Mac OS X 10.8.4 Local Privilege Escalation
Mac OS X versions 10.8.4 and below local root privilege escalation exploit written in Python.
Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file
Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
[remote] – dreamMail e-mail client v4.6.9.2 Stored XSS
dreamMail e-mail client v4.6.9.2 Stored XSS
[dos] – Samba nttrans Reply – Integer Overflow Vulnerability
Samba nttrans Reply - Integer Overflow Vulnerability
[webapps] – DeWeS 0.4.2 – Directory Traversal Vulnerability
DeWeS 0.4.2 - Directory Traversal Vulnerability
[webapps] – Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment
Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment
[webapps] – Netgear ProSafe – Denial of Service Vulnerability
Netgear ProSafe - Denial of Service Vulnerability
[webapps] – Netgear ProSafe – Information Disclosure Vulnerability
Netgear ProSafe - Information Disclosure Vulnerability
[webapps] – CBHotel Hotel Software and Booking system 1.8 – Multiple Vulnerabilities
CBHotel Hotel Software and Booking system 1.8 - Multiple Vulnerabilities