what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Adriel T. Desautels

First Active2006-08-27
Last Active2011-04-10
Sonexis ConferenceManager 9.3.14.0 Blind SQL Injection
Posted Apr 10, 2011
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Sonexis ConferenceManager version 9.3.14.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1f9f92a63ad712d5bdad484011567b4dc9edf18843008ce146b3c460e4a79e40
Netragard Security Advisory 2009-12-19
Posted Dec 30, 2009
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Mac OS X Java Runtime suffers from buffer overflows that allow for remote code execution.

tags | exploit, java, remote, overflow, code execution
systems | apple, osx
advisories | CVE-2009-3869, CVE-2009-3871, CVE-2009-3875, CVE-2009-3874, CVE-2009-3728, CVE-2009-3872, CVE-2009-3868, CVE-2009-3867, CVE-2009-3884, CVE-2009-3873, CVE-2009-3877, CVE-2009-3865, CVE-2009-3866
SHA-256 | b4e62b2f700ce3815f78c1991849fbb9ad953a16a199be95b8d4740f1b5ad9a7
Netragard Security Advisory 2009-06-22
Posted Jun 23, 2009
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - The libxml library is prone to a heap-based buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary within the context of an application using the affected library. Failed exploit attempts will result in a denial-of-service vulnerability. Safari uses the vulnerable libxml library and can be attacked via the feed:// input vector. Versions below 3.2.3 are affected.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-3529
SHA-256 | 9012ec278979cbf1e8f349fe20406fb03ef5ed6f98fa19b6fa6209f214f162f3
GoGo Inflight Internet Interception
Posted May 7, 2009
Authored by Adriel T. Desautels | Site netragard.com

Netragard, L.L.C Advisory - The GoGo Inflight Internet service fails to encrypt wireless connections between users and the access point.

tags | advisory
SHA-256 | e15a68a398d9fbb9df850bb9e64eb1d67cbb71a7114d0a7fa4d220d64af99af9
Netragard Security Advisory 2007-08-20
Posted Feb 25, 2009
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - The Cambium Group Content Management System (CAMAS) Failed most Open Web Application Security Project ("OWASP") criterion during testing.

tags | advisory, web
SHA-256 | 6dc9216857c8b8a7de3efc27c3d5195a6260f1f1903675c0dbdb8d568555f4bb
Using Facebook To Pwn A Client
Posted Feb 13, 2009
Authored by Adriel T. Desautels | Site netragard.com

Netragard's account of using Facebook to earn the trust of a company's employees and turning the tables on them.

tags | paper
SHA-256 | 07fe17adad384be9b339492dc7d5434525fa2531f80cffe9d1b7b53cb9c1ae1a
Netragard Security Advisory 2007-06-28
Posted Jul 11, 2008
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Core Image Fun House versions 2.0 and below for OS X suffer from a buffer overflow vulnerability when a specially crafted .funhouse file is leveraged. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | apple, osx
SHA-256 | 6c6bce17e27550c78e31772953580b27edbf6c06eb465a112c51012482a46cac
Netragard Security Advisory 2007-03-13
Posted Nov 6, 2007
Authored by Kevin Finisterre, Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Netragard's SNOsoft Research Team discovered two critical vulnerabilities in the OpenBase SQL Relational Database that can lead to full system compromise. OpenBase versions 10.0.5 and below are affected.

tags | advisory, vulnerability
SHA-256 | 461394d46dce182dddd5cd5ac8284bec3acbe0ca019c1b7a15477e4a510c19e6
Netragard Security Advisory 2007-06-28
Posted Jul 7, 2007
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Maia Mailguard versions 1.0.2 and below suffers from file read and directory traversal vulnerabilities that allow for remote code execution. Details provided.

tags | exploit, remote, vulnerability, code execution
SHA-256 | d36bb22c015e1a08a2926bcf374d2972835a70bfa94c4a09681029459a05bf6f
Netragard Security Advisory 2007-03-16
Posted Mar 20, 2007
Authored by Kevin Finisterre, Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - An exploitable vulnerability exists in FrontBase that can be used to gain NT AUTHORITY\SYSTEM or root privileges on an affected system. FrontBase versions 4.2.7 and below are affected.

tags | advisory, root
SHA-256 | cd42c535ea4a9cbfa1eb848bf2b4eff416a1e0f36719dba4953b028de6dfb69e
apple-kext-tools-20060822.txt
Posted Sep 14, 2006
Authored by Adriel T. Desautels | Site netragard.com

Roxio Toast 7 Titanium on Mac OSX executes the kextload command with root privileges. The kextload command contains two vulnerabilities which can be exploited by a local user to gain local root access to the system. This advisory outlines both issues.

tags | advisory, local, root, vulnerability
systems | apple
SHA-256 | 4d9a1d1c4b802566deb492490350c56c3638f0b626e4adf257715a70770d86bb
ROXIO_RACE_NETRAGARD-20060624.txt
Posted Sep 13, 2006
Authored by Adriel T. Desautels | Site netragard.com

Deja Vu, which is bundled with Roxio Toast 7, creates ruby scripts in the /tmp directory. These scripts contain commands which are executed with escalated privileges. A race condition exists which makes it possible to execute arbitrary commands against the system or gain root level access.

tags | exploit, arbitrary, root, ruby
SHA-256 | dceb4c62c12876daaa9c13d289451d6a39385dd8a1b2de27fbeba98c759b1b3b
Netragard Security Advisory 2006-06-24
Posted Aug 27, 2006
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Roxio 7 Toast contains locally exploitable vulnerabilities due to insecure system() by calls by suid binaries which use the user's $PATH environment variable.

tags | exploit, vulnerability
SHA-256 | a9a41ad652cad025669286ea026676bda759c1424a925ade740e5e98f354c33a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close