Exploit the possiblities
Showing 1 - 17 of 17 RSS Feed

Files from Mark Wadham

Email addressmark.wadham at gmail.com
First Active2005-02-25
Last Active2017-12-07
Apple macOS 10.13.1 High Sierra Cron Privilege Escalation
Posted Dec 7, 2017
Authored by Mark Wadham

Apple macOS version 10.13.1 (High Sierra) suffers from a cron related local privilege escalation vulnerability that allows you to gain root privileges.

tags | exploit, local, root
systems | apple
MD5 | 9473afa208319a6ea6560b35916c5529
Hashicorp vagrant-vmware-fusion 5.0.0 Local Privilege Escalation
Posted Dec 6, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion version 5.0.0 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2017-15884
MD5 | 67c32f8adbb3c77173ea935bc333bec2
Proxifier For Mac 2.19 Local Privilege Escalation
Posted Dec 6, 2017
Authored by Mark Wadham

Proxifier for Mac version 2.19 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2017-7690
MD5 | d0c62a83cfc1993b3ac6b5c70fa0d116
Murus 1.4.11 Local Privilege Escalation
Posted Dec 6, 2017
Authored by Mark Wadham

Murus version 1.4.11 suffers from a local privilege escalation vulnerability.

tags | exploit, local
MD5 | d389d0f0661a3286a1adb58fb2b586f0
Hashicorp vagrant-vmware-fusion 5.0.3 Local Privilege Escalation
Posted Dec 6, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion version 5.0.3 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2017-16777
MD5 | 63d517b9db2db0473cf43010c6e7d629
Hashicorp vagrant-vmware-fusion 5.0.1 Local Privilege Escalation
Posted Dec 6, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion version 5.0.1 suffers from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2017-16001
MD5 | c82574786dcb632ff529eddda6528803
VirtualBox Man-In-The-Middle
Posted Dec 5, 2017
Authored by Mark Wadham

VirtualBox suffers from a remote code execution vulnerability due to downloading updates over HTTP.

tags | exploit, remote, web, code execution
MD5 | ec205f1c7d32d9c26e1cabb826548444
Arq Backup 5.9.7 Local Root Privilege Escalation
Posted Dec 5, 2017
Authored by Mark Wadham

Arq Backup versions 5.9.7 and below suffer from a local root privilege escalation vulnerability.

tags | exploit, local, root
advisories | CVE-2017-16895
MD5 | 6e034780e44ad140d984b98d2baff8d8
Arq Backup 5.9.6 Local Root Privilege Escalation
Posted Dec 4, 2017
Authored by Mark Wadham

Arq Backup versions 5.9.6 and below suffer from a local root privilege escalation vulnerability.

tags | exploit, local, root
advisories | CVE-2017-15357
MD5 | 2cf34b399d49d64d0321379e8239a52e
Sera 1.2 Local Root / Password Disclosure
Posted Nov 2, 2017
Authored by Mark Wadham

Sera version 1.2 suffers from a password disclosure that can allow for root privilege escalation.

tags | exploit, root
advisories | CVE-2017-15918
MD5 | 4625b7cb42f5e2f2c434c541fa4f6c89
Hashicorp vagrant-vmware-fusion 4.0.24 Local Root Privilege Escalation
Posted Oct 18, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion versions 4.0.24 and below suffer from a local privilege escalation vulnerability. This is the same issue that affected the last version but the vendor failed to properly address the issue.

tags | exploit, local
advisories | CVE-2017-12579
MD5 | 6c5c0f0f63ac31c446e807ee7d596117
Hashicorp vagrant-vmware-fusion 4.0.23 Local Root Privilege Escalation
Posted Aug 3, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion versions 4.0.23 and below suffer from a local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2017-11741
MD5 | 722af766c20d6b5f20bdb1b29bc26b37
Hashicorp vagrant-vmware-fusion 4.0.20 Privilege Escalation
Posted Jul 17, 2017
Authored by Mark Wadham

Hashicorp vagrant-vmware-fusion versions 4.0.20 and below suffer from a local root privilege escalation vulnerability.

tags | exploit, local, root
advisories | CVE-2017-7642
MD5 | fa75f3b5ac8d64b6fe452388903fb02d
Proxifier 2.19 Privilege Escalation / Code Execution
Posted Apr 12, 2017
Authored by Mark Wadham

Proxifier version 2.19 introduced a kext signature verification to the KLoader binary as a fix for CVE-2017-7643 but Proxifier.app performs no verification of the KLoader binary that gets executed as root.

tags | exploit, root
advisories | CVE-2017-7643
MD5 | 8283d1273a246d055aa147f0939a068d
Proxifier 2.18 Privilege Escalation / Code Execution
Posted Apr 11, 2017
Authored by Mark Wadham

Proxifier versions 2.18 and below ships with a KLoader binary which it installs suid root the first time Proxifier is run. This binary serves a single purpose which is to load and unload Proxifier's kernel extension. Unfortunately it does this by taking the first parameter passed to it on the commandline without any sanitisation and feeding it straight into system().

tags | exploit, kernel, root
advisories | CVE-2017-7643
MD5 | 6303ce293523ba76e75217030e88c039
usr-guard-1.0.bz2
Posted Feb 26, 2005
Authored by Mark Wadham

USR-Guard acts as a bridge between Snort and a US Robotics 9105 ADSL router. When a snort alert is generated, USR-Guard will connect into your US Robotics router and add rules to block the host. This block is then removed after a defined period of hours.

tags | tool, sniffer
MD5 | a1f9f8dc957029fb671a6cf48c1ae0e5
usr9105.bz2
Posted Feb 25, 2005
Authored by Mark Wadham

usr9105.c is a very simple interface to the US Robotics 9105 ADSL router's command shell (linux-based). The program lets you send commands directly to the router's telnet interface and capture the output (if any). Very useful for taking advantage of the very powerful iptables firewall that this router implements. Also allows you to run several commands at once specified in a config file. Tested on the 9105, may also work on the 9106 and others.

tags | shell
systems | linux, unix
MD5 | 78e32fd8783d9bc9ae45b6c96698376b
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close