exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files from ACROS Security

Email addresssecurity at acrossecurity.com
First Active2004-10-24
Last Active2011-08-19
ACROS Security Problem Report 2011-08-18-2
Posted Aug 19, 2011
Authored by ACROS Security, Jure Skofic | Site acrossecurity.com

ACROS Security Problem Report #2011-08-18-2 - A binary planting vulnerability in Mozilla Thunderbird allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2011-2980
SHA-256 | 50de284a562edf3e280b13793e1465d67dae9d1e5e58327d7f298a855f29a9c1
ACROS Security Problem Report 2011-08-18-1
Posted Aug 19, 2011
Authored by ACROS Security, Jure Skofic | Site acrossecurity.com

ACROS Security Problem Report #2011-08-18-1 - A binary planting vulnerability in Mozilla Firefox allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2011-2980
SHA-256 | 81c08ec71122a547d4d5f3b499ccf4eb2eb2b4311cc7c73af9122046fa6db400
COM Server-Based Binary Planting Proof Of Concept
Posted Jun 2, 2011
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

Proof of concept exploit for the COM server-based binary planting presentation given at Hack in the Box in Amsterdam.

tags | exploit, proof of concept
SHA-256 | 660882c80064fb7a27e3efa3e517d23e2721d9b7415e35656ca010ab4e47b744
ACROS Security Problem Report 2011-02-11-2
Posted Feb 11, 2011
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2011-02-11-2 - A binary planting vulnerability in Adobe Flash Player allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2011-0575
SHA-256 | b2964cc6ea47c3ff494ac0ba09943749a17bee103f4f028ad03907e1a5f75be0
ACROS Security Problem Report 2011-02-11-1
Posted Feb 11, 2011
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2011-02-11-1 - A binary planting vulnerability in Adobe Reader allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2011-0562
SHA-256 | b1e77d5df00205c724b329b0db4a695471855c8bec22c065a64777d969db1c55
Remote Binary Planting In Multiple F-Secure Products
Posted Jan 11, 2011
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2011-01-11-1 - A binary planting vulnerability in F-Secure Internet Security 2010 and 2011, F-Secure Anti-Virus 2010 and 2011 and multiple other F-Secure products allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local, virus
systems | windows
SHA-256 | 01f52cb96345599ee288a5aaf14347b748cc0327df5569dc06d00aff5958486b
ACROS Security Problem Report 2010-12-14.1
Posted Dec 14, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-12-14-1 - A binary planting vulnerability in Windows Address Book and Windows Contacts allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2010-3147
SHA-256 | 5d01b3714e5a1a07936f8d579e1f7f0c5b96811e39e1536e72e0ff2fd817f142
ACROS Security Problem Report 2010-11-10.2
Posted Nov 11, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-11-10-02 - A binary planting vulnerability in Microsoft Word 2010 for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2010-3337
SHA-256 | 39cad8e7dbdb46dd9950300db060a957a65f86625e02967c627e6fd585188855
ACROS Security Problem Report 2010-11-10.3
Posted Nov 11, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-11-10-03 - A binary planting vulnerability in Microsoft Excel 2010 for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2010-3337
SHA-256 | 372b067ad956bff5c5fe8c059ec5b674e34786161a23b90e60aea1fcf580aa01
ACROS Security Problem Report 2010-11-10.1
Posted Nov 11, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-11-10-01 - A binary planting vulnerability in Microsoft PowerPoint 2010 for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2010-3337
SHA-256 | a329c4134ecfbda8db94bc668a6c672d4361d55bd4c8152e98d15e161f6e7be7
ACROS Security Problem Report 2010-11-05.01
Posted Nov 5, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-11-05-01 - A binary planting vulnerability in Adobe Flash Player for local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2010-3976
SHA-256 | 20d4011cacea1a5e897650169d0a521c09da2450f7b2ee46be82b6edd78f5903
Microsoft Visual Studio Binary Planting
Posted Oct 27, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

Microsoft Visual Studio can automatically make an application binary planting-positive (i.e., vulnerable) even when the developer makes no programming errors.

tags | advisory
SHA-256 | c0aac373bffee68fe54e852d86ae18b53aec0d15a35e61bf4dfca325de3986f4
ACROS Security Problem Report 2010-09-08.1
Posted Sep 11, 2010
Authored by ACROS Security, Simon Raner | Site acrossecurity.com

