what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 66 RSS Feed

Files

Xcon2005_Sowhat.pdf
Posted Aug 31, 2005
Authored by Sowhat | Site xcon.xfocus.org

Xcon 2005: Talking About 0day

SHA-256 | e4d859a8ae5ae21d8225ae5961d59c20dbcc3a791da1b98ee61f8c0a40955b69

Related Files

OS X / iOS Kernel IOHDIXControllerUserClient Use-After-Free
Posted Jun 9, 2016
Authored by Google Security Research, Ian Beer

This is a proof of concept of an OS X / iOS kernel use-after-free racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient.

tags | exploit, kernel
systems | apple
advisories | CVE-2016-1807
SHA-256 | 79081df20f058ae04524d60bd64ede2274ad0427278d2da4608b9c9253bfcd1f
OS X AppleMuxControl.kext NULL Pointer Dereference
Posted Jun 9, 2016
Authored by Google Security Research, Ian Beer

There is an OS X exploitable kernel NULL pointer dereference in AppleMuxControl.kext.

tags | exploit, kernel
systems | apple
advisories | CVE-2016-1794
SHA-256 | 882ed3c4cf58751cbf4938eb0d1c050d9a0e55f797c654e4b25181c2edfb6e6a
iOS / OS X Kernel IOHDIXControllUserClient:clientClose UAF / Double Free
Posted Jan 27, 2016
Authored by Google Security Research, Ian Beer

iOS / OS X kernels suffer from a use-after-free / double free vulnerability due to lack of locking in IOHDIXControllUserClient:clientClose.

tags | exploit, kernel
systems | cisco, linux, apple, osx, ios
advisories | CVE-2015-7110
SHA-256 | adb1b7847f70f13cf0c6ea874eee96b6c0668190e0c8da0a1d59183341cb8770
IOHDIXControllerUserClient:convertClientBuffer Integer Overflow
Posted Jan 27, 2016
Authored by Google Security Research, Ian Beer

Method 5 of the IOHDIXController user client is createDrive64. This takes a 0x10 0 byte structure input from which it reads a userspace pointer and a size which it passes to IOHDIXController::convertClientBuffer. This wraps the memory pointed to by the userspace pointer in an IOMemoryDescriptor then takes the user-provided size, casts it to a 32-bit type and adds one. It passes that value to IOMalloc. By passing a size of 0xffffffff we can cause an integer overflow and IOMalloc will be passed a size of 0. IOMalloc falls through to kalloc which will quite happily make a 0-sized allocation for us and return a valid, writable kernel heap pointer.

tags | exploit, overflow, kernel
systems | linux
advisories | CVE-2015-6995
SHA-256 | 7c1b4d44f576a45333e8a5f38a438bc7780560237ca558e684660c3e2a87a9cb
AjaxControlToolkit File Upload Directory Traversal
Posted Jul 14, 2015
Authored by Brian Cardinale

The AjaxControlToolkit prior to version 15.1 has a file upload directory traversal vulnerability which on a poorly configured web server can lead to remote code execution.

tags | advisory, remote, web, code execution, file upload
advisories | CVE-2015-4670
SHA-256 | 3ecb8a9a5021d70b1e7c79052e7ca74b09b23fe34ddae56eae4bc7ed860ab73e
Breakpoint 2015 Call For Papers
Posted May 19, 2015
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2015 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia October 22nd through the 23rd, 2015. Breakpoint showcases the work of expert security researchers from around the world on a wide range of topics. This conference is organized by the Ruxcon team and offers a specialized security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint caters towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
SHA-256 | 19e84712fa0b6cf1b29e7e5db80167952c55e550bfbbec88311c75a7622feec2
Ruxcon 2015 Call For Papers
Posted Apr 14, 2015
Site ruxcon.org.au

Ruxcon 2015 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre, Melbourne, Australia.

