tags | paper
SHA-256 | b6f1ce5b65cb8ba9f3cae9cfdedc361229083113c50974b28b05fbf9697ba86e
Yoono Firefox Extension Injection
Posted Jan 14, 2010
Authored by Nick Freeman | Site security-assessment.com

Yoono Firefox extension versions prior to 6.1.1 suffer from a code injection vulnerability.

tags | advisory
SHA-256 | bfd84bf3aba12e7c69cc818f02ce6095d73f9701b829ecb83f65ad5699232b91
Feed Sidebar Firefox Extension Code Injection
Posted Aug 25, 2009
Authored by Nick Freeman | Site security-assessment.com

Feed Sidebar Firefox extension versions prior to 3.2 suffer from a code injection vulnerability.

tags | exploit
SHA-256 | 9051078957e8b0620115d0506d0a10139829ad1a4cd09e064fb9e6d0856a4b50
ScribeFire Firefox Extension Code Injection
Posted Aug 25, 2009
Authored by Nick Freeman | Site security-assessment.com

ScribeFire Firefox Extension versions prior to 3.4.2 suffer from a code injection vulnerability.

tags | exploit
SHA-256 | b3bf839f159fdf42897a46b649dfe4a6a6a4d45628ff8ae2c0db85f957eb1e8b
WizzRSS Code Injection
Posted Aug 25, 2009
Authored by Nick Freeman | Site security-assessment.com

WizzRSS versions prior to 3.1.0.0 and WizzRSS Lite versions prior to 3.0.0.9b suffer from a code injection vulnerability.

tags | exploit
SHA-256 | ec171eaddaaab7708cf6e05a1cf76f2dfe84fb8052fc10a26dcbe9f834b2d4a5
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close