Exploit the possiblities
Showing 1 - 25 of 75 RSS Feed

Operating System: Mandrake

Bastille Unix 3.2.1
Posted Jan 29, 2012
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X.

Changes: Various updates.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
MD5 | f6fb6b207114f25e0f3b882a39859c8e
Samba Heap Overflow Exploit
Posted Jan 9, 2009
Authored by zuc

Samba versions below 3.0.20 heap overflow exploit. Written for older versions of Debian, Slackware, and Mandrake.

tags | exploit, overflow
systems | linux, slackware, debian, mandrake
MD5 | 043d719fc037091a570b1970f725c510
lesstif-advisory.pdf
Posted Aug 18, 2006
Authored by Karol Wiesek | Site karol.wiesek.pl

Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default.

tags | exploit, local, root
systems | linux, mandrake
MD5 | dab61de17ed00b1aceccf8b0697fe42e
Secunia Security Advisory 18489
Posted Jan 19, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, mandrake
MD5 | 57aec1b62257e40b2a22b20613e0fd8d
Bastille-3.0.7-1.0.noarch.rpm
Posted Aug 5, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
MD5 | 14f4a7dea74d78b2686a92e6735ab83b
Bastille-3.0.6-1.0.noarch.rpm
Posted Jul 9, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Bug fixes.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
MD5 | 20e286aa2f5556bbd208d811719e5f19
Bastille-3.0.4-1.0.noarch.rpm
Posted Jun 1, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Bug fixes.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
MD5 | dd83730efa3c5f128ea1835d59dd6d0b
Bastille-2.2.8-1.0.noarch.rpm
Posted Mar 26, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Bug fixes.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
MD5 | 44a8b783be5df3dd25be92e407b63f91
Bastille-2.2.5.tar.bz2
Posted Mar 22, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Substantial internal changes were made.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
MD5 | 95a6abb9df2e467622c18763d9a993b9
elog_unix_win.c
Posted Feb 23, 2005

ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat.

tags | exploit, remote, shell
systems | linux, redhat, windows, freebsd, slackware, debian, mandrake, xp, gentoo, fedora
MD5 | 5c049a4b66bdbcb76ddfbd9a81fce48c
Mandriva Linux Security Advisory 2005.029
Posted Feb 5, 2005
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts.

tags | advisory, arbitrary, vulnerability
systems | linux, mandrake
advisories | CVE-2005-0069
MD5 | 62e0ae0ffc91c2cf03ce450ab9928b29
trn-test.txt
Posted Jan 27, 2005
Authored by ZzagorR | Site rootbinbash.com

Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0.

tags | exploit, local, root
systems | linux, slackware, mandrake
MD5 | eccb9e46d859b8d7283889195634aa02
Bastille-2.1.7.tar.bz2
Posted Jan 25, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..

Changes: Added support for Fedora Core 3.
systems | linux, redhat, unix, suse, debian, hpux, mandrake
MD5 | c04e13b0fe49835d80fdbe3867b43cb6
Mandriva Linux Security Advisory 2004.148
Posted Dec 30, 2004
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack.

tags | advisory, denial of service, kernel, local, spoof
systems | linux, mandrake
MD5 | 23c59b4cdc33e5534a6dba437ed924ff
Mandriva Linux Security Advisory 2004.146
Posted Dec 12, 2004
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely.

tags | advisory, remote, denial of service, tcp
systems | linux, mandrake
MD5 | 1445dbbaf143b5a26f6504a02984c369
MDKSA-2004:140.txt
Posted Dec 11, 2004
Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application.

tags | advisory, arbitrary
systems | linux, mandrake
MD5 | d8e93f86af1b786f0bd3c3d4618007ff
Bastille-2.1.6.tar.bz2
Posted Nov 20, 2004
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..

Changes: Bug fixes and updates.
systems | linux, redhat, unix, suse, debian, hpux, mandrake
MD5 | 648bf1a68bf2c8af43ec69b1e6bcdc80
lsat-0.9.2.tgz
Posted Nov 4, 2004
Site usat.sourceforge.net

The Linux Security Auditing Tool (LSAT) is a post install security auditor for Linux/Unix. It checks many system configurations and local network settings on the system for common security/config errors and for packages that are not needed. It (for now) works under Linux (x86: Gentoo, RedHat, Debian, Mandrake; Sparc: SunOS (2.x), Redhat sparc, Mandrake Sparc; Apple OS X).

tags | x86, local
systems | linux, redhat, unix, solaris, debian, mandrake, apple, osx, gentoo
MD5 | 0435a69e54e0f18b1a425bfc2c3abb17
MDKSA-2004:113.txt
Posted Oct 27, 2004
Authored by Chris Evans | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Multiple integer overflow issues affecting xpdf-2.0 and xpdf-3.0. Also programs like cups which have embedded versions of xpdf. These can result in writing an arbitrary byte to an attacker controlled location which probably could lead to arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
systems | linux, mandrake
advisories | CVE-2004-0888, CVE-2004-0889
MD5 | dbbeceb18f4a83c657d4ce2e53f6f3b8
MDKSA-2004:109.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - affected versions of MDK: 10.0, 92, Corporate Server 2.1, Multi Network Firewall 8.2. Several vulnerabilities have been discovered in the libtiff package that could lead to arbitrary code execution.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, mandrake
advisories | CVE-2004-0803
MD5 | a6636c1f92368f3291c331749b2eca80
MDKSA-2004:108.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - cvs 10.0, 92, Corporate Server 2.1. A flaw in CVS versions prior to 1.1.17 in an undocumented switch to the CVS history command allows for determining directory structure and the existance of files on a target machine.

tags | advisory
systems | linux, mandrake
MD5 | 6f5d571b169f8a0e664ff4cf10c5e1ea
MDKSA-2004:107.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - A number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrake Linux 10.0: "Send page" heap overrun, javascript clipboard access, buffer overflow when displaying VCard, BMP integer overflow, javascript: link dragging, Malicious POP3 server III.

tags | advisory, overflow, javascript, vulnerability
systems | linux, mandrake
MD5 | 4d18d10aa28e7007ab193e70ee40fe35
MDKSA-2004:091.txt
Posted Sep 10, 2004
Authored by Max Vozeler | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The cdrecord program, which is suid root, fails to drop euid=0 when it exec()s a program specified by the user through the RSH environment variable. This can be abused by a local attacker to obtain root privileges.

tags | advisory, local, root
systems | linux, mandrake
advisories | CVE-2004-0806
MD5 | a0c2b7599e8ed69de4ad012b8376523a
rpf-1.2.1.tar.gz
Posted Jun 22, 2004
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.

Changes: Fedora support added.
systems | linux, redhat, mandrake
MD5 | 213d6ddbd2928c88009976aaabcff72e
MDKSA-2004:031.txt
Posted Apr 19, 2004
Authored by Steve Grubb | Site mandrakesecure.net

Mandrake Linux Security Update Advisory - Problems lie in the utempter program versions 10.0, 9.2, 9.1, Corporate Server 2.1, and Multi Network Firewall 8.2 that allow for arbitrary file overwrites and denial of service attacks.

tags | advisory, denial of service, arbitrary
systems | linux, mandrake
advisories | CVE-2004-0233
MD5 | 5cccf5c233164f75ee1005a187215e83
Page 1 of 3
Back123Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close