what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 59 RSS Feed

Files from Adam Gowdiak

Email addresszupa at man.poznan.pl
First Active2004-10-27
Last Active2024-06-21
Google App Engine Java Security Sandbox Bypasses
Posted Mar 17, 2015
Authored by Adam Gowdiak | Site security-explorations.com

Full materials and proof of concept code has been released for the Security Explorations discovery of various Google app engine java security sandbox bypasses.

tags | exploit, java, proof of concept
systems | linux
SHA-256 | bd960af7763ba59085745caf406af8ad984dad196a7d5aaccd9db363dd96eb1a
Google App Engine Java VM Sandbox Escape
Posted Dec 6, 2014
Authored by Adam Gowdiak | Site security-explorations.com

In excess of 30 issues have been discovered related to the Google App Engine including a complete Java VM security sandbox escape.

tags | advisory, java
SHA-256 | 6182e41f90d3af4bea0258e8b31121bc251e830d6c929f250793bc9835215c4c
Oracle Database Java VM Security Vulnerabilities
Posted Oct 15, 2014
Authored by Adam Gowdiak | Site security-explorations.com

This archive contains a couple of pdfs detailing 22 security vulnerabilities in Oracle Database Java VM along with proof of concept code.

tags | exploit, java, vulnerability, proof of concept
systems | linux
SHA-256 | ecf11e83b5525ba9d476e4539ffb04359d6e5d4f9b76b0703665010c38864b7f
Oracle Database Java VM 20 Weaknesses
Posted Jun 16, 2014
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations discovered multiple security issues in the implementation of a Java VM embedded in Oracle Database software. Among a total of 20 weaknesses discovered, there are issues that allow to create a specific Java security bypass condition or that facilitate the execution of arbitrary Java code on Oracle Database server without proper privileges.

tags | advisory, java, arbitrary
SHA-256 | 67ffba97eac0feeeb493a67dcadb70bec07aaba89ec8cdc1f47731fb6432f1c2
30 Issues In Oracle Java Cloud Service
Posted Apr 1, 2014
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations decided to release technical details and accompanying proof of concept codes for security vulnerabilities discovered in the environment of Oracle Java Cloud Service. Enclosed are two pdfs detailing the issues along with a zip file filled with proof of concept code. The release of data is due to Oracle's continued failure to properly handle vulnerability reports.

tags | exploit, java, vulnerability, proof of concept
systems | linux
SHA-256 | 8da74747f63ecbeaf0436376646b7870ac187a6fd484dcb90371ecdd3d8b7be4
Java PaaS / Cloud Services Security Issues
Posted Feb 1, 2014
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations discovered multiple security vulnerabilities in the environment of Oracle Java Cloud Service. Among a total of 28 issues found, there are 16 weaknesses that make it possible to completely break Java security sandbox of a target WebLogic server environment. An attacker can further leverage this to gain access to application deployments of other users of Oracle Java Cloud service in the same regional data center.

tags | advisory, java, vulnerability
SHA-256 | 652728a4db193f91cfd789d35f2cbce67c8d3fb9f86841ab4870dda696838141
Oracle Java SE 7 Issue 69
Posted Oct 17, 2013
Authored by Adam Gowdiak | Site security-explorations.com

The CPU released Oct 15, 2013 by Oracle included information about a fix for Java SE 7 vulnerability (Issue 69) that was reported to the company in July.

tags | advisory, java
SHA-256 | 8836a50caf231af0bc2808d25511d8afa12be6798b069187840e5e846e7cbf09
Java SE 7 Issue 69
Posted Jul 18, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has submitted a new vulnerability to Oracle that implements a classic attack against Java VM.

tags | advisory, java
SHA-256 | 06b801519ec428ee719f86858e50021889fbd7008bbcfe62c1df7a749f41a4e1
Java Applet ProviderSkeleton Insecure Invoke Method
Posted Jun 27, 2013
Authored by Adam Gowdiak, Matthias Kaiser | Site metasploit.com

This Metasploit module abuses the insecure invoke() method of the ProviderSkeleton class that allows to call arbitrary static methods with user supplied arguments. The vulnerability affects Java version 7u21 and earlier.

tags | exploit, java, arbitrary
advisories | CVE-2013-2460, OSVDB-94346
SHA-256 | 4c7f2d07b2fb9904b25b6805e68094ce81bd292f4e93feb4b36e0f249b1ace06
IBM SDK 7 New Security Issues
Posted May 6, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations discovered 7 additional security issues (#62-68) in the latest version of IBM SDK, Java Technology Edition software. A majority of the new flaws are due to insecure use or implementation of Java Reflection API.

tags | advisory, java
SHA-256 | 5ee140ef4ee1fbbba3be2d987e3af93d9141d6766d1e154771745114d62a987d
Java 1.7.0_21-b11 Code Execution
Posted Apr 22, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Java versions 1.7.0_21-b11 and below suffers from an arbitrary code execution vulnerability.

tags | advisory, java, arbitrary, code execution
SHA-256 | 3158f404571528b94f1fbd702d6393ab7fee07d0e1316cf499dea137b946ebac
Oracle Java SE 7 Update 21 Information
Posted Apr 16, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Oracle has released Java SE 7 Update 21, which among other things addresses six security vulnerabilities that were reported to the company earlier this year (Issues 51, 55 and 57-60).

