Email address | private |
---|---|
First Active | 2003-09-13 |
Last Active | 2015-11-06 |
There exists a vulnerability within a function of Linux eCryptfs (Enterprise Cryptographic Filesystem), which when properly exploited can lead to compromise of the vulnerable system. This vulnerability was confirmed in the Linux kernel version 2.6.30.3. Linux kernel versions 2.6.19 and later have eCryptfs support and may be also affected.
64aafba24cc62576d7aa592e5f3f57b8
ToolTalk suffers from a rpc.ttdbserverd _tt_internal_realpath related buffer overflow vulnerability. IBM AIX versions 5.1.0 through 6.1.3 appear affected.
419e81bb2e4ca5dac3f2b938870caa9e
Whitepaper called Linux on Power/Cell BE Architecture Buffer Overflow Vulnerabilities.
21f4d600b502ac9a6ff01a502e440d66
This article discusses buffer overflow vulnerabilities in Linux kernel's Slab Allocator. All examples presented on this article were developed and executed on a x86 processor-based machine running Slackware Linux 10.2. Previous knowledge of buffer overflows is required.
43b5680bee813109f98fd58f1f611cfe
A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.
4083bae1e65229922048b72f023ca139
A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.
21d668df5ccda18111116a361c67de33
A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.
7acca0d1774b5bc17f886e2fbed28efb
There exists a vulnerability within an architecture dependent function of the Apple Mac OS X 10.4.x kernel, which when properly exploited can lead to local compromise of the vulnerable system. Proof of concept code included.
f7cb9a678cad1e52e9b8323a667b2f32
There exists multiple vulnerabilities within functions of Firebird Relational Database, which when properly exploited can lead to remote compromise of the vulnerable system.
753f638ff1f38bd6f940a2b2e36a9a86
There exists multiple vulnerabilities within functions of Borland InterBase, which when properly exploited can lead to remote compromise of the vulnerable system.
85a799f75c832790b0ad9494e597ebd7
This Metasploit module exploits a stack overflow in Borland Interbase 2007 by sending a specially crafted create request.
3ef34ee4eb779dc56090ec465f15b7e8
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the szone_free() to overwrite the size() or free() pointer in initial_malloc_zones structure. OSX version.
1489b440c6e816a74e273d76060e724f
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Solaris version.
9f07c9cd8fd013c9608f103024c1c839
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Linux version.
4f3d9021ab7aeab8ee51f9ee5605ad0c
Microsoft Windows animated cursor stack overflow exploit with reverse shellcode.
6052eb221c6b2c346813e542f18279ae
RISE-2006002: There exists a vulnerability within a architecture dependent function of the FreeBSD kernel (FreeBSD 5.2-RELEASE through FreeBSD 5.5-RELEASE), which when properly exploited can lead to local compromise of the vulnerable system. This vulnerability was fixed in FreeBSD 6.0-RELEASE, but production (legacy) releases 5.2 through 5.5 are still vulnerable.
f2780f72b89096adff1c6779d3cc1a1f
Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for SCO UnixWare 7.1.3.
97f83a40b64fafcd498739b46be1edb6
Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for Solaris 8, 9, and 10 on the x86 architecture.
5e33870c66dee8090b827d1e90fca1de
Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for Solaris 8, 9, and 10 on the SPARC architecture.
d519d3c2e1c4a250425f76b723ca6a87
There exists a vulnerability within a string manipulation function of the X11R6 (X11R6.4 and lower) X Window System library, which when properly exploited can lead to local compromise of the vulnerable system.
95101d42b595fa4ece656cd209c5f556
MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.
fb00af86ece2ed6422cdbc89c50c5b4c
A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86.
fc13f3ccec0ad1229966cbedb1d54ea5
Code that executes /bin/sh.
09ca8554189e398cd233066a12895d8c
Code that attempts to restore root privileges.
ef537511fd224aa6b8ecc0d1d33c335c
Network server code that creates a listening TCP socket on port 65535 and executes /bin/sh.
e48352b79c2f4c657379c300f2eb79c0