what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Javier Vicente Vallejo

Email addressprivate
First Active2008-09-15
Last Active2015-08-17
View User Profile
Comtrend Cross Site Request Forgery
Posted Aug 17, 2015
Authored by Javier Vicente Vallejo

Various Comtrend routers suffer from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | e075f47c52d3263edf9bcad894a9d0275e22ef6410176b35861b5f4f4b21a56c
iDEFENSE Security Advisory 2009-02-24.1
Posted Feb 25, 2009
Authored by iDefense Labs, Javier Vicente Vallejo | Site idefense.com

iDefense Security Advisory 02.24.09 - Remote exploitation of a invalid object reference vulnerability in Adobe Systems Inc.'s Flash Player could allow an attacker to execute arbitrary code with the privileges of the current user. During the processing of a Shockwave Flash file, a particular object can be created, along with multiple references that point to the object. The object can be destroyed and its associated references removed. However a reference can incorrectly remain pointing to the object. The invalid object resides in uninitialized memory, which the attacker may control to gain arbitrary execution control. iDefense has confirmed the existence of this vulnerability in latest version of Flash Player, version 9.0.124.0. Previous versions may also be affected.

tags | advisory, remote, arbitrary
advisories | CVE-2009-0520
SHA-256 | 780e892128d7d79681ecb9f2b0c8adb3af7430a9be41d1863f245d1dd740cf75
Zero Day Initiative Advisory 08-073
Posted Nov 5, 2008
Authored by Tipping Point, Javier Vicente Vallejo | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat and Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious web address or open a malicious file. The specific flaw exists within the parsing of PDF objects defined in the file. When a specific object becomes malformed, a small memory corruption occurs which can be leveraged by an attacker to execute arbitrary code under the context of the current user.

tags | advisory, remote, web, arbitrary
advisories | CVE-2008-4813
SHA-256 | 83fcb2c8b363aecd0f52b7d84c9897263d7250d4ee9f6957c6eadeeccb666437
mswritesmb-dos.txt
Posted Sep 15, 2008
Authored by Javier Vicente Vallejo | Site vallejo.cc

Microsoft Windows is prone to a kernel-related denial of service condition due to the way srv.sys handles malformed WRITE_ANDX SMB packets. Metasploit exploit code included.

tags | exploit, denial of service, kernel
systems | windows
SHA-256 | 78155c1242238f3c779e439c47050b7f13096125447eda1e52928ce1ec4671a2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close