what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Sven Krewitt

First Active2006-07-02
Last Active2016-09-14
MuM Map Edit 3.2.6.0 SQL Injection / File Manipulation / Poor Practices
Posted Sep 14, 2016
Authored by Sven Krewitt, Paul Baade

Mum Map Edit version 3.2.6.0 suffers from file manipulation, passing of credentials in GET request, remote SQL injection, and other vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 6c295fdd7f7a3b1e1dfbccadbc6b1e541384fbabed8441cf673d86b21c8c8853
Foxit Reader Plugin URL Processing Buffer Overflow
Posted Feb 14, 2013
Authored by rgod, Sven Krewitt, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability in the Foxit Reader Plugin, it exists in the npFoxitReaderPlugin.dll module. When loading PDF files from remote hosts, overly long query strings within URLs can cause a stack-based buffer overflow, which can be exploited to execute arbitrary code. This exploit has been tested on Windows 7 SP1 with Firefox 18.0 and Foxit Reader version 5.4.4.11281 (npFoxitReaderPlugin.dll version 2.2.1.530).

tags | exploit, remote, overflow, arbitrary
systems | windows
advisories | OSVDB-89030
SHA-256 | c450d4aab31791359842f4138d4d56fcaf0f328423e4c7eb05f96dcfe84d4a0e
Apache Wicket 1.4.x Cross Site Scripting
Posted Aug 24, 2011
Authored by Sven Krewitt

Apache Wicket version 1.4.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2011-2712
SHA-256 | 9d87eb45b2ffcd8b3e5d95c70dbb91a574fa76f889edb2004d29a8fbcd9e71bc
Opera Download Dialog File Execution Security Issue
Posted Aug 13, 2010
Authored by Jakob Balle, Sven Krewitt | Site secunia.com

Secunia Research has discovered a security issue in Opera, which can be exploited by malicious people to compromise a vulnerable system. The "Download" dialog provides the option to run a downloadable executable at a predictable location in the browser window. This can be exploited to trick a user into clicking on the "Run" button by positioning a new window on top of the "Download" dialog that is closed e.g. via a timeout shortly before the user clicks on a link within this window. Versions 10.53, 10.54, and 10.60 are affected.

tags | advisory
advisories | CVE-2010-2576
SHA-256 | 6d6d66e9a32fff988d108b6aacf6aafbb0e751bab35b122c3740cd1095ab2b33
secunia-xmms.txt
Posted Mar 22, 2007
Authored by Sven Krewitt | Site secunia.com

Secunia Research has discovered two vulnerabilities in XMMS, which can be exploited by malicious people to compromise a user's system. Version 1.2.10 for Linux is affected. Other versions may also be affected.

tags | advisory, vulnerability
systems | linux
advisories | CVE-2007-0653, CVE-2007-0654
SHA-256 | 2412d4444a7594d0f522d5866c94ee7509d2ab08e8fe47a03b4717f9591ba5d0
secunia-jetbox.txt
Posted Aug 17, 2006
Authored by Sven Krewitt | Site secunia.com

Secunia Research has discovered some vulnerabilities in Jetbox CMS version 2.1 SR1, which can be exploited by malicious people to conduct session fixation attacks, disclose certain system information, conduct cross-site scripting, script insertion, and SQL injection attacks, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
advisories | CVE-2006-3583, CVE-2006-3584, CVE-2006-3585, CVE-2006-3586
SHA-256 | 9f04052cf29a6c2a2789c34d885d6c38cca5d32aabb96f773f141859450e1776
secunia-phpRaid.txt
Posted Jul 2, 2006
Authored by Sven Krewitt | Site secunia.com

Secunia Research has discovered some vulnerabilities in phpRaid, which can be exploited by malicious people to conduct SQL injection attacks or to compromise a vulnerable system. Versions 3.0.4, 3.0.5, and 3.0.6 are affected.

tags | advisory, vulnerability, sql injection
advisories | CVE-2006-3115, CVE-2006-3116
SHA-256 | beef01385464473240bd9b603ae42c76d7b04f74bbe01d935c99809f807eaa26
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close