exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 75 RSS Feed

Operating System: Mandrake

Bastille Unix 3.2.1
Posted Jan 29, 2012
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X.

Changes: Various updates.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | f55bd88272c1d996167dc032f97acacaa8b515889994c3ba72683834f0fbe19e
Samba Heap Overflow Exploit
Posted Jan 9, 2009
Authored by zuc

Samba versions below 3.0.20 heap overflow exploit. Written for older versions of Debian, Slackware, and Mandrake.

tags | exploit, overflow
systems | linux, slackware, debian, mandrake
SHA-256 | 43b87d032641543dcbbc7602729efaa345048ff41a4495d0b750df770c23b850
lesstif-advisory.pdf
Posted Aug 18, 2006
Authored by Karol Wiesek | Site karol.wiesek.pl

Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default.

tags | exploit, local, root
systems | linux, mandrake
SHA-256 | 93c5c74660c45a18ce6ccea75249edf597881501453e35ba6adbd416614392f7
Secunia Security Advisory 18489
Posted Jan 19, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandrake has issued an update for hylafax. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, mandrake
SHA-256 | 6657d2342cef2d8b74bb4de444a7ca19bfb6ad886e7fa5f23520a8e6a58ea42a
Bastille-3.0.7-1.0.noarch.rpm
Posted Aug 5, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | 537fdf3fd3c6a695a889ad0ca835e99623a9d9fc16609067d679c7e183bc1c05
Bastille-3.0.6-1.0.noarch.rpm
Posted Jul 9, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Bug fixes.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | ee44a96a6f41636d5498f1221c9e27869cfa178c09a7b400e333060ccf83039e
Bastille-3.0.4-1.0.noarch.rpm
Posted Jun 1, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Bug fixes.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | bbd9955f30cf74997cae2d96220a2a2bc43d92f8264f4f08bef39d096cfc85d3
Bastille-2.2.8-1.0.noarch.rpm
Posted Mar 26, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Bug fixes.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | 91af27a0f4b60daaadc83e622e9e24685dddb3a546a59e4ea5e2177d5e1e6905
Bastille-2.2.5.tar.bz2
Posted Mar 22, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

Changes: Substantial internal changes were made.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | 5cc11e42d0aa3982a2e77237a98f2512101cda25e5199ba55c98a46cac5a74c6
elog_unix_win.c
Posted Feb 23, 2005

ELOG version 2.5.6 and below remote shell exploit. Includes targets for Slackware, Gentoo, FreeBSD, Mandrake, Fedora Core 1, Debian, Windows XP, and Redhat.

tags | exploit, remote, shell
systems | linux, redhat, windows, freebsd, slackware, debian, mandrake, gentoo, fedora
SHA-256 | 2f0be5f4ffcc4b64e7f89322b4934d525fd19649bcde7c18cf2b2398d88e016e
Mandriva Linux Security Advisory 2005.029
Posted Feb 5, 2005
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts.

tags | advisory, arbitrary, vulnerability
systems | linux, mandrake
advisories | CVE-2005-0069
SHA-256 | 7d9c2bfe6a4ee99a747572aa6fb968bad0aa4e7638fd1885eac13fa60c81fe34
trn-test.txt
Posted Jan 27, 2005
Authored by ZzagorR | Site rootbinbash.com

Local root exploit for /usr/bin/trn. Tested on Mandrake 9.2, Slackware 9.1.0/10.0.0.

tags | exploit, local, root
systems | linux, slackware, mandrake
SHA-256 | 01582be97fed45d219f9fdddda6cbadc367a0d5d9c76671520bd0222ed537e2d
Bastille-2.1.7.tar.bz2
Posted Jan 25, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..

Changes: Added support for Fedora Core 3.
systems | linux, redhat, unix, suse, debian, hpux, mandrake
SHA-256 | ebe4d9a3204ad599a3cdbe43f230345f48e5736d5746187f93756eac0728694c
Mandriva Linux Security Advisory 2004.148
Posted Dec 30, 2004
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Herbert Xu discovered that iproute can accept spoofed messages sent via the kernel netlink interface by other users on the local machine. This could lead to a local Denial of Service attack.

tags | advisory, denial of service, kernel, local, spoof
systems | linux, mandrake
SHA-256 | 0b77cae8ee0ff13e4f0c71207f40df5bb8a76c2bedd1527178bb64fdc86e1708
Mandriva Linux Security Advisory 2004.146
Posted Dec 12, 2004
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - SGI developers discovered a remote DoS (Denial of Service) condition in the NFS statd server. rpc.statd did not ignore the SIGPIPE signal which would cause it to shutdown if a misconfigured or malicious peer terminated the TCP connection prematurely.

tags | advisory, remote, denial of service, tcp
systems | linux, mandrake
SHA-256 | d6ee8ca8fd5762c70e690ea33f4421867002ac1714835bcf445645c863e83597
MDKSA-2004:140.txt
Posted Dec 11, 2004
Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application.

tags | advisory, arbitrary
systems | linux, mandrake
SHA-256 | afffec118e3c478b43f8bd4c296edd84d155a798b59d0a49364f43ef44813126
Bastille-2.1.6.tar.bz2
Posted Nov 20, 2004
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..

