exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files from cocoruder

Email addressfrankruder at hotmail.com
First Active2005-09-22
Last Active2008-10-11
cabrightstor-exec.txt
Posted Oct 11, 2008
Authored by cocoruder | Site ruder.cdut.net

CA BrightStor ARCServe BackUp is an overall data backup solution. The RPC interface of CA BrightStor ARCServe BackUp does not handle user's input exactly that allows anonymous attacker to inject any command, a remote code execution attack may achieved through this way. Details are provided. CA BrightStor ARCServe BackUp version R11.5 is affected.

tags | exploit, remote, code execution
advisories | CVE-2008-4397
SHA-256 | f8d09baffc323cebdb0ee128fa1a375f7483be296775677fead1555e2c71a4be
msm-remote.txt
Posted Aug 14, 2008
Authored by cocoruder | Site ruder.cdut.net

A remote illegal access vulnerability exists in Microsoft Windows Live Messenger. A vicious attacker can control the Live Messenger via constructing a malicious web page.

tags | advisory, remote, web
systems | windows
advisories | CVE-2008-0082
SHA-256 | e193b70a2907428a643a20891cf651e8fda5c7bc6903f72feb2aa3e7972221e4
realnetworks-activex.txt
Posted Jul 31, 2008
Authored by cocoruder | Site ruder.cdut.net

An illegal resource reference vulnerability exists in the ActiveX Control of RealNetworks RealPlayer versions 10.6 and below.

tags | advisory, activex
advisories | CVE-2008-3064
SHA-256 | 423bff66229af94c5f8a3315e4534ec11eb00ed6c35d612209ce516a07fe4709
akamai-downloadmanager.txt
Posted Jun 5, 2008
Authored by cocoruder | Site ruder.cdut.net

A parameter injection vulnerability exists in Akamai Download Manager. By exploiting this vulnerability, the remote attacker can make the users to download arbitrary file, and save it to arbitrary location while they are visiting a vicious web page. It means an attacker who successfully exploits this vulnerability can run arbitrary code on the affected system. Akamai Download Manager ActiveX control version 2.2.3.5 is affected.

tags | advisory, remote, web, arbitrary, activex
advisories | CVE-2008-1770
SHA-256 | 902f16a639acb0caf6e7858f4b2ecb43999eac24dfc531821022e19dc957cfc0
officepub-corrupt.txt
Posted May 15, 2008
Authored by cocoruder | Site ruder.cdut.net

A memory corruption vulnerability exists in Microsoft Office Publisher when it is parsing a PUB file. An attacker who successfully exploits this vulnerability can execute arbitrary code on the affected system.

tags | advisory, arbitrary
advisories | CVE-2008-0119
SHA-256 | 1dea31de8469b51947a7547a1b68e247e6bf90f70e87403dcaf46d41bdcac46a
adobe-print-v2.txt
Posted May 7, 2008
Authored by cocoruder | Site ruder.cdut.net

A design error vulnerability exists in Adobe Reader and Adobe Acrobat Professional. A remote attacker who successfully exploit this vulnerability can control the printer without user's permission. Affected software versions include Adobe Reader 8.1.1 and below and Adobe Acrobat Professional 8.1.1 and below. This is an updated advisory.

tags | advisory, remote
advisories | CVE-2008-0655
SHA-256 | 2cbd1fa58213bb05a1302dcd79477d4bf94dbb3a84581019cd11a86426875dff
aap-bypass.txt
Posted May 7, 2008
Authored by cocoruder | Site ruder.cdut.net

Two critical vulnerabilities exist in the javascript API of Adobe Acrobat Professional 7. A remote attacker who successfully exploits these vulnerabilities can execute restricted functions and arbitrary codes on the affected system. Adobe Acrobat Professional version 7.0.9 is affected.

tags | advisory, remote, arbitrary, javascript, vulnerability, bypass
advisories | CVE-2008-2042
SHA-256 | 2439aa2322600b477cca7a6d1e36624932b620e1d197bf4f3031537110a4ef00
adobe-print.txt
Posted Feb 8, 2008
Authored by cocoruder | Site ruder.cdut.net

A design error vulnerability exists in Adobe Reader and Adobe Acrobat Professional. A remote attacker who successfully exploit this vulnerability can control the printer without user's permission. Affected software versions include Adobe Reader 8.1.1 and below and Adobe Acrobat Professional 8.1.1 and below.

tags | advisory, remote
SHA-256 | 2e19644bffa577bd8701a1948a0501cf5426c7953565f785203c1835fdf9c479
CAID-brightstor.txt
Posted Dec 8, 2007
Authored by eEye Digital Security, Pedram Amini, cocoruder, Tenable Network Security, Dyon Balding, shirkdog | Site www3.ca.com

CA Security Advisory - Multiple vulnerabilities exist in BrightStor ARCserve Backup that can allow a remote attacker to cause a denial of service, execute arbitrary code, or take privileged action.

