Whitepaper called How We Micropatched A Publicly Dropped 0day In Task Scheduler.
deb36065ff9819bcfd1cef3afaa4a9f94c43d49d8869f350b053313e7ada99d6
Proof of concept exploit for the COM server-based binary planting presentation given at Hack in the Box in Amsterdam.
660882c80064fb7a27e3efa3e517d23e2721d9b7415e35656ca010ab4e47b744
ACROS Security Problem Report #2011-02-11-1 - A binary planting vulnerability in Adobe Reader allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
b1e77d5df00205c724b329b0db4a695471855c8bec22c065a64777d969db1c55
Microsoft Visual Studio can automatically make an application binary planting-positive (i.e., vulnerable) even when the developer makes no programming errors.
c0aac373bffee68fe54e852d86ae18b53aec0d15a35e61bf4dfca325de3986f4
ACROS Security Problem Report #2010-08-18-1 - A "binary planting" vulnerability in Apple iTunes for Windows allows local or remote (even Internet-based) attackers to deploy and execute malicious code on Windows machines in the context of logged-on users.
edfc6547e76ce14e38a894626f62b9e37d86313d79b92a1f4362183bd1a7e662
ACROS Security Problem Report #2010-04-12-1 - A "binary planting" vulnerability in VMware Tools for Windows allows local or remote (possibly Internet-based) attackers to deploy and execute malicious code on virtual Windows machines in the context of logged-on users.
1a33ad33d61288c5a2f1bc8851a66d3420578051913dd9eb34bba9d650c3d21b
ACROS Security Problem Report #2010-04-12-2 - A "binary planting" vulnerability in VMware Tools for Windows allows a local non-administrative attacker, under certain circumstances, to execute a malicious executable on virtual Windows machines in the context of logged- on users.
f4ab6e48b6664883b247cd29bef48610a751f93149811ac6017b3e330925de9b
A HTML injection vulnerability exists in the WebLogic administration console. Version 10.0 is susceptible.
31c7f522f189ed3bfdfb6a0997208a45558be78e9d59f1585239b571c11fe2f3
A session fixation vulnerability exists in the WebLogic administration console. Version 10.0 is susceptible.
f9b44008606d60660c826241111888eda4b9b18827b96578d1ccf098a3fbaca8
WebLogic Server and WebLogic Express, Service Pack 4, are susceptible to cross site scripting flaws.
2619b3310f3c47e89eec1626a229bb5d830f5decc8011308daf41b04d6db1c6a
WebLogic Server and WebLogic Express, Service Pack 4, suffer from an HTML injection vulnerability.
4e1a06fc9b94d88a2cec7ac59f0f8068f2d468c16b54bafaf9f0330407427003
ACROS Security Problem Report #2004-10-14-2 - A session fixation vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.
a8a0911bb92bb34272d7603cf5792186b24b0b081db2b0c08b5ad280955b04b4
ACROS Security Problem Report #2004-10-14-1 - An HTML injection vulnerability exists in JRun Management Console, enabling attackers to hijack administrative sessions using cross site scripting. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.
487af986bd012c24d6a3e7e4dfd960e7c9e9331bc24d864abeb1255a1d845802
ACROS Security Problem Report #2004-10-14-3 - An HTTP response splitting vulnerability exists in JRun server session management. It allows an attacker to issue an arbitrary HTTP header or HTTP body to a browser. Version affected: JRun 4 for Windows, Service Pack 1a, possibly others.
e6f43a53cf3a775f98b530eb7119a6ed338615cc3fda3c5261f7bfb46238ec5a
ACROS Security Problem Report #2004-10-13-1 - The public report released discussing the poisoning of cached HTTPS documents in Internet Explorer including workarounds and mitigating factors.
b31003f292ce532e33ac3e00b98fd52f3b033acdcbb19bcde9eb0dc39d7e3160
Microsoft Security Advisory MS04-038 - Multiple Internet Explorer vulnerabilities have been patched by Microsoft. If a user is logged on with administrative privileges, an attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts with full privileges. Users whose accounts are configured to have fewer privileges on the system would be at less risk than users who operate with administrative privileges.
8c12c38d2335efcde6058b11b2939c069107c03e4343a03882cdaf1d2b2296ee
Session Fixation Vulnerability in Web-based Applications - Many web-based applications employ some kind of session management to create a user friendly environment. Sessions are stored on a server and associated with respective users by sessions identifiers (IDs). Naturally session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are employing techniques for protecting session IDs from three classes of attacks: interception, prediction, and brute force attacks. This paper reveals a fourth class of session attacks against session IDs: session fixation attacks.
e8a24bd745c20648c072b561ba4717627c93a9e649320428356139d804231bd5