exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

Sourcetree Remote Code Execution
Posted Jul 24, 2018
Authored by Etienne Stalmans, Terry Zhang | Site atlassian.com

Sourcetree suffers from multiple remote code execution vulnerabilities related to git submodules and argument injection. macOS versions 1.0b2 up to 2.7.6 and Windows versions 0.5.1.0 up to 2.6.10 are affected.

tags | advisory, remote, vulnerability, code execution
systems | windows
advisories | CVE-2018-11235, CVE-2018-13385, CVE-2018-13386
SHA-256 | cde4d25e68a273c6d5c20d3578cda77f6c048e35cf3936b680f4f3eaecbffdd7

Related Files

Apple Security Advisory 2016-12-13-1
Posted Dec 14, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-12-13-1 - macOS 10.12.2 is now available and addresses arbitrary code execution, denial of service, and various other vulnerabilities.

tags | advisory, denial of service, arbitrary, vulnerability, code execution
systems | apple
advisories | CVE-2016-1777, CVE-2016-1823, CVE-2016-4688, CVE-2016-4691, CVE-2016-4693, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-6303, CVE-2016-6304, CVE-2016-7141, CVE-2016-7167, CVE-2016-7411, CVE-2016-7412, CVE-2016-7413, CVE-2016-7414, CVE-2016-7416, CVE-2016-7417, CVE-2016-7418, CVE-2016-7588, CVE-2016-7591, CVE-2016-7594, CVE-2016-7595, CVE-2016-7596, CVE-2016-7600, CVE-2016-7602, CVE-2016-7603, CVE-2016-7604
SHA-256 | 68bf50743be919151d9547b2351d633298a9bfe57d7160fac7541f89315f5b98
Apple Security Advisory 2016-10-24-2
Posted Oct 24, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-10-24-2 - macOS Sierra 10.12.1 is now available and addresses code execution, privilege escalation, and various other vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2016-4635, CVE-2016-4660, CVE-2016-4661, CVE-2016-4662, CVE-2016-4663, CVE-2016-4667, CVE-2016-4669, CVE-2016-4671, CVE-2016-4673, CVE-2016-4674, CVE-2016-4675, CVE-2016-4678, CVE-2016-4679, CVE-2016-4682, CVE-2016-7579
SHA-256 | 329e7fab2964a6ead2b00b8b8ef210ce7b2d6f242311f20577681b8c43bcaa08
Apple macOS 10.12.1 / iOS 10 SecureTransport SSL Handshake MitM / DoS
Posted Oct 24, 2016
Authored by Maksymilian Arciemowicz

Apple macOS version 10.12.1 and iOS version 10 suffer from man-in-the-middle and denial of service issues with SecureTransport SSL handshakes.

tags | exploit, denial of service
systems | cisco, apple, ios
SHA-256 | dd040da5d731f7a4c679a12a2eae20eaa3b0971446f0a9d2625d0635e6c07f4f
Apple Security Advisory 2016-09-20-4
Posted Sep 20, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-09-20-4 - macOS Server 5.2 is now available and addresses traffic proxying and RC4 vulnerabilities.

tags | advisory, vulnerability
systems | apple
advisories | CVE-2016-4694, CVE-2016-4754
SHA-256 | 5b04ba2e45a915fdfa8a0e25e23b4e659c8ab903236abadfa9c4091a50f306fd
MacOS X 10.11 Hardlink Resource Exhaustion
Posted Oct 26, 2015
Authored by Maksymilian Arciemowicz

MacOS X 10.11 suffers from a hardlink bomb issue that causes resource exhaustion.

tags | exploit, denial of service
advisories | CVE-2010-0105, CVE-2013-6799, CVE-2014-4433, CVE-2014-4434
SHA-256 | 4058ea8977e433e0872ba59dabcc96a98e1a41577ee9392d7c6db485784a1396
MacOS X 10.11 FTS Buffer Overflow
Posted Oct 26, 2015
Authored by Maksymilian Arciemowicz

