exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Mitja Kolsek

Email addressmitja.kolsek at acros.si
First Active2002-12-20
Last Active2018-09-10
How We Micropatched A Publicly Dropped 0day In Task Scheduler
Posted Sep 10, 2018
Authored by Mitja Kolsek

Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.

tags | paper
SHA-256 | deb36065ff9819bcfd1cef3afaa4a9f94c43d49d8869f350b053313e7ada99d6
COM Server-Based Binary Planting Proof Of Concept
Posted Jun 2, 2011
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

Proof of concept exploit for the COM server-based binary planting presentation given at Hack in the Box in Amsterdam.

tags | exploit, proof of concept
SHA-256 | 660882c80064fb7a27e3efa3e517d23e2721d9b7415e35656ca010ab4e47b744
ACROS Security Problem Report 2011-02-11-1
Posted Feb 11, 2011
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2011-02-11-1 - A binary planting vulnerability in Adobe Reader allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
advisories | CVE-2011-0562
SHA-256 | b1e77d5df00205c724b329b0db4a695471855c8bec22c065a64777d969db1c55
Microsoft Visual Studio Binary Planting
Posted Oct 27, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

Microsoft Visual Studio can automatically make an application binary planting-positive (i.e., vulnerable) even when the developer makes no programming errors.

tags | advisory
SHA-256 | c0aac373bffee68fe54e852d86ae18b53aec0d15a35e61bf4dfca325de3986f4
ACROS Security Problem Report 2010-08-18.1
Posted Aug 19, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2010-08-18-1 - A "binary planting" vulnerability in Apple iTunes for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows, apple
SHA-256 | edfc6547e76ce14e38a894626f62b9e37d86313d79b92a1f4362183bd1a7e662
ACROS Security Problem Report 2010-04-12.1
Posted Apr 14, 2010
Authored by Mitja Kolsek, ACROS Security, Jure Skofic | Site acrossecurity.com

ACROS Security Problem Report #2010-04-12-1 - A "binary planting" vulnerability in VMware Tools for Windows allows local or remote (possibly Internet-based) attackers to deploy and execute malicious code on virtual Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
SHA-256 | 1a33ad33d61288c5a2f1bc8851a66d3420578051913dd9eb34bba9d650c3d21b
ACROS Security Problem Report 2010-04-12.2
Posted Apr 14, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2010-04-12-2 - A "binary planting" vulnerability in VMware Tools for Windows allows a local non-administrative attacker, under certain circumstances, to execute a malicious executable on virtual Windows machines in the context of logged- on users.

tags | advisory, local
systems | windows
SHA-256 | f4ab6e48b6664883b247cd29bef48610a751f93149811ac6017b3e330925de9b
ASPR-2008-03-11-1.txt
Posted Mar 13, 2008
Authored by Mitja Kolsek, Sasa Kos | Site acrossecurity.com

A HTML injection vulnerability exists in the WebLogic administration console. Version 10.0 is susceptible.

tags | advisory
SHA-256 | 31c7f522f189ed3bfdfb6a0997208a45558be78e9d59f1585239b571c11fe2f3
ASPR-2008-03-11-2.txt
Posted Mar 13, 2008
Authored by Mitja Kolsek | Site acrossecurity.com

A session fixation vulnerability exists in the WebLogic administration console. Version 10.0 is susceptible.

tags | advisory
SHA-256 | f9b44008606d60660c826241111888eda4b9b18827b96578d1ccf098a3fbaca8
ACROS Security Problem Report 2005-05-24.1
Posted Aug 14, 2005
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

WebLogic Server and WebLogic Express, Service Pack 4, are susceptible to cross site scripting flaws.

tags | advisory, xss
SHA-256 | 2619b3310f3c47e89eec1626a229bb5d830f5decc8011308daf41b04d6db1c6a
ACROS Security Problem Report 2005-05-24.2
Posted Aug 14, 2005
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

WebLogic Server and WebLogic Express, Service Pack 4, suffer from an HTML injection vulnerability.

tags | advisory
SHA-256 | 4e1a06fc9b94d88a2cec7ac59f0f8068f2d468c16b54bafaf9f0330407427003
ACROS Security Problem Report 2004-10-14.2
Posted Oct 26, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-14-2 - A session fixation vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.

tags | advisory
systems | windows
SHA-256 | a8a0911bb92bb34272d7603cf5792186b24b0b081db2b0c08b5ad280955b04b4
ACROS Security Problem Report 2004-10-14.1
Posted Oct 26, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-14-1 - An HTML injection vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions using cross site scripting. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.

tags | advisory, xss
systems | windows
SHA-256 | 487af986bd012c24d6a3e7e4dfd960e7c9e9331bc24d864abeb1255a1d845802
ACROS Security Problem Report 2004-10-14.3
Posted Oct 26, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-14-3 - An HTTP response splitting vulnerability exists in JRun server session management. It allows an attacker to issue an arbitrary HTTP header or HTTP body to a browser. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.

tags | advisory, web, arbitrary
systems | windows
SHA-256 | e6f43a53cf3a775f98b530eb7119a6ed338615cc3fda3c5261f7bfb46238ec5a
ACROS Security Problem Report 2004-10-13.1
Posted Oct 24, 2004
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2004-10-13-1 - The public report released discussing the poisoning of cached HTTPS documents in Internet Explorer including workarounds and mitigating factors.

tags | advisory, web
advisories | CVE-2004-0845
SHA-256 | b31003f292ce532e33ac3e00b98fd52f3b033acdcbb19bcde9eb0dc39d7e3160
ms04-038.html
Posted Oct 24, 2004
Authored by Mitja Kolsek, John Heasman, Greg Jones | Site microsoft.com

Microsoft Security Advisory MS04-038 - Multiple Internet Explorer vulnerabilities have been patched by Microsoft. If a user is logged on with administrative privileges, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.

tags | advisory, vulnerability
advisories | CVE-2004-0842, CVE-2004-0727, CVE-2004-0216, CVE-2004-0839, CVE-2004-0844, CVE-2004-0843, CVE-2004-0841, CVE-2004-0845
SHA-256 | 8c12c38d2335efcde6058b11b2939c069107c03e4343a03882cdaf1d2b2296ee
session_fixation.pdf
Posted Dec 20, 2002
Authored by Mitja Kolsek | Site acros.si

Session Fixation Vulnerability in Web-based Applications - Many web-based applications employ some kind of session management to create a user friendly environment. Sessions are stored on a server and associated with respective users by sessions identifiers (IDs). Naturally session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are employing techniques for protecting session IDs from three classes of attacks: interception, prediction, and brute force attacks. This paper reveals a fourth class of session attacks against session IDs: session fixation attacks.

tags | paper, web
SHA-256 | e8a24bd745c20648c072b561ba4717627c93a9e649320428356139d804231bd5
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close