by Julien Ahrens | Sunday, September 16, 2012 | Exploit
My latest finding: A classic buffer overflow. And this time I’ve used the great mona.py script created by the corelan team to exploit the vulnerability. It helps to find memory addresses for all of your stack adjustment needs (beside this, the script...
by Julien Ahrens | Friday, August 24, 2012 | Advisory
About a small, but nice CMS! Update immediately to v0.4 RC3 which fixes critical SQL-Injection vulnerabilities! References:http://security.inshell.net/advisory/23http://seclists.org/fulldisclosure/2012/Aug/304 1. ADVISORY INFORMATION...
by Julien Ahrens | Wednesday, August 15, 2012 | General, News
This is quite a sad story and also a perfect example of the ignorance or maybe arrogance of many software vendors. I’ve reported the Buffer Overflow vulnerability to the vendor named “Photodex” and also received an answer, which sounds like they...
by Julien Ahrens | Monday, July 2, 2012 | Exploit
My latest finding: Photodex ProShow Producer v5.0.3256 Local Buffer Overflow Vulnerability And…just a very, very, very quick and not reliable way of exploiting the vulnerability to execute some code. I’m working on a nicer(better) solution 🙂...
by Julien Ahrens | Wednesday, June 27, 2012 | Advisory
Have you read one of my last articles regarding webmasters ? The university of Salzburg didn’t or at least didn’t want to. In April I tried to contact the internal university IT staff about a possible Cross-Site Scripting security flaw on their main...