exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

THCunREAL_V0.2.ZIP
Posted Apr 30, 2003
Authored by thc, Johnny Cyberpunk | Site thc.org

Updated version of the remote root exploit for Realserver 8 on several Windows platforms.

Changes: New shellcode added and the code has been condensed.
tags | exploit, remote, root
systems | windows
SHA-256 | faac60e3244b42b5c4ede35ae529a0d44f8df9e59b986f1e0455c38db816a155

Related Files

Mandriva Linux Security Advisory 2012-148
Posted Aug 30, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-148 - Multiple vulnerabilities has been found and corrected in ffmpeg. This advisory provides updated versions which resolves various security issues.

tags | advisory, vulnerability
systems | linux, mandriva
SHA-256 | dc4b48dc91bf77b70f8a47d5aaa5d9e521c4035f2645af7ccd9069f8d5735ed2
Apple Security Advisory 2012-05-14-2
Posted May 15, 2012
Authored by Apple | Site apple.com

Apple Security Advisory 2012-05-14-2 - This update disables Adobe Flash Player if it is older than 10.1.102.64 by moving its files to a new directory. This update presents the option to install an updated version of Flash Player from the Adobe website.

tags | advisory
systems | apple
SHA-256 | a18bf4afd49f0790a7800f00c7179cc923a3890a42c7c396c63645d35c123d0d
VMware Security Advisory 2011-0002
Posted Feb 8, 2011
Authored by VMware | Site vmware.com

VMware Security Advisory 2011-0002 - Updated versions of the Cisco Nexus 1000V virtual switch address a denial of service in VMware ESX/ESXi.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2011-0355
SHA-256 | f7fb2874766eafff4cbc31b572f60590002f62083f57c442c95b8355c3c13bda
Panda Security Local Privilege Escalation 2010
Posted Jan 21, 2010
Authored by Nikolas Sotiriu | Site sotiriu.de

Panda Security suffers from a local privilege escalation vulnerability. Proof of concept code included. This is an updated version of the original advisory.

tags | advisory, local, proof of concept
SHA-256 | 68c919cfbbcaab6c8202cec461ff70cb5276a6228828dd6772a6c974b0ae4c75
Chrome chromehtml: Code Execution
Posted Jan 30, 2009
Authored by Janek Vind aka waraxe | Site waraxe.us

Updated version of the Google Chrome chromehtml: code execution vulnerability that demonstrates disabling of the sandbox. Version 1.0.154.46 is affected.

tags | exploit, code execution
SHA-256 | 51fc96a054aa0a16bfb637685259cda45d65bdab9ef532392919c35d2dc90cd4
CoolCon0.2.rar
Posted Sep 14, 2008
Authored by LiquidWorm | Site itsec.com.mk

A simple command-line converter written in C language (win32) that converts input as string or integer. ASCII to Binary/Decimal/Octal/Hexadecimal, Binary to Decimal/Octal/Hexadecimal, Decimal to Binary/Octal/Hexadecimal. ROT13 and URL Unicode UTF-8 encoding feature. Compiled .exe binary and .c source code included. Updated version of CoolCon v0.01.

systems | windows
SHA-256 | 392ec663c9c93e275fd1274efd86547bfdef1c6ec969eef361b2d3a1a199cfe9
Mandriva Linux Security Advisory 2008-185
Posted Sep 3, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A cross-site request forgery vulnerability was discovered in Django that, if exploited, could be used to perform unrequested deletion or modification of data. Updated versions of Django will now discard posts from users whose sessions have expired, so data will need to be re-entered in these cases. The versions of Django shipping with Mandriva Linux have been updated to the latest patched versions that include the fix for this issue. In addition, they provide other bug fixes.

tags | advisory, csrf
systems | linux, mandriva
SHA-256 | f29f1fd342862c32773ddaecee0eace0a22b56524a1bce50300386a68f70cf4c
Secunia Security Advisory 31208
Posted Jul 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An updated version of IPCop has been released, which fixes some vulnerabilities in perl, which can potentially be exploited by malicious people to cause a Denial of Service or to compromise a vulnerable perl application.

