what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 59 of 59 RSS Feed

Files from Adam Gowdiak

Email addresszupa at man.poznan.pl
First Active2004-10-27
Last Active2024-06-21
Java SE Critical Patch Update
Posted Oct 22, 2012
Authored by Adam Gowdiak | Site security-explorations.com

On Oct 16, 2012, Oracle corporation released Java SE Critical Patch Update, which incorporated fixes for 19 security issues that Security Explorations reported to the company earlier this year. This included a fix for a serious issue found shortly after the out-of-band patch was released by Oracle on Aug 30, 2012. This is yet another update to the saga of SE-2012-01.

tags | advisory, java
SHA-256 | 6b5435fb50ec423d0d75cecaf2ec4e9f387a00115a379abfa7af4f7c3ac321d8
Yet Another Oracle Java Vulnerability
Posted Sep 25, 2012
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations has announced that they have discovered yet another sandbox bypass of Oracle Java and have reported little in the way of details until the vendor fixes the issue. It currently affects all versions of Java. It's probably best to just keep Java off in your browser for now.

tags | advisory, java
SHA-256 | 37fdc8d80a0b4d0df3960ac7a955595a2cb6e9d1152e90d378fc9a7f71ec1745
IBM Java Security Vulnerabilities
Posted Sep 11, 2012
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations discovered multiple security vulnerabilities in IBM SDK, Java Technology Edition software. This is IBM's implementation of Java SE technology for AIX, Linux, z/OS and IBMi platforms. Among a total of 17 security weaknesses found, there are issues that can lead to the complete compromise of a target IBM Java environment.

tags | advisory, java, vulnerability
systems | linux, aix
SHA-256 | 867ac9eef17a67029d0c83a32794fd6f14dae99bbb8a7705e718b79b7bd50592
Apple QuickTime Security Bypass
Posted Jun 25, 2012
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations does not agree with Apple's evaluation of a vulnerability they reported. They have decided to release proof of concept code to demonstrate a bypass vulnerability in Apple QuickTime Java extensions.

tags | exploit, java, proof of concept, bypass
systems | linux, apple
SHA-256 | c2aeee9d3f479037cf3a1177e445be5a6068ad94532c3d4c68af96ada0b39421
Security Vulnerabilities Of Digital Video Broadcast Chipsets
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Vulnerabilities of Digital Video Broadcast Chipsets. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper, vulnerability
SHA-256 | b5085e8431fb1a7e2bbeb1de39c969addc0919c9cb22fbe8c72602adfcfcf41b
Security Threats In Digital Satellite Television
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Threats in the World of Digital Satellite Television. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper
SHA-256 | 61103d4ce9bcf58777deab4ee4ff4c33b39828de0f9c1efaefc51fa159e8fffc
Java SE Sandbox Bypass
Posted Apr 4, 2012
Authored by Adam Gowdiak | Site security-explorations.com

Security Explorations found 19 weaknesses in Java SE security that can allow for sandbox bypass.

tags | advisory, java
SHA-256 | 4661663296ec5c8cd7a92c27196e3d31e5a2e1f0580d5ae12fa10ebb2109f69b
nokia-java.txt
Posted Aug 13, 2008
Authored by Adam Gowdiak | Site security-explorations.com

Bypass and malicious action vulnerabilities exist in the Java mobile technology as included with the Sun Wireless Toolkit version 2.5.2.

tags | advisory, java, vulnerability
SHA-256 | 1f505dac18beb6e9fd267b8cde6249cf62d99f115a9f5cdcfafc12ac67f5ef59
JavaPhone.txt
Posted Oct 27, 2004
Authored by Adam Gowdiak | Site man.poznan.pl

Two very serious security vulnerabilities in Java technology for mobile devices (Java 2 Micro Edition) affects about 250 million mobile phones coming from Nokia, Siemens, Panasonic, Samsung, Motorola and others. Sun has refused to release an alert regarding these issues. Information about these flaws has been published at Hack In the Box Security Conference earlier this month in Kuala Lumpur, Malaysia.

tags | advisory, java, vulnerability
SHA-256 | b5205c34f95361edb616b9b5160c4caade01ca0f30aebdbc019a5cfb22606cd6
Page 3 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close