what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Linux TIOCSPGRP Broken Locking
Posted Dec 22, 2020
Authored by Jann Horn, Google Security Research

Linux suffers from broken locking in TIOCSPGRP that can lead to a corrupted refcount.

tags | exploit
systems | linux
advisories | CVE-2020-29661
SHA-256 | 3d16d56ff43c2ab3355f19116f22e1a94fc89347899d1d2c15556ab0e4b4191b

Related Files

Flash Use-After-Free In Display List Handling Round 2
Posted Aug 20, 2015
Authored by Google Security Research, external

Three use-after-free proof of concept exploits for Flash.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2015-3124
SHA-256 | 2e4eefce9ede8e949e02bc78fdf89f165e66883de32412b8f8591292e5d9a762
Flash AS2 Use After Free While Setting TextField.filters
Posted Aug 20, 2015
Authored by Google Security Research, external

A use-after-free bug exists while setting the TextFilter.filters array.

tags | exploit
systems | linux
advisories | CVE-2015-3118
SHA-256 | 31a6c05930a52b35dcd3d8092a6d0a8288bfbf9225bc353369358d98b9ab95b8
Adobe Flash Use-After-Free In Scale9Grid
Posted Aug 20, 2015
Authored by Google Security Research, natashenka

There is a use-after-free issue if the scale9Grid setting is called on an object with a member that then frees display item. This issue occurs for both MovieClips and Buttons, it needs to be fixed in both classes.

tags | exploit
systems | linux
SHA-256 | 80b4a9baafb714f2dd9d49514a0fc66cae5b4722cb091640d14ef74e3e9fafcc
Flash Out-Of-Bounds Read In UTF Conversion
Posted Aug 20, 2015
Authored by Google Security Research, hawkes

This is a OOB read vulnerability when processing the SCRIPTDATASTRING object in Flv file.

tags | exploit
systems | linux
advisories | CVE-2015-3134
SHA-256 | b7ac22badf51c7c646164605a8e31a6bc88e7bf96892a72cbd86c59704b16c46
Windows Kernel ATMFD.DLL Invalid Memory Access Due To Malformed CFF Table (ATMFD+0x3440b / ATMFD+0x3440e)
Posted Aug 19, 2015
Authored by Google Security Research, mjurczyk

Researchers have encountered a number of Windows kernel crashes in the ATMFD.DLL OpenType driver while processing corrupted OTF font files.

tags | exploit, kernel
systems | linux, windows
advisories | CVE-2015-2460
SHA-256 | f3c9bc75807a1970026b1a04826e0374c827b906a3593467dfd94e746404d46e
Windows Kernel ATMFD.DLL Write To Uninitialized Address Due To Malformed CFF Table
Posted Aug 19, 2015
Authored by Google Security Research, mjurczyk

Researchers have encountered a number of Windows kernel crashes in the ATMFD.DLL OpenType driver while processing corrupted OTF font files.

tags | exploit, kernel
systems | linux, windows
advisories | CVE-2015-2432
SHA-256 | 6e52ae3b34903df13fac42f16c8c4249f5713a3b28e9e618f11bd01a076bfda5
Adobe Flash XML.childNodes Use-After-Free
Posted Aug 19, 2015
Authored by Google Security Research, natashenka

If a watch is set on the childNodes object of an XML object, and then the XML object is manipulated in a way that causes its child nodes to be enumerated, the watch will trigger. If the function in the watch deletes all the child nodes, the buffer containing the nodes will be deleted, even though the original function will still access it when it unwinds. This can lead to a childnodes array in ActionScript containing pointers that can be specified by an attacker.

tags | exploit
systems | linux
advisories | CVE-2015-5540
SHA-256 | 1295da6dedc93d6a1fe5a27a6f5a706c9506fa2c29602370bf75f3ab7f7f7165
Windows Kernel ATMFD.DLL Out-Of-Bounds Read Due To Malformed Name INDEX In The CFF Table
Posted Aug 19, 2015
Authored by Google Security Research, mjurczyk

Researchers have encountered a number of Windows kernel crashes in the ATMFD.DLL OpenType driver while processing corrupted OTF font files.

tags | exploit, kernel
systems | linux, windows
advisories | CVE-2015-2461
SHA-256 | 6a8eb9549bb642753717c8d5defcb82e1195517e9f35e5373e1e62cfe755b503
Adobe Flash Use-After-Free In AttachMovie
Posted Aug 19, 2015
Authored by Google Security Research, natashenka

There is a use-after-free in attachMovie due to the initObject. If the initObject contains an object that calls a method that deletes the movie clip that is being attached, a use-after-free occurs.

tags | exploit
systems | linux
advisories | CVE-2015-5551
SHA-256 | 90bd26fa45bf4967bccd506cc65201e1553ca1b0810ffe60271cde208371b15b
Windows Kernel ATMFD.DLL Invalid Memory Access Due To Malformed CFF Table
Posted Aug 19, 2015
Authored by Google Security Research, mjurczyk

Researchers have encountered a Windows kernel crash in the ATMFD.DLL OpenType driver while processing a corrupted OTF font file.

tags | exploit, kernel
systems | linux, windows
advisories | CVE-2015-2459
SHA-256 | 86ad060ed6b0b92f73638bde724be9999e6d4cd36658f6ce0e727753ba8c5617
Adobe Flash Use-After-Free Pointer Storage
Posted Aug 19, 2015
Authored by Google Security Research, natashenka

There are use-after-frees related to storing a single pointer (this this pointer) in several MovieClip drawing methods, including beginFill, beginBitmapFill, beginGradientFill, linGradientStyle, lineTo, moveTo, curveTo and lineStyle.