The MacOS X 10.11 FTS library suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2010-0105, CVE-2013-6799, CVE-2014-4433, CVE-2014-4434
SHA-256 | 6e8afd8414e594a1c22b90fded2505f57393097d961dbd2f8a8dcd3ab5996ea9
Adobe Shockwave Player .dir Memory Corruption
Posted May 10, 2012
Authored by Rodrigo Rubira Branco | Site dissect.pe

Adobe Shockwave Player suffers from multiple memory corruption vulnerabilities when parsing .dir media files. This file has three advisories pertaining to these issues. Versions affected include Shockwave Player version 11.6.3r633, Module IMLLib.framework on MacOS X 10.7.2 (11C74).

tags | advisory, vulnerability
advisories | CVE-2012-2029, CVE-2012-2030, CVE-2012-2031
SHA-256 | 68a2f9480c2bfe6e206c7c6cb220e52d87c7a6f1a454f30d7a1596ce26707535
libdvdcss 1.2.11
Posted Nov 16, 2011
Site videolan.org

libdvdcss is a cross-platform library for transparent DVD device access with on-the-fly CSS decryption. It currently runs under Linux, FreeBSD, NetBSD, OpenBSD, BSD/OS, Solaris, BeOS, Win95/Win98, Win2k/WinXP, MacOS X, HP-UX, QNX, and OS/2. It is used by libdvdread and most DVD players such as VLC because of its portability and because, unlike similar libraries, it does not require your DVD drive to be region locked.

Changes: This release improves RPC-II drive handling and contains a more robust keys retrieval mode. It also introduces fixes for MingW and OS/2 compilation, and has various bugfixes for small issues, memory leaks, crashes, and build issues.
tags | library
systems | linux, netbsd, windows, unix, solaris, freebsd, bsd, openbsd, hpux, beos, osx
SHA-256 | 4f2578b995a25f1d81ae2b3c6e4cc5b0a199581d4a0b3a2d67c48c3ed5db9199
Apple CoreGraphics Memory Corruption
Posted Aug 27, 2010
Authored by Rodrigo Rubira Branco

Apple Preview.app is the default application used in Apple MacOS systems in order to visualize PDF files and does not properly parse PDF files, which leads to memory corruption when opening a malformed file with an invalid size on JBIG2 structure at offset 0x2C1 as in PoC Repro1.pdf or offset 0x2C5 as in PoC Repro2.pdf (both values trigger the same vulnerability).

tags | advisory
systems | apple
advisories | CVE-2010-1801
SHA-256 | 53ce5615d54db8981ef51e6b34e7974571da0512912d9784b1b7d1be0444b0fd
iDEFENSE Security Advisory 2010-03-30.2
Posted Apr 1, 2010
Authored by iDefense Labs, regenrecht | Site idefense.com

iDefense Security Advisory 03.30.10 - Remote exploitation of a buffer overflow vulnerability in Oracle Corp.'s (formerly Sun Microsystems Inc.) Java Runtime Environment (JRE) could allow an attacker to execute arbitrary code with the privileges of the current user. The JRE is a platform that supports the execution of programs that are developed using the Java programming language. It is available for multiple platforms, including Windows, Linux and MacOS. The JRE platform also supports Java Applets, which can be loaded from Web pages. During the processing of an image file, user-controlled data is trusted and can result in an undersized allocation of a heap buffer. A copy operation into the heap buffer can lead to a heap overflow condition within the JRE. This condition may allow a remote attacker to subvert execution control and execute arbitrary code.

tags | advisory, java, remote, web, overflow, arbitrary
systems | linux, windows
SHA-256 | c8136fdeea2fd3eee123f117e7725124c2bbfe3eb2d36469fe6bc5b899969b0f
AppleFileServer LoginExt PathName Overflow
Posted Oct 28, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in the AppleFileServer service on MacOS X. This vulnerability was originally reported by Atstake and was actually one of the few useful advisories ever published by that company. You only have one chance to exploit this bug. This particular exploit uses a stack-based return address that will only work under optimal conditions.