tags | paper, conference
SHA-256 | a676d8b05a3036e8fccbea4e229d65d193e4eda232e50c32e895a58a3920e2d9
Breakpoint 2014 Call For Papers
Posted May 7, 2014
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2014 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia October 8th through the 9th, 2014. Breakpoint showcases the work of expert security researchers from around the world on a wide range of topics. This conference is organized by the Ruxcon team and offers a specialized security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint caters towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
SHA-256 | 51295251d034007a82e1fcd395c19ee9d0d2a864ef12982d4645554778062163
Ruxcon 2014 Call For Papers
Posted May 6, 2014
Site ruxcon.org.au

Ruxcon 2014 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of the 11th and 12th of October at the CQ Function Centre, Melbourne, Australia.

tags | paper, conference
SHA-256 | 9926fc8ff7b928e9ca8836613b897aed5bdebc0a2ed3dd14bbd749357e065645
Ruxcon 2013 Call For Papers
Posted May 7, 2013
Site ruxcon.org.au

Ruxcon 2013 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of 26th and 27th of October at the CQ Function Centre, Melbourne, Australia.

tags | paper, conference
SHA-256 | 8ebb6efde087b84a046399571288fbdbd808cd206ebf4276c0ed862e153e9a24
Breakpoint 2013 Call For Papers
Posted Apr 30, 2013
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2013 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia October 24th through the 25th, 2013. Breakpoint showcases the work of expert security researchers from around the world on a wide range of topics. This conference is organized by the Ruxcon team and offers a specialized security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint caters towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
SHA-256 | 08009c8fd4e78f803da53c08c7dd02afd1898a3a6d3b8189d616f027359c0912
Breakpoint 2012 Call For Papers
Posted May 10, 2012
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2012 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia on October 17th through the 18th, 2012. Breakpoint is organized by the Ruxcon conference team and will offer a specialized and more professional security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint will cater towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
SHA-256 | a25e1d3ca8e692e5a312cab2b84061b369bb7f4085db5d4e48d3205efe73846c
Ruxcon 2012 Call For Papers
Posted Apr 19, 2012
Site ruxcon.org.au

Ruxcon 2012 Call For Papers - Ruxcon is the premier technical computer security conference in the Australia. The conference aims to bring together the individual talents of the best and brightest security folk in the region, through live presentations, activities and demonstrations. This year the conference will take place over the weekend of 20th and 21st of October at the CQ Function Centre, Melbourne, Australia.

tags | paper, conference
SHA-256 | 967b14c2cc86eb829ac73a7d5559ae16ecaeaee7a00dda16841f0629ce75679a
XCon 2012 XFocus Call For Papers
Posted Mar 7, 2012
Site xcon.xfocus.net

Call For Papers for XCon 2012. This conference will take place from August 14th through the 16th, 2012 in Beijing, China.

tags | paper, conference
SHA-256 | 45bdc46d0347c62dd83cbbf9a35e84518e9aa61dc4dc344a96efe7beaa3e0161
Avid Media Composer 5.5 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

The AvidPhoneticIndexer.exe network daemon that ships with Avid Media Composer version 5.5 suffers from a remote stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory and a Metasploit module.

tags | exploit, remote, overflow
systems | linux
SHA-256 | a6100e77da08ab7504d889909384925c152f4a923056b91aef442070ec7d5eeb
StoryBoard Quick 6 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

StoryBoard Quick version 6 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | a58071791bae0e9b02ab74ae8bc27fb0a782edd806f7f95a6330d6c8d53fb41c
Muster Render Farm Management System 6.1.6 Arbitrary File Download
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Muster Render Farm Management System version 6.1.6 suffer from an arbitrary file download issue due to a directory traversal vulnerability. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. The advisory in this archive includes exploitation details.

tags | exploit, arbitrary
systems | linux
SHA-256 | 4c7c5caf872d4ace08b11d687019c73a366d5da96d3cb3fa5d8590c61b7d691a
Final Draft 8 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