tags | exploit
systems | linux
advisories | CVE-2015-3137
SHA-256 | eb82146aef2be66c90cc556f2ab77a11428236e2b722274ee758243d8ec6b0e3
Snare For Linux Cross Site Request Forgery
Posted Dec 10, 2012
Authored by Andrew Brooks

Snare for Linux suffers from a cross site request forgery vulnerability due to a poor implementation of the ChToken. All versions prior to 1.7.0 are vulnerable.

tags | advisory, csrf
systems | linux
advisories | CVE-2011-5250
SHA-256 | 3323c57eabe51f974cc3c72af83508f476be9dbb70cbfeaeac57694f5e5a56fd
Snare For Linux Cross Site Scripting
Posted Dec 10, 2012
Authored by Andrew Brooks

Snare for Linux suffers from a cross site scripting vulnerability via log injection. All versions prior to 1.7.0 are vulnerable.

tags | exploit, xss
systems | linux
advisories | CVE-2011-5249
SHA-256 | d22ada759dcbc1d17dafab44a19f943b1bb0c438c37fb13503433ad75f387109
Oracle MySQL 5.5.19-log Denial Of Service
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL version 5.5.19-log on SuSE Linux suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | linux, suse
advisories | CVE-2012-5614
SHA-256 | e7b152542270e8ccb148f030520930976460470f663a3f3d19c5f09cba1871f5
Oracle MySQL Privilege Escalation
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a vulnerability that allows an attacker to add a new admin user.

tags | exploit
systems | linux
advisories | CVE-2012-5613
SHA-256 | d1601135651994faddfc10c91567f145058d6d888036e2073e79b83518277a4f
Oracle MySQL Heap Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a heap overrun vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2012-5612
SHA-256 | aa61b4faa2cc9c52276bbcea35e5861199148c06c5182c06981f429b55af2c0e
Testtrack For Linux Race Condition
Posted Mar 20, 2012

Testtrack for Linux suffers from a race condition vulnerability.

tags | exploit
systems | linux
advisories | CVE-2012-1201
SHA-256 | 1b0a4efddfcaa65693a50f03013569f7dd053cb2ecc75960d866efe4c465d32c
Mathematica Symlink Attack
Posted May 15, 2010
Authored by Paul Szabo

Mathematic7 on Linux suffers from a symlink attack vulnerability. Update for 2011-01-03 - Version 8 is also vulnerable.

tags | exploit
systems | linux
SHA-256 | ba1b34538e2340ce2f349c4b509a6cfecb9b3b2d190542148c53cc3ed5b20b2c
Debian GNU/Linux XTERM DECRQSS Weakness
Posted Jan 7, 2009
Authored by Rembrandt

Debian GNU/Linux suffers from a XTERM DECRQSS weakness that allows for remote code execution as the user id viewing the content.

tags | exploit, remote, code execution
systems | linux, debian
SHA-256 | 2cf126cfa15a92ef06cfb3ec5e1789cbdc1db4514c80b724ea3ff5178539d03d
GS1.0.0.40OfficialRelease.rar
Posted Feb 23, 2008
Authored by cDc | Site goolag.org

Goolag Scanner version 1.0. This tool has been released by the Cult of the Dead Cow to automate Google hacking using 1,500 predefined search queries.

tags | tool, scanner
systems | unix
SHA-256 | 052f30701a3f98d4097362ef486c4e09cecdf65778832bd34781b2d744896d38
GS07-02.txt
Posted Oct 25, 2007
Authored by Fatih Ozavci, Caglar Cakici | Site gamasec.net

The RSA KEON Registration Authority Web Interface suffers from multiple cross site scripting vulnerabilities. Version 1.0 is susceptible.

tags | advisory, web, vulnerability, xss
SHA-256 | 26c310be669771da1384f9cf1a2df0bcb062948b01a68a3476d898341ac35511
SurgeFTP_23a1_xss_06_062.txt
Posted Jul 11, 2007
Authored by Nico Leidecker | Site portcullis-security.com

SurgeFTP version 2.3a1 Linux suffers from a cross site scripting vulnerability.

tags | advisory, xss
systems | linux
SHA-256 | eef9a98052e8bafe92d55157a4fa35e226ac63cbe789ec403cfc1bb8b0d1221e
SurgeFTP_23a1_dos_06_061.txt
Posted Jul 11, 2007
Authored by Nico Leidecker | Site portcullis-security.com

SurgeFTP version 2.3a1 Linux suffers from a denial of service condition in its mirror mechanism.

tags | advisory, denial of service
systems | linux
SHA-256 | c2e32fdacdb65dce7021a2557bc1a2223d451dd4eeac4d1916119a75c0f49443
SurgeMail_73b8_fmt_06_060.txt
Posted Jul 11, 2007
Authored by Nico Leidecker | Site portcullis-security.com

SurgeMail version 3.7b8 Linux suffers from a format string vulnerability.

tags | advisory
systems | linux
SHA-256 | 525c089d7648287aa57c4e50b8da924fae9c965e876911b34796cfc782d2004e
GS07-01.txt
Posted May 17, 2007
Authored by Fatih Ozavci, Caglar Cakici | Site gamasec.net

Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious content to bypass HTTP content scanning systems. Systems affected include Checkpoint Web Intelligence and IBM ISS Proventia Series systems.

tags | advisory, web
SHA-256 | ed7d99c4b0c8cf924026804e5a72dd264e34e794211f2f18d66d3c41fdd46077
Page 4 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close