tags | advisory, denial of service, perl, vulnerability
SHA-256 | 675fa8a259a3dc24aabb4d32ccb27c201b6432bdb68de2b3480493a226ec72aa
Secunia Security Advisory 31204
Posted Jul 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An updated version of IPCop has been released, which fixes some vulnerabilities in bzip2, dnsmasq, and snort, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and poison the DNS cache.

tags | advisory, denial of service, vulnerability
SHA-256 | 80d9212b06fdddf881f1dc302073356eb3283dcafedabbb6a097745e61a64711
Debian Linux Security Advisory 1553-2
Posted Jun 2, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1553-2 - The update of ikiwiki in DSA-1553-1 caused two regressions. An updated version of ikiwiki is available that fixes these problems. It has been discovered that ikiwiki, a Wiki implementation, does not guard password and content changes against cross-site request forgery (CSRF) attacks.

tags | advisory, csrf
systems | linux, debian
advisories | CVE-2008-0165
SHA-256 | d2d60a5de1e4dae8cc297c40c2e176380697ee23da5e352b42d1bd0af4fd1fb9
postgresql-multi.txt
Posted Jan 7, 2008
Site postgresql.org

The PostgreSQL Global Development Group has released updated versions which patch five security vulnerabilities. These releases update all current PostgreSQL versions, including 8.2, 8.1, 8.0, 7.4 and 7.3.

tags | advisory, vulnerability
SHA-256 | fe9ceda5324b25e5aca3e65f7f3906c213a45895c6e151fe1c884caa9627e579
MITKRB5-SA-2007-006-2.txt
Posted Sep 6, 2007
Site web.mit.edu

MIT krb5 Security Advisory 2007-006 - The MIT krb5 Kerberos administration daemon (kadmind) is vulnerable to a stack buffer overflow in the RPCSEC_GSS authentication flavor of the RPC library. Third-party applications using the RPC library provided with MIT krb5 may also be affected. Updated version of the original advisory with a fixed patch.

tags | advisory, overflow
advisories | CVE-2007-3999, CVE-2007-4000
SHA-256 | c517f29d3963a74e5996d51015499a26393ca2069f0a85df1eae3889e291d2f7
Ubuntu Security Notice 454-1
Posted May 3, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 454-1 - PostgreSQL did not handle the "search_path" configuration option in a secure way for functions declared as "SECURITY DEFINER". Previously, an attacker could override functions and operators used by the security definer function to execute arbitrary SQL commands with the privileges of the user who created the security definer function. The updated version does not search the temporary table schema for functions and operators any more.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2007-2138
SHA-256 | f18051df98728bdb9d0d5c4ddf38e3dfda0b0ac07fb02ae43883acbbb9a61897
Secunia Security Advisory 23785
Posted Jan 18, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An updated version of IPCop has been released, which fixes some vulnerabilities in various packages. The vulnerabilities can be exploited by malicious people to bypass certain security restrictions, overwrite arbitrary files, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, arbitrary, vulnerability
SHA-256 | 0a2b2bdce684e1040cfeed541b2b0a721de3b6131b1f1b846f55293b5757c9d4
Ubuntu Security Notice 398-3
Posted Jan 5, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 398-3 - USN-398-1 fixed vulnerabilities in Firefox. Due to the updated version, a flaw was uncovered in the Firefox Themes bundle, which erroneously reported to be incompatible with the updated Firefox. This update fixes the problem. Various flaws have been reported in Firefox that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page containing JavaScript or SVG.

tags | advisory, web, arbitrary, javascript, vulnerability
systems | linux, ubuntu
advisories | CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502, CVE-2006-6503, CVE-2006-6504, CVE-2006-6506, CVE-2006-6507
SHA-256 | 1f2cd0037634d8b78299af88c6dc16d8f7bfa2f98ca26a4626dec03b62e82e7d
ciscocrack2.c
Posted Oct 4, 2005
Authored by Jerome Poggi | Site hsc.fr

Updated version of ciscocrack.c that works with newer versions of IOS.