Changes: Bug fixes and updates.
systems | linux, redhat, unix, suse, debian, hpux, mandrake
SHA-256 | 18c3643d5abc13291c89be6422f9faeb0f6c33a58497aa372db196c07b342521
lsat-0.9.2.tgz
Posted Nov 4, 2004
Site usat.sourceforge.net

The Linux Security Auditing Tool (LSAT) is a post install security auditor for Linux/Unix. It checks many system configurations and local network settings on the system for common security/config errors and for packages that are not needed. It (for now) works under Linux (x86: Gentoo, RedHat, Debian, Mandrake; Sparc: SunOS (2.x), Redhat sparc, Mandrake Sparc; Apple OS X).

tags | x86, local
systems | linux, redhat, unix, solaris, debian, mandrake, apple, osx, gentoo
SHA-256 | d98472458f00e7705dcfa35d3f45c03eebb33499cca69efa670c661a188444a9
MDKSA-2004:113.txt
Posted Oct 27, 2004
Authored by Chris Evans | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Multiple integer overflow issues affecting xpdf-2.0 and xpdf-3.0. Also programs like cups which have embedded versions of xpdf. These can result in writing an arbitrary byte to an attacker controlled location which probably could lead to arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
systems | linux, mandrake
advisories | CVE-2004-0888, CVE-2004-0889
SHA-256 | 38339c35eb37ea1704d38fa5c8d7a983c7db524a7de177b38224327194a45663
MDKSA-2004:109.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - affected versions of MDK: 10.0, 92, Corporate Server 2.1, Multi Network Firewall 8.2. Several vulnerabilities have been discovered in the libtiff package that could lead to arbitrary code execution.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, mandrake
advisories | CVE-2004-0803
SHA-256 | 00b02fca7dc066d552fa40fbd64474173459db97df3ec38a658849d0dfbfb489
MDKSA-2004:108.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - cvs 10.0, 92, Corporate Server 2.1. A flaw in CVS versions prior to 1.1.17 in an undocumented switch to the CVS history command allows for determining directory structure and the existance of files on a target machine.

tags | advisory
systems | linux, mandrake
SHA-256 | e1cdaf1293a24e2672547e99ab63263760f1dbe553b2c16f4764702091f0a9a9
MDKSA-2004:107.txt
Posted Oct 20, 2004
Authored by Mandrake Linux Security Team | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - A number of vulnerabilities were fixed in mozilla 1.7.3, the following of which have been backported to mozilla packages for Mandrake Linux 10.0: "Send page" heap overrun, javascript clipboard access, buffer overflow when displaying VCard, BMP integer overflow, javascript: link dragging, Malicious POP3 server III.

tags | advisory, overflow, javascript, vulnerability
systems | linux, mandrake
SHA-256 | 9f5db01dbfd4b9ff3f74a73729cb6a0c9bf1c408d1dc95dad30d2132b2454615
MDKSA-2004:091.txt
Posted Sep 10, 2004
Authored by Max Vozeler | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The cdrecord program, which is suid root, fails to drop euid=0 when it exec()s a program specified by the user through the RSH environment variable. This can be abused by a local attacker to obtain root privileges.

tags | advisory, local, root
systems | linux, mandrake
advisories | CVE-2004-0806
SHA-256 | 6f38c8ce8d76f1228e8d3ca2e1b81434d0f2613330175e2b3a098eeec3ceb160
rpf-1.2.1.tar.gz
Posted Jun 22, 2004
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.

Changes: Fedora support added.
systems | linux, redhat, mandrake
SHA-256 | 1b21c1e4fe44c14c6699021a8dfb60258df84ba160eb73d9c370d35decd0d8d2
MDKSA-2004:031.txt
Posted Apr 19, 2004
Authored by Steve Grubb | Site mandrakesecure.net

Mandrake Linux Security Update Advisory - Problems lie in the utempter program versions 10.0, 9.2, 9.1, Corporate Server 2.1, and Multi Network Firewall 8.2 that allow for arbitrary file overwrites and denial of service attacks.

tags | advisory, denial of service, arbitrary
systems | linux, mandrake
advisories | CVE-2004-0233
SHA-256 | d955011e39cbff52026f4c77016b564f2c9d8f72b1a57bf1a841fbbace58a5a8
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close