Mac OS X 10.8.4 Local Privilege Escalation
					Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.                
																																	
												                
																								                
						
																    
Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()
					The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file                
																																	
												                
																								                
						
																    
Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption
					The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.                
																																	
												                
																								                
						
																    
[remote] – dreamMail e-mail client v4.6.9.2 Stored XSS
					dreamMail e-mail client v4.6.9.2 Stored XSS                
																																	
												                
																								                
						
																    
[dos] – Samba nttrans Reply – Integer Overflow Vulnerability
					Samba nttrans Reply - Integer Overflow Vulnerability                
																																	
												                
																								                
						
																    
[webapps] – DeWeS 0.4.2 – Directory Traversal Vulnerability
					DeWeS 0.4.2 - Directory Traversal Vulnerability                
																																	
												                
																								                
						
																    
[webapps] – Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment
					Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment                
																																	
												                
																								                
						
																    
[webapps] – Netgear ProSafe – Denial of Service Vulnerability
					Netgear ProSafe - Denial of Service Vulnerability                
																																	
												                
																								                
						
																    
[webapps] – Netgear ProSafe – Information Disclosure Vulnerability
					Netgear ProSafe - Information Disclosure Vulnerability                
																																	
												                
																								                
						
																    
[webapps] – CBHotel Hotel Software and Booking system 1.8 – Multiple Vulnerabilities
					CBHotel Hotel Software and Booking system 1.8 - Multiple Vulnerabilities