tags | advisory, java, vulnerability
SHA-256 | db5a5e389d8d3c4c134815cc14599a283f8f6970e50643600808191ba1a9acdf
Digital Satellite TV Platform Proof Of Concepts
Posted Mar 21, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This archive contains proof of concept exploits from Security Explorations. They waited for over a year for vendors to fix the issues in various digital satellite TV platforms and were ignored.

tags | exploit, proof of concept
SHA-256 | 226671de37e4d85a2d62d0df29ac823cb5ba7b68f552e3d574a8e4642dcc0a49
Security Explorations Java Issue 54
Posted Mar 18, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This document provides the technical details of Issue 54 that was reported to Oracle on Feb 25, 2013 and that was evaluated by the company as the "allowed behavior".

tags | advisory
SHA-256 | d4c8c1fc0df190e76d87001b6555555bff504a8c763720dc1de1548590119edc
Oracle Java SE 7 Update 15 Issues
Posted Mar 4, 2013
Authored by Adam Gowdiak | Site security-explorations.com

The saga between Security Explorations and Oracle continues as yet another issue has been reported upstream.

tags | advisory
SHA-256 | 62b15c41647306908f09a62162b45a2e5e879905919342200f2385c369e80460
Java Applet JMX Remote Code Execution
Posted Feb 25, 2013
Authored by Adam Gowdiak, juan vazquez, SecurityObscurity | Site metasploit.com

This Metasploit module abuses the JMX classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in February of 2013. Additionally, this module bypasses default security settings introduced in Java 7 Update 10 to run unsigned applet without displaying any warning to the user.

tags | exploit, java, arbitrary
advisories | CVE-2013-0431, OSVDB-89613
SHA-256 | 0abc5276937c182f0640b79c2c4ed49a2a0bde2a1aa762e63cc17c0ddad5fe4f
Java SE 7 Update 15 Sandbox Bypass
Posted Feb 25, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has discovered two new security issues in Java SE 7 Update 15.

tags | advisory, java
SHA-256 | 6e34dc4dfaf21577b6c54c34aa6c280cdca75c13e6e64bafe3d587b41b47e888
Java SE Proof Of Concept Code
Posted Feb 5, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This is an archive that houses all of the proof of concept code for the issues affecting Java SE as reported in SE-2012-01 by Security Explorations.

tags | exploit, java, proof of concept
advisories | CVE-2013-0437, CVE-2013-1478, CVE-2013-1480
SHA-256 | 29990bedc5aaf8fec7315dabd3c309b9e55195b778db471fd572429d9a0d9159
Java SE CPU Feb 2013 Updates Explained
Posted Feb 5, 2013
Authored by Adam Gowdiak | Site security-explorations.com

These are the technical details surrounding security issues reported by Security Explorations to Oracle and addressed in the Feb 2013 SE CPU update.

tags | advisory
advisories | CVE-2013-0437, CVE-2013-1478, CVE-2013-1480
SHA-256 | ccd58e7acc715c85b1b15f83532e23d25e3fd385be0fae2a1ca2e5abcde6cd00
Oracle Java Security Issues Continue
Posted Jan 27, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations explains how Oracle's Java security enhancements have failed to mitigate silent exploits.

tags | advisory, java
SHA-256 | 2b66efc1c4e7c9fd15103824bba32feb11a12eafebd5e01dd6368fdffd26c398
Java 7 Update 11 Sandbox Bypass
Posted Jan 19, 2013
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has successfully confirmed that a complete Java security sandbox bypass can be still gained under the recent version of Java 7 Update 11.

tags | advisory, java
SHA-256 | 2c0a7f2862f4d546c45170b13f44126996fbdec8d1119e3f9d1012ddc23afa5a
Java Zero-Day Analysis
Posted Jan 12, 2013
Authored by Adam Gowdiak | Site security-explorations.com

This write up documents an analysis of the current Java zero-day floating around that affects version 7 update 10.

tags | advisory, java
SHA-256 | 570d0ab91ce6ae4fe76761c04da03a7343f5d11d4f9bf2f3e155de151060f50c
SE-2011-01 Satellite Research
Posted Nov 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This archive details security vulnerabilities discovered as a result of Security Explorations digital satellite TV research project. Included are two talks given at Hack In The Box on May 24, 2012 and three cumulative vulnerability reports.

tags | exploit, vulnerability
systems | linux
SHA-256 | 1fd3ff584b7823f4460f137f56dc5958c34980e524ddf116c7852e7a9bc279c6
SE-2012-01 Devoxx Presentation
Posted Nov 16, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation given at Devoxx that goes into detail about the Oracle Java vulnerabilities discussed in SE-2012-01.

tags | paper, java, vulnerability
SHA-256 | 49d02139ee9c74682ac34a668af63077f0e2e4b0d473c32bb2104c25866d4982
SE-2012-01 Technical Report
Posted Nov 16, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is the technical report detailing the Oracle Java vulnerabilities originally noted in SE-2012-01.

tags | paper, java, vulnerability
SHA-256 | d00c5da4cf880cde2e84ea74745b16dbc8e7132738d0d05fc29c596259008c0d
Page 2 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close