seeing is believing
Showing 101 - 125 of 765 RSS Feed

x86 Files

Debian Security Advisory 3362-1
Posted Sep 21, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3362-1 - Several vulnerabilities were discovered in qemu-kvm, a full virtualization solution on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2015-5278, CVE-2015-5279, CVE-2015-6815, CVE-2015-6855
MD5 | 296e26b5283ef536d73f6bac55d080f9
Linux/x86 /bin/cat /etc/passwd Shellcode
Posted Sep 9, 2015
Authored by Ajith KP

75 bytes small Linux/x86 execve("/bin/cat", ["/bin/cat", "/etc/passwd"], NULL) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 7751edc3b6bd12a3ed6d6e64015f7f8b
Linux/x86 Create 7775 File Shell Generator
Posted Sep 8, 2015
Authored by Ajith KP

Python code leveraging Linux/x86 shellcode to create a file w/ 7775 permissions and exit.

tags | x86, shellcode, python
systems | linux
MD5 | 7c3e285581d32e674dc9e0d905d5919c
Linux/x86 Create File With 7775 Permissions Shellcode
Posted Sep 8, 2015
Authored by Ajith KP

31 bytes small Linux/x86 shellcode that creates a file with 7775 permissions.

tags | x86, shellcode
systems | linux
MD5 | ac1a8f42adb8b89a719233c143647dad
Linux/x86 execve(/bin/bash) Shellcode
Posted Sep 7, 2015
Authored by Ajith KP

31 bytes small Linux/x86 execve(/bin/bash) shellcode.

tags | x86, shellcode, bash
systems | linux
MD5 | 44a964b1f2f3d7b3ac4ce99318803e08
Debian Security Advisory 3349-1
Posted Sep 3, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3349-1 - Several vulnerabilities were discovered in qemu-kvm, a full virtualization solution on x86 hardware.

tags | advisory, x86, vulnerability
systems | linux, debian
advisories | CVE-2015-5165, CVE-2015-5745
MD5 | 26775a5626a810a65e9166a5a3e8acf5
Microsoft Office 2007 MSPTLS Heap Index Integer Underflow
Posted Aug 21, 2015
Authored by Google Security Research, scvitti

A crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug also reproduced in Office 2010 running on Windows 7 x86.

tags | exploit, x86
systems | linux, windows, 7
MD5 | b3f1fdb1616bbbd919f8d165e9afe4a7
Microsoft Office 2007 Wwlib.dll FcPlcfFldMom Uninitialized Heap Usage
Posted Aug 21, 2015
Authored by Google Security Research, scvitti

A crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug also reproduced in Office 2010 running on Windows 7 x86. The crash is caused by a 1 bit delta from the original file at offset 0x31B.

tags | exploit, x86
systems | linux, windows, 7
MD5 | 827c32373ba26b75aa39529cf305ceb8
Microsoft Office 2007 Wwlib.dll Type Confusion
Posted Aug 21, 2015
Authored by Google Security Research, scvitti

A crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug also reproduced in Office 2010 running on Windows 7 x86.

tags | exploit, x86
systems | linux, windows, 7
MD5 | cff51440d1a04890d0df305bc881697b
Microsoft Office 2007 OGL.dll DpOutputSpanStretch:OutputSpan Out Of Bounds Write
Posted Aug 21, 2015
Authored by Google Security Research, scvitti

A crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug also reproduced in Office 2010 running on Windows 7 x86. The crash is caused by a 1 bit delta from the original file at offset 0x4A45. OffViz identified this offset as OLESSRoot.DirectoryEntries[100].OLESSDirectoryEntry[20].sidLeft with an original value of 0x00000000 and a fuzzed value of 0x00008000.

tags | exploit, x86
systems | linux, windows, 7
MD5 | 881f217072ce6412eaa7c6f3f3627758
Microsoft Office 2007 MSO.dll Arbitrary Free
Posted Aug 21, 2015
Authored by Google Security Research, scvitti

A crash was observed in Microsoft Office 2007 with Microsoft Office File Validation Add-In disabled and Application Verifier enabled for testing and reproduction. This bug did not reproduce in Office 2010 running on Windows 7 x86. The attached PoC file will reproduce when Word is closed. However, there were other crashing files (not attached) faulting on the same EIP that did not require Word to be be closed to trigger the crash. This particular PoC did not minimize cleanly and has 666 deltas from the original non-fuzzed file.

tags | exploit, x86
systems | linux, windows, 7
MD5 | 3178eee95041ca5249d3ba4039fa0ce7
Microsoft Office 2007 MSO.dll Use-After-Free
Posted Aug 21, 2015
Authored by Google Security Research, scvitti

A crash was observed in MS Office 2007 running under Windows 2003 x86. Microsoft Office File Validation Add-In is disabled and application verified was enabled for testing and reproduction. This sample did not reproduce in Office 2010 running on Windows 7 x86. The attached minimized PoC that produces the crash with 2 bit changes from the original file at offsets 0x11E60 and 0x1515F. Standard office document parsers did not reveal any significance about this location.

