what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 133 RSS Feed

Files from Larry W. Cashdollar

Real NameLarry W. Cashdollar
Email addressprivate
Websitevapid.dhs.org
First Active1999-11-14
Last Active2020-07-15
View User Profile
Ruby Gem kelredd-pruview 0.3.8 Command Injection
Posted Apr 12, 2013
Authored by Larry W. Cashdollar

Ruby Gem kelredd-pruview version 0.3.8 suffers from a remote command injection vulnerability.

tags | exploit, remote, ruby
SHA-256 | dd1b24534bc513df316ed360fb139f228b8988566fe55fe24f004ec934cc9308
Ruby Gem Karteek Docsplit 0.5.4 Command Injection
Posted Apr 10, 2013
Authored by Larry W. Cashdollar

Ruby Gem Karteek Docsplit version 0.5.4 fails to sanitize user-supplied input. If a user is tricked into extracting a file with shell characters in the name, code can be executed remotely.

tags | exploit, shell, ruby
advisories | CVE-2013-1933
SHA-256 | b21afb51938c4e491625c88dec36626c10a2f58c611fc3dcdcfd45693ccba644
Ruby Gem ldoce 0.0.2 Command Execution
Posted Apr 1, 2013
Authored by Larry W. Cashdollar

Ruby Gem ldoce version 0.0.2 suffers from a command execution vulnerability.

tags | exploit, ruby
SHA-256 | e0a0c481b47cda56119e30048f9a0ff4309520aaeab8de2c5a98a5ae1b099cd8
Ruby Thumbshooter Gem 0.1.5 Remote Command Execution
Posted Mar 27, 2013
Authored by Larry W. Cashdollar

Ruby Thumbshooter Gem version 0.1.5 suffers from a remote command execution vulnerability due to passing unsanitized user-supplied data to the shell.

tags | exploit, remote, shell, ruby
SHA-256 | 0652702d6e2f7b3bc1f88941a17af3a1b29f12b8f34ed087c62a57ec0db99e81
Ruby Gem Fastreader 1.0.8 Code Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Fastreader version 1.0.8 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
SHA-256 | 89b87fccb71d43cbfd06695564eb38fc2b65d8c3efba57236545d8452c11b607
Ruby Gem Command Wrap Command Execution
Posted Mar 18, 2013
Authored by Larry W. Cashdollar

Ruby Gem Command Wrap suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
SHA-256 | 28a0b4a6c633d5625d572416f7ec1b3eca1a2045358cc07c0078fd6cd2d57065
Ruby Gem Curl Command Execution
Posted Mar 13, 2013
Authored by Larry W. Cashdollar

Ruby Gem Curl suffers from a remote command execution vulnerability due to a lack of user input sanitization.

tags | exploit, remote, ruby
SHA-256 | c96fc864359b4f3b2f30998551d780075c8307fbf1c24791422f696b650146ef
Ruby Gem Minimagic Command Execution
Posted Mar 13, 2013
Authored by Larry W. Cashdollar

Ruby Gem MiniMagic suffers from a remote command execution vulnerability due to a lack of user input sanitization.

tags | exploit, remote, code execution, ruby
SHA-256 | f3b4827a94b047303ccc02b88c3f74c2860bb4df87e899281dfb759760495123
Ruby Gem Fastreader 1.0.8 Command Execution
Posted Mar 13, 2013
Authored by Larry W. Cashdollar

Ruby Gem Fastreader version 1.0.8 suffers from a remote command execution vulnerability due to a lack of user input sanitization.

tags | exploit, remote, code execution, ruby
SHA-256 | 1fab775f0aafbbbde6c3e31e5072977d382d54542fa209d3fc109a74349d293a
OpenFabrics ibutils 1.5.7 /tmp File Clobber
Posted Mar 7, 2013
Authored by Larry W. Cashdollar

The infiniband diagnostic utility handles files in /tmp insecurely. A malicious user can clobber root owned files with common symlink attacks. penFabrics ibutils version 1.5.7 is affected.

tags | exploit, root
SHA-256 | addeecc6e8b571ebf6c2a2c55fcbfb3fc70a6a2ae9876a01939f8d30d7439c9e
Raspberry Pi rpi-update Local Root
Posted Mar 5, 2013
Authored by Larry W. Cashdollar

Raspberry Pi rpi-update local root exploit.

tags | exploit, local, root
SHA-256 | eb425fb5dff9ccde638741a61ae7293c083ce15b1bae70498443b5f2d1266c53
Flash Tool 0.6.0 Remote Code Execution
Posted Mar 4, 2013
Authored by Larry W. Cashdollar

Ruby Gem Flash Tool version 0.6.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution, ruby
SHA-256 | eabb60c3855ec8b85847261cb4d2c326b3edd6845b673b873d28fd6cd3d5fc58
Ruby Gem ftpd-0.2.1 Remote Command Execution
Posted Mar 2, 2013
Authored by Larry W. Cashdollar

Ruby Gem ftpd-0.2.1 suffers from a remote command execution.

