Email address | private |
---|---|
First Active | 2003-09-13 |
Last Active | 2015-11-06 |
There exists a vulnerability within a function of Linux eCryptfs (Enterprise Cryptographic Filesystem), which when properly exploited can lead to compromise of the vulnerable system. This vulnerability was confirmed in the Linux kernel version 2.6.30.3. Linux kernel versions 2.6.19 and later have eCryptfs support and may be also affected.
0f6b82fb65eaf4098684c2a395ac109857a9ba2417bbdefbbffd6286eb1d03d7
ToolTalk suffers from a rpc.ttdbserverd _tt_internal_realpath related buffer overflow vulnerability. IBM AIX versions 5.1.0 through 6.1.3 appear affected.
444f71cdcf6793937036925f0f55f4904dc7eb7fd8ff621556e979d2148ce216
Whitepaper called Linux on Power/Cell BE Architecture Buffer Overflow Vulnerabilities.
6f0f5225518ea3a48a4c06600fde8fd3ac3600d92bcdf768072d926d39dc8060
This article discusses buffer overflow vulnerabilities in Linux kernel's Slab Allocator. All examples presented on this article were developed and executed on a x86 processor-based machine running Slackware Linux 10.2. Previous knowledge of buffer overflows is required.
de9f3af11d7e245892dedad5aacde5562b9c0a81ac458d179d52453f718c6faf
A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.
d25fcf7756089a75b6e419be8e5587a8b3471d72d2e0112c2cb38b7403c693ae
A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.
3c4966cd588618c8497a8e094806f48cc10932032077447528eef558dc204afc
A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.
7b909d52a2bd4314a9cab14b33be3cd40f0d773af5bd5df25329e968b8b0a1f4
There exists a vulnerability within an architecture dependent function of the Apple Mac OS X 10.4.x kernel, which when properly exploited can lead to local compromise of the vulnerable system. Proof of concept code included.
a2f42affdf7e92cfb45ee12031a066c7505e5f3fb2f05c870d00879bbf8cb294
There exists multiple vulnerabilities within functions of Firebird Relational Database, which when properly exploited can lead to remote compromise of the vulnerable system.
1c86a390506eff2926bd6e4aa1194c457840db61d3266849eacf36611c21d7d8
There exists multiple vulnerabilities within functions of Borland InterBase, which when properly exploited can lead to remote compromise of the vulnerable system.
4677f1e27489c5e2f6da840db8cc4baacfe3704811d7e3fa34b629b2925dd959
This Metasploit module exploits a stack overflow in Borland Interbase 2007 by sending a specially crafted create request.
3e86d3a39bb4d94d658211aedac9393c5ed438275012efe2be5e6a027d43a17a
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the szone_free() to overwrite the size() or free() pointer in initial_malloc_zones structure. OSX version.
41df3765c835402280aab01fc03d46c9b2c7b29c3dc978680897dd0fb25af88e
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Solaris version.
de2f7abb618670f26477578d2cf35a14414c6516b9a7f7271f2d1b1d3ca0ba65
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Linux version.
ecad9d88ed773b5eba7139281a534e16adc238b07ada385028643a4c54900d67
Microsoft Windows animated cursor stack overflow exploit with reverse shellcode.
1a4e222ee915a53deac41e525052a79fdeba491946f5b20afd80db953052b3e9
RISE-2006002: There exists a vulnerability within a architecture dependent function of the FreeBSD kernel (FreeBSD 5.2-RELEASE through FreeBSD 5.5-RELEASE), which when properly exploited can lead to local compromise of the vulnerable system. This vulnerability was fixed in FreeBSD 6.0-RELEASE, but production (legacy) releases 5.2 through 5.5 are still vulnerable.
94ae7ebd3c47291aab33892e9d461968249c807d5246b761a801423c4e3cd32e
Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for SCO UnixWare 7.1.3.
e767c4244c85d6574cfdd4eb3f5e611e1e55038f5361a51054cbbc92acb58183
Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for Solaris 8, 9, and 10 on the x86 architecture.
59b8701f86673823e6d2be4c038f685e96a1f7b835eed17860522d06c2383da1
Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for Solaris 8, 9, and 10 on the SPARC architecture.
6743da2899320f9c17b75434128525c671ea1118b660678fc056a9a0f8449a0b
There exists a vulnerability within a string manipulation function of the X11R6 (X11R6.4 and lower) X Window System library, which when properly exploited can lead to local compromise of the vulnerable system.
7911db7873cc4ace006bc5fcc5187ae6d8cd1f496a76dd9932cbcd786aa5bc69
MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.
5a32e0e43ec0a91696cd2732619706797117d91a12166e0b705430b2a2d691a5
A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86.
4ea425bd8e8add22af39fcb210a108dff108ad05535d97ce8c0b6f3b84699efc
Code that executes /bin/sh.
11e293324484a29a36787255c819b460d7830e2359d8331471dfd2121836cde0
Code that attempts to restore root privileges.
5003f212fcd49a9b5b28e29825d3e9d16357bd5435a2f33fd2e63e05acc535de
Network server code that creates a listening TCP socket on port 65535 and executes /bin/sh.
5c33126a97310122075e5c934031c3ed15df533b9d0ebfb96f8e77ddd038ce0f