tags | advisory, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2007-5326, CVE-2007-5329, CVE-2007-5327, CVE-2007-5325, CVE-2007-5328, CVE-2007-5330, CVE-2007-5331, CVE-2007-5332
SHA-256 | eeb6c53417ccc26b912aa3b7ee71b7c4d770d635ec4f613ec8a5036d63014596
msjet-overflow.txt
Posted Nov 26, 2007
Authored by cocoruder | Site ruder.cdut.net

A remote code execute vulnerability exists in Microsoft Jet Engine. A remote attacker who successfully exploit this vulnerability can execute arbitrary code on the affected system.

tags | advisory, remote, overflow, arbitrary
SHA-256 | e7cf4a85bcd939e834d499ef01e0e78a9ddf18bbaa3e0157ef12c45a4ee602f0
cabright-overflow.txt
Posted Oct 12, 2007
Authored by cocoruder | Site ruder.cdut.net

A remote stack overflow vulnerability exist in the RPC interface of CA BrightStor ARCServe BackUp. An arbitrary anonymous attacker can execute arbitrary code on the affected system by exploiting this vulnerability.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2007-5327
SHA-256 | 239e57e4163b68e8237af400d6a05c05dcfeb8f43d3b3ed722f445a675062281
baidu-exec.txt
Posted Aug 8, 2007
Authored by cocoruder | Site ruder.cdut.net

The ActiveX control BaiduBar.dll in Baidu Soba suffers from a remote code execution vulnerability

tags | advisory, remote, code execution, activex
SHA-256 | 9d91ed039b728626957ad527f1076bc0acd0698b180e56c3a5ec4168d6456cc8
fortinet-mcafee.txt
Posted Mar 20, 2007
Authored by cocoruder | Site fortinet.com

Multiple remote buffer overflow vulnerabilities exist in the ActiveX Control named "SiteManager.Dll" of McAfee ePolicy Orchestrator. A remote attacker who successfully exploit these vulnerabilities can completely take control of the affected system. Affected software versions include McAfee ePolicy Orchestrator 3.6.1 and McAfee ePolicy Orchestrator 3.5 patch 6.

tags | advisory, remote, overflow, vulnerability, activex
SHA-256 | 4b174ebb4697c892ceb808c2a52b50e9578cce6ea4f3cca20ebcac7ec23fc274
exploit_alipay_vul.rar
Posted Feb 8, 2007
Authored by cocoruder | Site ruder.cdut.net

Demonstration exploit for a remote code execution vulnerability in Alipay's password input control "pta.dll".

tags | exploit, remote, code execution
SHA-256 | 8f3a0ae3fc3e5c1705315ff8dbc5dd8f8346ab8d35e84c9e90bdb2227a8ce770
alibaba-exec.txt
Posted Feb 8, 2007
Authored by cocoruder | Site ruder.cdut.net

A remote code execution vulnerability in Alipay's password input control "pta.dll" allows a remote attacker the ability to take complete control of the affected system.

tags | advisory, remote, code execution
SHA-256 | 53a11841b90cc60be21d85cb1e923255a3f54b83a76ff9ef3a462057f7747e9c
ms06070-2.c
Posted Nov 20, 2006
Authored by cocoruder, S A Stevens | Site ruder.cdut.net

Microsoft Windows Wkssvc NetrJoinDomain2 stack overflow exploit that works against the vulnerability described in MS06-070. Fixed by S A Stevens.

tags | exploit, overflow
systems | windows
SHA-256 | 62779cfe53ca1f084826667abf8b472343327f839ff012becfc0af25416c3f80
ms06070.c
Posted Nov 16, 2006
Authored by cocoruder | Site ruder.cdut.net

Microsoft Windows Wkssvc NetrJoinDomain2 stack overflow exploit that works against the vulnerability described in MS06-070.

tags | exploit, overflow
systems | windows
SHA-256 | 13641e3cc338d4d93cf646f8124f402f3a5400b71465e1773c54a6e526d6c0a1
ms06-035-coco.txt
Posted Jul 24, 2006
Authored by cocoruder | Site ruder.cdut.net

Microsoft SRV.SYS Mailslot Ring0 memory corruption denial of service exploit. Takes advantage of the vulnerability discussed in MS06-035.

tags | exploit, denial of service
SHA-256 | ef948b25077f0bacfddf3f7571a4d02fcea7abd9f1ee34de56e347327398f209
mswGRE.txt
Posted Jan 10, 2006
Authored by cocoruder | Site ruder.cdut.net

Microsoft Windows GRE is susceptible to multiple overrun vulnerabilities when rendering WMF files.

tags | advisory, overflow, vulnerability
systems | windows
SHA-256 | 99e7080b68914b9fcd47bd045150c25a09dec39ddec8ecb67a9f63234b4c6d47
driverStudio27.txt
Posted Sep 22, 2005
Authored by cocoruder | Site ruder.cdut.net

A design flaw in SoftICE Driver Suite version 2.7 allows for authentication bypass.

tags | advisory
SHA-256 | bbb2b29b8f7a2e08256dab7b3f070789b67e4bb444e1d4d920580511426b4b2e
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close