tags | exploit, remote, ruby
SHA-256 | 969e78acf08090cf414fa12176d6525e5d7810d5d1274f1ffbdbae4ced15669d
Oracle Auto Service Request File Clobber
Posted Mar 1, 2013
Authored by Larry W. Cashdollar

Oracle Auto Service Request insecure creates files in /tmp using time stamps allow for root-owned files to be clobbered.

tags | exploit, root
SHA-256 | 62958024223f7ff7956367f2a7735ad90e0b9970a5455344602162eceb1fc1e4
Fileutils Ruby Gem Remote Command Execution
Posted Feb 28, 2013
Authored by Larry W. Cashdollar

The Fileutils Ruby gem suffers from possible remote command execution due to a lack of passing unsanitized user input to CutyCapt for execution. It also suffers from insecure file handling in /tmp.

tags | exploit, remote, ruby
SHA-256 | 9effb3c69c98b3176ca1adde2524ed4a2a4b6bee7a62e010054f819e6d60b521
Gambas /tmp Directory Hijack
Posted Feb 27, 2013
Authored by Larry W. Cashdollar

Gambas creates a directory in /tmp called gambas.UID where UID is the user id of the person running the software. Gambas does not check to see if a malicious user has already created that directory.

tags | exploit
SHA-256 | 265512fa79bfac648de386e18f99ee937d26851f9df7995309f00539ecbf6106
Oracle Auto Service Request File Clobber
Posted Feb 5, 2013
Authored by Larry W. Cashdollar

Oracle Auto Service Request creates files insecurely in /tmp using time stamps instead of mkstemp(). Due to this, it is possible to clobber root owned files and possibly cause a denial of service condition or worse.

tags | exploit, denial of service, root
systems | solaris
SHA-256 | 3201569e185a30abb901fe01ff0684a58d22ab75b3d2eb41883373ead659d4e8
Oracle Automated Service Manager 1.3 Local Root
Posted Feb 1, 2013
Authored by Larry W. Cashdollar

Oracle Automated Service Manager version 1.3 suffers from a local root privilege escalation vulnerability during install.

tags | exploit, local, root
SHA-256 | 541a2508bc332207de3f68c469abd43870d40347d9628cf361e59c570beb5ac0
Centrify Deployment Manager 2.1.0.283 Local Root
Posted Dec 18, 2012
Authored by Larry W. Cashdollar

Centrify Deployment Manager version 2.1.0.283 local root exploit that leverages a race condition in /tmp.

tags | exploit, local, root
advisories | CVE-2012-6348
SHA-256 | 38f44fe5235206c1815107ebecea1649a3da90ccbf7baa70c756abbb16cd7901
Centrify Deployment Manager 2.1.0.283 Local Root
Posted Dec 8, 2012
Authored by Larry W. Cashdollar

Centrify Deployment Manager version 2.1.0.283 suffers from a race condition in /tmp that allows for local root privilege escalation.

tags | exploit, local, root
SHA-256 | 7571d7bb4780c1d99a2465c7ff79b8660346fa719c99eca6d189b83896c08490
Oracle Exadata Leaf Switch Weak Logins
Posted Nov 29, 2012
Authored by Larry W. Cashdollar

Oracle Exadata leaf switches come configured with easily guessable passwords and a shadow file that is world-readable.

tags | exploit
SHA-256 | 4656654c3f194537f44fd57130e17703524ad55c4635083060dae1b01824ac10
YingZhi Python 1.9 Arbitrary Traversal / Write
Posted Sep 26, 2012
Authored by Larry W. Cashdollar

YingZhi Python version 1.9 application for iOS allows for arbitrary file uploads to the root WWW directory and also has a ftp server directory traversal vulnerability that forces no authentication.

tags | exploit, arbitrary, root, python, file inclusion, file upload
systems | apple
SHA-256 | dd481a7d02e448e69e88b80af5a9bce38fe30a0e912040a9b5f2d81914099c34
Solaris 10 Patch Cluster Symlink Attack
Posted Aug 9, 2012
Authored by Larry W. Cashdollar

The Solaris 10 137097-01 patch suffers from a symlink attack that will let a user clobber a root owned file.

tags | exploit, root
systems | solaris
SHA-256 | 13b5efe587e83e9d28fceb6ebe9f80bdd07ca9622ef7767e9ebb53b9c4b62f13
RaspberryPi Image Occidentalis 0.1 Default Credentials
Posted Aug 4, 2012
Authored by Larry W. Cashdollar

The RaspberryPi Occidentalis version 0.1 image spawns sshd by default without prompting users to change their credentials, leaving their systems accessible via root/root default credentials.

tags | exploit, root, info disclosure
SHA-256 | 656c7ec055e2f82105589240af2b020366360c6deae390094ae0d32f88f6c389
SUNWbindr Race Condition
Posted Jul 20, 2012
Authored by Larry W. Cashdollar

There is a race condition with the postinstall script for SUNWbindr that if update manager is being used or smpatch while the system is in multi user mode could lead to arbitrary code execution as root.

tags | exploit, arbitrary, root, code execution
SHA-256 | 55f4f7844ec8ab139f894424203bf63b094b9b91024568ca0627ba66f4950a41
Page 4 of 6
Back23456Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close