ACROS Security Problem Report #2010-09-08-1 - A binary planting vulnerability in Apple Safari for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows, apple
SHA-256 | 32cb665d6f322c391a6a1c38cae156abee997050ebc2bc06e5fd56f4d9b5541c
ACROS Security Problem Report 2010-08-18.1
Posted Aug 19, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2010-08-18-1 - A "binary planting" vulnerability in Apple iTunes for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows, apple
SHA-256 | edfc6547e76ce14e38a894626f62b9e37d86313d79b92a1f4362183bd1a7e662
ACROS Security Problem Report 2010-04-12.1
Posted Apr 14, 2010
Authored by Mitja Kolsek, ACROS Security, Jure Skofic | Site acrossecurity.com

ACROS Security Problem Report #2010-04-12-1 - A "binary planting" vulnerability in VMware Tools for Windows allows local or remote (possibly Internet-based) attackers to deploy and execute malicious code on virtual Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
SHA-256 | 1a33ad33d61288c5a2f1bc8851a66d3420578051913dd9eb34bba9d650c3d21b
ACROS Security Problem Report 2010-04-12.2
Posted Apr 14, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2010-04-12-2 - A "binary planting" vulnerability in VMware Tools for Windows allows a local non-administrative attacker, under certain circumstances, to execute a malicious executable on virtual Windows machines in the context of logged- on users.

tags | advisory, local
systems | windows
SHA-256 | f4ab6e48b6664883b247cd29bef48610a751f93149811ac6017b3e330925de9b
ACROS Security Problem Report 2009-10-30.1
Posted Nov 3, 2009
Authored by ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2009-10-30-1 - There is an HTML Injection vulnerability in the WebLogic server version 10.3 administration console that allows the attacker to gain administrative access to the server.

tags | advisory
SHA-256 | afb874f67261c2f5e3869658a0249ee9cea2ebb6a0e437486664f71a9744d1c9
ACROS Security Problem Report 2009-01-27.1
Posted Jan 28, 2009
Authored by ACROS Security, Sasa Kos | Site acrossecurity.com

The BEA WebLogic Server Console suffers from a HTML injection vulnerability. Version 10.0 is affected.

tags | advisory
SHA-256 | 0e87edddc628b1f48b68ef24eeb6ae463a27c7749fcdf234b6e3a7419d4abb61
ACROS Security Problem Report 2005-05-24.1
Posted Aug 14, 2005
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

WebLogic Server and WebLogic Express, Service Pack 4, are susceptible to cross site scripting flaws.

tags | advisory, xss
SHA-256 | 2619b3310f3c47e89eec1626a229bb5d830f5decc8011308daf41b04d6db1c6a
ACROS Security Problem Report 2005-05-24.2
Posted Aug 14, 2005
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

WebLogic Server and WebLogic Express, Service Pack 4, suffer from an HTML injection vulnerability.

tags | advisory
SHA-256 | 4e1a06fc9b94d88a2cec7ac59f0f8068f2d468c16b54bafaf9f0330407427003
ACROS Security Problem Report 2004-10-14.2
Posted Oct 26, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-14-2 - A session fixation vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.

tags | advisory
systems | windows
SHA-256 | a8a0911bb92bb34272d7603cf5792186b24b0b081db2b0c08b5ad280955b04b4
ACROS Security Problem Report 2004-10-14.1
Posted Oct 26, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-14-1 - An HTML injection vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions using cross site scripting. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.

tags | advisory, xss
systems | windows
SHA-256 | 487af986bd012c24d6a3e7e4dfd960e7c9e9331bc24d864abeb1255a1d845802
ACROS Security Problem Report 2004-10-14.3
Posted Oct 26, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-14-3 - An HTTP response splitting vulnerability exists in JRun server session management. It allows an attacker to issue an arbitrary HTTP header or HTTP body to a browser. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.

tags | advisory, web, arbitrary
systems | windows
SHA-256 | e6f43a53cf3a775f98b530eb7119a6ed338615cc3fda3c5261f7bfb46238ec5a
ACROS Security Problem Report 2004-10-13.1
Posted Oct 24, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-13-1 - The public report released discussing the poisoning of cached HTTPS documents in Internet Explorer including workarounds and mitigating factors.

tags | advisory, web
advisories | CVE-2004-0845
SHA-256 | b31003f292ce532e33ac3e00b98fd52f3b033acdcbb19bcde9eb0dc39d7e3160
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close