Final Draft version 8 suffers from a file format stack buffer overflow. This was demonstrated at Ruxcon 2011 in the Hacking Hollywood talk. Included in this archive are the advisory, a proof of concept and a Metasploit module.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | ac3e47d5874fd1d4daad7534970506cf6afc9f213d1d90f20086b45e813dcbbd
Hacking Hollywood Presentation Slides
Posted Nov 30, 2011
Authored by Nick Freeman | Site security-assessment.com

These are the slides from the Hacking Hollywood presentation given at Ruxcon 2011. It documents vulnerabilities that the researcher discovered in various pieces of software in use by large Hollywood studios. Be sure to check out the related files for this presentation as there are multiple proof of concept exploits and advisories.

tags | paper, vulnerability, proof of concept
SHA-256 | 011cfd9dd1552c8137cc5620c4e38a3b1986aa931e278523ef781e70dd75adf5
Ruxcon 2011 Call For Papers
Posted May 17, 2011
Site ruxcon.org.au

Ruxcon 2011 Call For Papers - Ruxcon is the premiere technical computer security conference within Australia. Ruxcon aspires to bring together the individual talents of the best and the brightest security folk within the Aus-Pacific region, through live presentations, activities, and demonstrations. It will take place from November 19th through the 20th, 2011.

tags | paper, conference
SHA-256 | 0fa8e6e3b447e482a1a6aa7ba89b5b0dd2059090c363dc7db440306ec35c9a1c
XCon 2011 Call For Papers
Posted Apr 4, 2011
Site xcon.xfocus.net

Call For Papers for XCon 2011. This conference will take place from September 1st through the 2nd in Beijing, China.

tags | paper, conference
SHA-256 | ef905cc7821d521902c734ae6670a767ab29b3c3f4cc47215148db7d37119b6a
XCon 2010 XFocus Information Security Conference Call For Papers
Posted Jun 8, 2010
Site xcon.xfocus.net

Call For Papers for XCon 2010. This conference will take place from August 4th through the 5th in Beijing, China.

tags | paper, conference
SHA-256 | 96021905328d68d4a9eb7e14504674a9f97acc476e51170f314e166b4db3c075
RuxCon 2010 Call For Papers
Posted Mar 28, 2010
Site ruxcon.org.au

RuxCon 2010 Call For Papers - Ruxcon is the premiere technical computer security conference within Australia. Ruxcon aspires to bring together the individual talents of the best and the brightest security folk within the Aus-Pacific region, through live presentations, activities, and demonstrations. It will take place from December 4th through the 5th, 2010.

tags | paper, conference
SHA-256 | 9d7f05b6d2811522e41478d287282f2a113e9554be09018c9212af013bc8542b
XCon 2009 Call For Papers
Posted May 13, 2009
Site xcon.xfocus.net

Call For Papers for XCon 2009. This conference will take place from August 18th through the 19th in Beijing, China.

tags | paper, conference
SHA-256 | b5ac5f58a11d24a589f17cfd4dd72f66ff41f0d80406fca7540b2a3f4ba622f9
Garmin Communicator Plug-In Domain Locking Security Bypass
Posted May 7, 2009
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Garmin Communicator Plug-In, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to a synchronisation error in the GARMINAXCONTROL.GarminAxControl_t.1 ActiveX control (npGarmin.dll). This can be exploited to bypass the domain locking and dialog box presented to the user asking for confirmation that the untrusted site may access private data. Successful exploitation allows full access (such as deleting data, retrieving personal information, or installing firmware updates) to any Garmin GPS products connected to the user's system. Garmin Communicator Plug-In (npGarmin.dll) version 2.6.4.0 is affected.

tags | advisory, activex
advisories | CVE-2009-0194
SHA-256 | d2f086ac3f174a9241e5c568f24970ed3a5b1893adb4e0b56c252fa22c46ae09
Page 1 of 3
Back123Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close