GNS3 Mac OS-X version 1.5.2 ubridge privilege escalation exploit.
dec70585733d3d532b738a209e7812a3
GNS3 version 1.2.3 suffers from a dll hijacking vulnerability.
4a4f601198814a9c67a2d5154912731e
Cisco Security Advisory - Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains multiple denial of service vulnerabilities. Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services processors (ESP) card or the route processor (RP) card, causing an interruption of services. Repeated exploitation could result in a sustained DoS condition. Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.
4f7333e0afe6e43335d3ba0b5ede94fd
This is a 64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion and below. It uses a combination of syscall hooking and DKOM to hide activity on a host. String resolution of symbols no longer works on Mountain Lion as symtab is destroyed during load, this code is portable on all Lion and below but requires re-working for hooking under Mountain Lion.
4e8726f077ff7d1b0a761ab15d4d8bc9
Apple Mac OS-X xnu versions 1228.x and below local kernel denial of service proof of concept exploit.
32a3b37cd61fdc81e7765932563e5e5a
Apple Mac OS-X xnu versions 1228.3.13 and below local kernel memory leak and denial of service proof of concept exploit.
76a1151e694e59e105f76dbecbf81cc7
Apple Mac OS-X xnu versions 1228.3.13 and below local kernel memory leak and denial of service proof of concept exploit.
9d9cd6391d4bfe49cced31cf1f385ad5
Apple Mac OS-X xnu versions 1228.3.13 and below appletalk zip-notify remote kernel overflow proof of concept exploit.
126486d4a0e79d4cd4412641bbcf219a
Apple Mac OS-X with xnu versions 1228.x and below local kernel root exploit.
67933e09877d455565f250b50d6ee252
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.
6b188cd60df6eca5409694fa40859f0d
VERITAS Netbackup remote format string exploit for Mac OS-X.
a99cc0cea55e300e8b4870f2a1456aa5
New Macintosh OS-X rootkit that is roughly based off of adore. It hides itself from kextstat, netstat, utmp and wtmp. Further revisions to include a reverse shell triggered by ARP and DNS packets.
57d1312f1e101f52b9b08e4d557a2f99
MAC OS-X rootkit that has a lot of standard tools included, adds a TCP backdoor via inetd, does data recon, and more.
4d88ce2a44718703f5de06a26c26349a
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.
d1ff19c607b8cfe237d2a15bcbfe05b1
The admin service on Mac OS-X, which runs on port 660, has a buffer overflow vulnerability.
6e0b20cea6a04031757e096e76b4fb42
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.
f2339dc65f778912bb9ecb0b8f3fc237