systems | cisco
SHA-256 | b141c8116eb3ba9673fa64a8aa60bf04f0e2c80c35e07352ac384ee2be6d1d76
Ubuntu Security Notice 145-2
Posted Sep 7, 2005
Authored by Ubuntu, Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-145-2 - USN-145-1 fixed several vulnerabilities in wget. However, Ralph Corderoy discovered some regressions that caused wget to crash in some cases. The updated version fixes this flaw.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 65528870bfd3af1e90d9dd8a01ac3f53e1e019e7001166bdff5b8fc4e2d77c47
Secunia Security Advisory 16564
Posted Aug 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An updated version of IPCop has been released. This fixes some vulnerabilities in various packages, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 1305f902d82db71aaba5e7097bbd01833077adf29aa6b0eec964f122fddb7a0f
050819-securing-mac-os-x-tiger.pdf
Posted Aug 26, 2005
Authored by Stephen de Vries | Site corsaire.com

Corsaire (www.corsaire.com/white-papers/) has released a fully updated version of their guide to securing Mac OS X to cover the new security features offered by Mac OS X 10.4 Tiger (such as ACLs) as well as incorporating additional security guidelines that were omitted in the original (10.3) guide.

systems | apple, osx
SHA-256 | 1ea81aaa2aa236628ac103090c6ba94ca9fabfeb20d246d321c0a91cc7b54d51
linsql2.c
Posted Aug 5, 2005
Authored by Herbless, solid

linsql2 is an updated version of the command line client for MS-SQL that can execute arbitrary SQL queries and OS commands, when the username/password of the MS-SQL server is known. This version supports the API of the latest freetds library.

tags | exploit, arbitrary
SHA-256 | 4a7f09b14553a97a9a8574a315ad5054939fcc9f829e00560c83fedc1daeea48
Secunia Security Advisory 15335
Posted May 29, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An updated version of IPCop has been released. This fixes some vulnerabilities in various packages, which can be exploited to gain escalated privileges, cause a DoS (Denial of Service), or extract files to arbitrary directories.

tags | advisory, denial of service, arbitrary, vulnerability
SHA-256 | 0be8a8c7ade84f46fa1270a5dcc526044b3dfbcf7e0c98fbfe5d3e0c778fa4e8
utilmaned2.c
Posted Jul 17, 2004
Authored by Kralor

Local elevation of privileges exploit for the Microsoft Windows 2000 Utility Manager vulnerability. Updated version that can be executed via simple cmd.exe shells using a normal user account. Gives a shell with SYSTEM privileges.

tags | exploit, shell, local
systems | windows
advisories | CVE-2004-0213
SHA-256 | 075b9e7810c1d745ad80808bae307f18bd645d2e8f49f32f7a9315895c6f6671
Secunia Security Advisory 11724
Posted May 30, 2004
Authored by Secunia, David Brown, Aaron, Ren Puls

Apple has issued an updated version of Mac OS X, which fixes many unspecified vulnerabilities. An unspecified error reportedly exists within the NFS logging functionality when tracing system calls. Another unspecified error reportedly exists within LoginWindow when handling directory services lookups and console log files. Yet still another unspecified error exists within Packaging during package installation. Not to mention another unspecified error exists within the TCP/IP stack implementation when handling out-of-sequence TCP packets. Two more unspecified errors exist within AppleFileServer when using SSH and reporting errors and within Terminal when handling URLs.

tags | advisory, tcp, vulnerability
systems | apple, osx
SHA-256 | b46294fcf891e166c1351e0f4c3af5105060325db5d31033b1620b4ca1e2bde8
Rose_Frag_Attack_Explained.txt
Posted Apr 28, 2004
Authored by Ken Hollis - Gandalf The White | Site digital.net

Updated version of the white-paper discussing the Rose Attack method and how sending two parts of a fragmented packet can cause various outcomes to network devices, including denial of service problems.

tags | paper, denial of service
SHA-256 | aa2f2ff730fea23f570e3ae205be9c0e9da54e6c7f83c0637e38973166c67f1a
isec-0013v2-mremap.txt
Posted Jan 15, 2004
Authored by Wojciech Purczynski, Paul Starzetz | Site isec.pl

The mremap system call in the Linux kernel memory management code has a critical security vulnerability due to incorrect bounds checking. Proper exploitation of this vulnerability may lead to local privilege escalation including execution of arbitrary code with kernel level access. Updated version of the original release of this document.

tags | advisory, arbitrary, kernel, local
systems | linux
advisories | CVE-2003-0985
SHA-256 | 0a4e3c81dc818181f880893f3f4e1c339b5517ada7d7b0d09c8ac1ddf34cbe95
Page 3 of 4
Back1234Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    36 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close