tags | exploit, x86
systems | linux, windows, 7
MD5 | 19c11973fa5c5af2140b218aed30d44d
Red Hat Security Advisory 2015-1643-01
Posted Aug 18, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1643-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

tags | advisory, x86, kernel, local
systems | linux, redhat
advisories | CVE-2015-3636
MD5 | 23c9f23dc174bfe738f09262037924bd
Linux x86 /bin/sh ROL/ROR Encoded Shellcode
Posted Aug 12, 2015
Authored by Anastasios Monachos

Custom Linux/x86 shellcode encoder/decoder that switches between ROL and ROR and spawns a /bin/sh shell using execve.

tags | shell, x86, shellcode
systems | linux
MD5 | 4f82e57ba662b47beb97ff66b77d4b79
Red Hat Security Advisory 2015-1583-01
Posted Aug 11, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1583-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

tags | advisory, x86, kernel, local
systems | linux, redhat
advisories | CVE-2015-3636
MD5 | 8bd007c63dd81344a488aa652a7b9e24
Linux/x86 Memory Sinkhole Proof Of Concept
Posted Aug 7, 2015
Authored by Christopher Domas

Linux/x86 memory sinkhole privilege escalation proof of concept exploit.

tags | exploit, x86, proof of concept
systems | linux
MD5 | 617baca6c552243489480095df842376
Red Hat Security Advisory 2015-1564-01
Posted Aug 6, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1564-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. An integer overflow flaw was found in the way the Linux kernel's netfilter connection tracking implementation loaded extensions. An attacker on a local network could potentially send a sequence of specially crafted packets that would initiate the loading of a large number of extensions, causing the targeted system in that network to crash. It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

tags | advisory, overflow, x86, kernel, local
systems | linux, redhat
advisories | CVE-2014-9715, CVE-2015-2922, CVE-2015-3636
MD5 | ea43247306503e22b480a9de2aef3245
Obfuscated Execve /bin/sh Shellcode
Posted Aug 6, 2015
Authored by B3mB4m

Obfuscated execve /bin/sh Linux/x86 shellcode.

tags | x86, shellcode
systems | linux
MD5 | ad4c8fe6baa4bed6aafc8fb12719c281
Shellcode Helper
Posted Aug 4, 2015
Authored by B3mB4m

Shellcode Helper is a python script designed to act as an x86 little endian stack converter.

tags | tool, x86, shellcode, python
MD5 | 75d6c4cab21555a4f74c1e87b22d7589
Red Hat Security Advisory 2015-1221-01
Posted Jul 16, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1221-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A NULL pointer dereference flaw was found in the way the Linux kernel's virtual console implementation handled reference counting when accessing pseudo-terminal device files. A local, unprivileged attacker could use this flaw to crash the system. It was found that the Linux kernel's ping socket implementation did not properly handle socket unhashing during spurious disconnects, which could lead to a use-after-free flaw. On x86-64 architecture systems, a local user able to create ping sockets could use this flaw to crash the system. On non-x86-64 architecture systems, a local user able to create ping sockets could use this flaw to escalate their privileges on the system.

tags | advisory, x86, kernel, local
systems | linux, redhat
advisories | CVE-2011-5321, CVE-2015-1593, CVE-2015-2830, CVE-2015-2922, CVE-2015-3636
MD5 | 7569846c179aefca0adca037b66b1cef
Linux/x86 Forced rmdir Shellcode
Posted Jun 26, 2015
Authored by B3mB4m

Linux/x86 forced rmdir shellcode.

tags | x86, shellcode
systems | linux
MD5 | 5ffe179a99ae67dbb99d08e1184eaf8c
Linux/x86 Reboot Shellcode
Posted Jun 25, 2015
Authored by B3mB4m

28 bytes small Linux/x86 reboot shellcode.

tags | x86, shellcode
systems | linux
MD5 | 301cbf2e07dd83cb0aef4e026d68af2e
Microsoft Windows ClientCopyImage Improper Object Handling
Posted Jun 22, 2015
Authored by temp66, OJ Reeves, hfirefox | Site metasploit.com

This Metasploit module exploits improper object handling in the win32k.sys kernel mode driver. This Metasploit module has been tested on vulnerable builds of Windows 7 x64 and x86, and Windows 2008 R2 SP1 x64.

tags | exploit, x86, kernel
systems | windows, 7
advisories | CVE-2015-1701
MD5 | 2f0aec917a34229f17599d68939b21dc
Linux/x86 chmod('/etc/passwd','777') Shellcode
Posted Jun 19, 2015
Authored by Mohammad Reza Espargham

42 bytes small Linux/x86 chmod('/etc/passwd','777') shellcode.

tags | x86, shellcode
systems | linux
MD5 | f8567828e24918d9b326a6ae3dceadd6
Linux/x86 NetCat Bindshell Shellcode
Posted Jun 18, 2015
Authored by B3mB4m

60 bytes small Linux/x86 netcat bindshell shellcode that attaches to port 5555.

tags | x86, shellcode
systems | linux
MD5 | f77c4009bb4f546ca4a8b8d7815fa09c
Page 5 of 31
Back34567Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close