Real Name | Matthew Jurczyk |
---|---|
Email address | private |
Website | j00ru.vexillium.org |
First Active | 2007-09-18 |
Last Active | 2011-01-12 |
Whitepaper called Exploiting the otherwise non-exploitable - Windows Kernel-mode GS Cookies subverted.
9cb55c04b174ac68214accb5e07ace84657f40f962aea69afc09f7ac5daa6f55
Whitepaper called GDT and LDT in Windows kernel vulnerability exploit. This paper discusses using 1 or 4 byte write-what-where conditions to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0).
5c8da344b3b6b9b298c6abf88c6abc9b8388ea7855997e8d22f4bdd058f0fb20
Gadu-Gadu version 7.7 suffers from local and remote buffer overflow vulnerabilities.
c683c0b1d3d9272ce556785823cbb7944474cada792531014382a880d0848909
WinImage version 8.10 is susceptible to denial of service and directory traversal vulnerabilities.
89be441d7ec8a391773bc8232af0584811a2aad40f9cb06cd0bd23c9e44405a9