tags | exploit, overflow
advisories | CVE-2004-0430
SHA-256 | d6bfb60bac8c1bd2da8a4cbf66db3c5ce0562ab709e98ce7361c7a2a4864ea31
Core Security Technologies Advisory 2008.0126
Posted May 22, 2008
Authored by Core Security Technologies, Rodrigo Carvalho | Site coresecurity.com

Core Security Technologies Advisory - Three vulnerabilities discovered in the iCal application may allow un-authenticated attackers to execute arbitrary code on vulnerable systems with (and potentially without) the assistance from the end user of the application and may cause a denial of service condition. iCal version 3.0.1 on MacOS X 10.5.1 (Leopard) is affected.

tags | exploit, denial of service, arbitrary, vulnerability
advisories | CVE-2008-1035, CVE-2008-2006, CVE-2008-2007
SHA-256 | 50d4793f2baf710c1c56d4c0a79886923259f972a87d94aa8b20feaedbd4b114
Core Security Technologies Advisory 2008.0123
Posted Mar 19, 2008
Authored by Core Security Technologies, Sebastian Muniz | Site coresecurity.com

Core Security Technologies Advisory - MacOS X Server 10.5, also known as Leopard Server, features a Wiki Server, which is a multiuser web application written in Python. The Wiki Server is vulnerable to a path traversal attack, which can be exploited by non-privileged system users via a forged file upload to write arbitrary files on locations in the server filesystem, restricted only by privileges of the Wiki Server application.

tags | exploit, web, arbitrary, python, file upload
advisories | CVE-2008-1000
SHA-256 | c67ec7aad2757e9458328c5a8740092dd9f2f141c751d7cdcaf51eb246f95da2
iDEFENSE Security Advisory 2007-03-23.1
Posted Mar 24, 2007
Authored by iDefense Labs, enhalos | Site idefense.com

iDefense Security Advisory 03.23.07 - Remote exploitation of a password bypass vulnerability in DataRescue Inc.'s IDA Pro Remote Debugger Server allows attackers to execute arbitrary code under the context of the user who is running the remote debugger server. iDefense has confirmed the existence of this vulnerability in the remote debugger server for Windows and Linux from IDA Pro versions 5.0 and 5.1. It is suspected that the MacOS X version and earlier versions are also affected.

tags | advisory, remote, arbitrary, bypass
systems | linux, windows, osx
SHA-256 | 42f604e14359b9b4a03f0fa1da10b72bf3727d2df3a4fba8fc808d996e1f5c64
MacOSXMach.txt
Posted Oct 4, 2006
Authored by Matasano Advisories | Site matasano.com

MacOS X uses Mach exception ports to support the CrashReporter "Application Quit Unexpectedly" dialog, Problem Report dialog, process debugging, and crash dumps logs. On vulnerable operating systems, attackers can exploit the inheritance of Mach exception ports to inject code into SUID processes, allowing nonprivileged users to assume root privileges.

tags | advisory, root
SHA-256 | dc66c3b51c7c773705b18a72b7dc45d7174745dd453351257fb8bce4ed678bf6
osx32bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

MacOSX/PowerPC 32 byte shellcode for sync(), reboot().

tags | shellcode
SHA-256 | 5351c8b944368ba099bd46cb47915aa7e0786ff4351bf5533f14b4df81c31cac
osx72bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

MacOSX/PowerPC 72 byte shellcode for execve /bin/sh.

tags | shellcode
SHA-256 | ac91044711def1684cd5a9b2453d14c329e8a338863ce7e44ec4589f10d91bde
iDEFENSE Security Advisory 2006-03-02.1
Posted Mar 3, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 03.02.06 - Remote exploitation of a directory traversal vulnerability in Apple Computer Inc.'s MacOS X could allow attackers to overwrite arbitrary files with user-supplied contents. iDefense has confirmed the existence of this vulnerability in MacOS X 10.4.2. Versions 10.4.5 and earlier of the 10.4.x family and versions 10.3.9 of the 10.3.x family of both Mac OS X and Mac OS X Server are vulnerable.

