exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files

Linux Slab Allocator Buffer Overflow Vulnerabilities
Posted Dec 12, 2008
Authored by Ramon de C Valle | Site risesecurity.org

This article discusses buffer overflow vulnerabilities in Linux kernel's Slab Allocator. All examples presented on this article were developed and executed on a x86 processor-based machine running Slackware Linux 10.2. Previous knowledge of buffer overflows is required.

tags | paper, overflow, x86, kernel, vulnerability
systems | linux, slackware
SHA-256 | de9f3af11d7e245892dedad5aacde5562b9c0a81ac458d179d52453f718c6faf

Related Files

Linux Kernel Slab Out-Of-Bounds Write
Posted Jan 26, 2022
Authored by Alejandro Guerrero

Local privilege escalation exploit for a Linux kernel slab out-of-bounds write vulnerability. This exploit has been tested in an Ubuntu 21.04 Hirsute with kernel 5.11.0.

tags | exploit, kernel, local
systems | linux, ubuntu
advisories | CVE-2022-0185
SHA-256 | 46970cc27a7bf55e660be14e1e0975df3058aefb276d3341c8fb2e841fe683c9
Microsoft Windows MSHTML Overview
Posted Sep 20, 2021
Authored by Eduardo Braun Prado

This article discusses the CVE-2021-40444 vulnerability and an alternative path that reduces the lines of JS code to trigger the issue and does not require CAB archives.

tags | exploit
advisories | CVE-2021-40444
SHA-256 | 78527c30f8b16f6de1e16c3cf93b1aaa4506bde934637509d7046e6e1fd8681b
The Audit DSOs Of The RTLD
Posted Oct 23, 2013
Authored by x90c

This article discusses audit DSOs and how to write one.

tags | paper
SHA-256 | c98b346c8f00afa069e1fa4f8056ab5dfc66f7f95ef9a5321bb113a18e4e8d8a
How To Hack A Website With Metasploit
Posted Feb 20, 2013
Authored by Sumedt Jitpukdebodin | Site r00tsec.blogspot.com

This article discusses how to use Metasploit for scanning, crawling, and attacking web applications.

tags | paper, web
SHA-256 | f1cc7c7ac8d8fc3a74105e7d8d02584bf9e083b1aa1fc066326798f75e73ec12
121106.pdf
Posted Dec 12, 2006
Authored by Vicente Aguilera Diaz | Site webappsec.org

The Web Application Security Consortium is proud to present 'MX Injection: Capturing and Exploiting Hidden Mail Servers'. This article discusses how an attacker can inject additional commands into an online web mail application communicating with an IMAP/SMTP server.

tags | paper, web, imap
SHA-256 | 94bd8b84698e67eb59003ab5d105584a50366e226a59e7e88a6db217ff2cff30
013105.txt
Posted Feb 1, 2005
Authored by Jeremiah Grossman | Site webappsec.org

The 80/20 Rule for Web Application Security: Increase your security without touching the source code . This article discusses ways to make your website more difficult to exploit with little effort.

tags | paper, web
SHA-256 | bba7f7e823c6583f2e30e376b8c5ab99b4d303a27d637867f9f30645116bb148
ssh1.crc32.txt
Posted Feb 22, 2001
Authored by Paul Starzetz

This article discusses the recently discovered security hole in the crc32 attack detector as found in common ssh packages like OpenSSH and derivatives using the ssh-1 protocol. It is possible to exploit the crc32 hole to gain remote access to accounts without providing any password or to change login-uid if a valid account on the remote machine exists. Includes an exploit in the form of a set of patches to Openssh-2.1.1.

tags | exploit, remote, protocol
SHA-256 | cd27d3d0419edb7ada37aee549f85877335a9048bec6e6842b8c7614a5947806
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close