exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from M. Akil Gündoğan

First Active2022-11-16
Last Active2024-08-14
K7 Ultimate Security NULL Pointer Dereference
Posted Aug 14, 2024
Authored by M. Akil Gündoğan

In K7 Ultimate Security versions prior to 17.0.2019, the driver file (K7RKScan.sys - this version 15.1.0.7) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of a null pointer dereference from IOCtl 0x222010 and 0x222014. At the same time, the drive is accessible to all users in the "Everyone" group.

tags | exploit, denial of service, local
advisories | CVE-2024-36424
SHA-256 | bfb4ecddc23a05440389081ce78b782dbf92b391de062ebc99d6641e95cdaa89
SUPERAntiSpyware Professional X 10.0.1264 DLL Hijacking / Privilege Escalation
Posted Apr 3, 2024
Authored by M. Akil Gündoğan

SUPERAntiSpyware Professional X versions 10.0.1264 and below suffer from a privilege escalation vulnerability via dll hijacking.

tags | exploit
systems | windows
advisories | CVE-2024-27518
SHA-256 | 51e69d31c1c8fb597a06f072d218ce2b5cab6a6aa62de2abc66818247fc4d320
GOM Player 2.3.90.5360 MITM / Remote Code Execution
Posted Aug 29, 2023
Authored by M. Akil Gündoğan

GOM Player version 2.3.90.5360 man-in-the-middle proof of concept remote code execution exploit.

tags | exploit, remote, code execution, proof of concept
SHA-256 | f2826517a53fda0ce64b48c45b78c7b264d5e4695963f36c0f2cda3c61797dce
Zillya Total Security 3.0.2367.0 / 3.0.2368.0 Local Privilege Escalation
Posted Dec 5, 2022
Authored by M. Akil Gündoğan

Zillya Total Security versions 3.0.2367.0 and 3.0.2368.0 suffer from a local privilege escalation vulnerability via a symlink vulnerability when using the quarantine module.

tags | exploit, local
SHA-256 | 2dd73b1e8ea08e5ab446f87179141526db439ac124db481912ba977a9d7b4e24
Internet Download Manager 6.41 Build 3 Man-In-The-Middle
Posted Nov 16, 2022
Authored by M. Akil Gündoğan

Internet Download Manager version 6.41 Build 3 suffers from a man-in-the-middle vulnerability that can enable an attacker to execute code on the victim's system.

tags | exploit
SHA-256 | c91e3d887c068869ed07efa29c9e1304cc683d984cd8274cd1ef8940678521d0
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close