tags | advisory, remote, arbitrary
systems | apple, osx
advisories | CVE-2006-0391
SHA-256 | 0e2db5deee7d5d07925f64a63585b5049025178f056c53c1ef37efb72211ef76
iDEFENSE Security Advisory 2005-10-20.03
Posted Oct 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.20.05 - Local exploitation of a design error in the DiskMountNotify component of Symantec Corp.'s Norton Antivirus 9.0 for Macintosh may allow a user to gain elevated privileges. The vulnerability specifically exists in failing to specify an explicit PATH for the "/Library/Application Support/Norton Solutions Support/Norton AntiVirus/DiskMountNotify.app/Contents/MacOS/DiskMountNotify" binary.

tags | advisory, local
SHA-256 | ebecbb36ea10c4ab83e03fc878e06f2189ffdd7121fc3cc14da3f15fa860cb0a
clamavMac.txt
Posted Aug 14, 2005
Authored by Kevin Amorin, Timothy Morgan

A vulnerability was discovered in ClamAV during a code audit. This vulnerability could allow a local attacker on a MacOS system to elevate privileges to that of a user running a ClamAV process. This problem affects ClamAV versions 0.80rc4 through 0.84rc2, and is fixed in versions 0.84 and later.

tags | advisory, local
SHA-256 | 564b49d55e78da11d6825a8d653c8b71d3ec5587ec5359a008574997aa1a9cbb
mac_osx_java_jre_deserialization.txt
Posted Apr 17, 2005
Authored by Marc Schoenefeld | Site illegalaccess.org

MacOSX Java Runtime Environment Remote Denial of Service. Java SDK and JRE contain a flaw which crops up when objects are being de-serialized. This affects servers which are remotely getting data fed over RMI/IIOP, as well as "evil applet" attacks where a user can be persuaded to visit a site and attempt to load an applet.

tags | advisory, java, remote, denial of service
SHA-256 | 9240b9c36216337500ad4e6dfbbd857f177a6bbbc8ca8a2b74647cc9add4b812
ap-utils-1.5.tar.bz2
Posted Mar 15, 2005
Authored by roma | Site ap-utils.polesye.net

Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.

Changes: Documentation and translation updates. Various bug fixes and feature enhancements.
tags | tool, wireless
systems | linux, unix, freebsd, openbsd, aix, osx
SHA-256 | f01d068650f0f05c5b3753147ee0a5d3dfc07732c9788bb295683e66415a325d
arping-2.05.tar.gz
Posted Feb 10, 2005
Authored by Thomas Habets | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to, or to ping an ethernet address directly. Tested on Linux, {Free,Net,Open}BSD, MacOS X, and Solaris.

Changes: Quiet mode is now actually quiet.
tags | tool
systems | linux, unix, solaris, bsd, osx
SHA-256 | 552c1d34e49b540aa9044cbc376f041abe72c039c9d0006a1b16eb97a97d9996
ap-utils-1.4.1.tar.bz2
Posted Oct 27, 2004
Authored by roma | Site ap-utils.polesye.net

Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.

Changes: Decreased timeouts in SNMP engine. Updates to build on Solaris. Now works with SysV curseslib. Many bugfixes. Ukrainian and French translation updates.
tags | tool, wireless
systems | linux, unix, freebsd, openbsd, aix, osx
SHA-256 | 2fc07e0603d745f169b686ddb5101b31942dc6aa0a2f994f2685e5e249ef0f26
arping-2.04.tar.gz
Posted Sep 22, 2004
Authored by Thomas Habets | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to, or to ping an ethernet address directly. Tested on Linux, {Free,Net,Open}BSD, MacOS X, and Solaris.

Changes: Fixed a command line parsing bug. A -u switch showing the total number of MAC pings sent has been added. A libnet-not-inited bug has been repaired. It should now compile on Windows!
tags | tool
systems | linux, unix, solaris, bsd, osx
SHA-256 | 96aae379a6c9c3cd6ff2287d6ea2e96b2faaca6a2c93da847153f928f44173f4
Page 3 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close