what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Sven Krewitt

First Active2006-07-02
Last Active2016-09-14
MuM Map Edit 3.2.6.0 SQL Injection / File Manipulation / Poor Practices
Posted Sep 14, 2016
Authored by Sven Krewitt, Paul Baade

Mum Map Edit version 3.2.6.0 suffers from file manipulation, passing of credentials in GET request, remote SQL injection, and other vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 6c295fdd7f7a3b1e1dfbccadbc6b1e541384fbabed8441cf673d86b21c8c8853
Foxit Reader Plugin URL Processing Buffer Overflow
Posted Feb 14, 2013
Authored by rgod, Sven Krewitt, juan vazquez | Site metasploit.com

This Metasploit module exploits a vulnerability in the Foxit Reader Plugin, it exists in the npFoxitReaderPlugin.dll module. When loading PDF files from remote hosts, overly long query strings within URLs can cause a stack-based buffer overflow, which can be exploited to execute arbitrary code. This exploit has been tested on Windows 7 SP1 with Firefox 18.0 and Foxit Reader version 5.4.4.11281 (npFoxitReaderPlugin.dll version 2.2.1.530).

tags | exploit, remote, overflow, arbitrary
systems | windows
advisories | OSVDB-89030
SHA-256 | c450d4aab31791359842f4138d4d56fcaf0f328423e4c7eb05f96dcfe84d4a0e
Apache Wicket 1.4.x Cross Site Scripting
Posted Aug 24, 2011
Authored by Sven Krewitt

Apache Wicket version 1.4.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2011-2712
SHA-256 | 9d87eb45b2ffcd8b3e5d95c70dbb91a574fa76f889edb2004d29a8fbcd9e71bc
Opera Download Dialog File Execution Security Issue
Posted Aug 13, 2010
Authored by Jakob Balle, Sven Krewitt | Site secunia.com

Secunia Research has discovered a security issue in Opera, which can be exploited by malicious people to compromise a vulnerable system. The "Download" dialog provides the option to run a downloadable executable at a predictable location in the browser window. This can be exploited to trick a user into clicking on the "Run" button by positioning a new window on top of the "Download" dialog that is closed e.g. via a timeout shortly before the user clicks on a link within this window. Versions 10.53, 10.54, and 10.60 are affected.

tags | advisory
advisories | CVE-2010-2576
SHA-256 | 6d6d66e9a32fff988d108b6aacf6aafbb0e751bab35b122c3740cd1095ab2b33
secunia-xmms.txt
Posted Mar 22, 2007
Authored by Sven Krewitt | Site secunia.com

Secunia Research has discovered two vulnerabilities in XMMS, which can be exploited by malicious people to compromise a user's system. Version 1.2.10 for Linux is affected. Other versions may also be affected.

tags | advisory, vulnerability
systems | linux
advisories | CVE-2007-0653, CVE-2007-0654
SHA-256 | 2412d4444a7594d0f522d5866c94ee7509d2ab08e8fe47a03b4717f9591ba5d0
secunia-jetbox.txt
Posted Aug 17, 2006
Authored by Sven Krewitt | Site secunia.com

Secunia Research has discovered some vulnerabilities in Jetbox CMS version 2.1 SR1, which can be exploited by malicious people to conduct session fixation attacks, disclose certain system information, conduct cross-site scripting, script insertion, and SQL injection attacks, and compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
advisories | CVE-2006-3583, CVE-2006-3584, CVE-2006-3585, CVE-2006-3586
SHA-256 | 9f04052cf29a6c2a2789c34d885d6c38cca5d32aabb96f773f141859450e1776
secunia-phpRaid.txt
Posted Jul 2, 2006
Authored by Sven Krewitt | Site secunia.com

Secunia Research has discovered some vulnerabilities in phpRaid, which can be exploited by malicious people to conduct SQL injection attacks or to compromise a vulnerable system. Versions 3.0.4, 3.0.5, and 3.0.6 are affected.

tags | advisory, vulnerability, sql injection
advisories | CVE-2006-3115, CVE-2006-3116
SHA-256 | beef01385464473240bd9b603ae42c76d7b04f74bbe01d935c99809f807eaa26
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    22 Files
  • 31
    May 31st
    18 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close