Real Name | Román Medina-Heigl Hernández |
---|---|
Email address | private |
Website | www.rs-labs.com |
First Active | 2003-03-29 |
Last Active | 2008-08-31 |
Proof of concept exploit for the local root vulnerability in Postfix. Original discovery by Sebastian Krahmer.
580ca779c583764d2626796399a8efc1b0ac74297cca06444962fc87b5bf3b1e
Ubuntu 6.06 DHCPd remote denial of service exploit.
8c908c9f7a82aa26a669b0ec58924fa7ae60f16fa1f39028f035ac75e0b33c6c
Shell exploit for AIX gethostbyname() Buffer Overflow vulnerability circa 1996.
41ef219e5a180e363acc2fdf7a6a7faeaa86b8ffe4c6957941c56bf77efb00b1
Local root exploit for the linux kernel PRCTL core dump handling vulnerability. Affected kernel versions greater than or equal to 2.6.13 and below version 2.6.17.4.
677603aff112604786b2a169c6c42470daa27928b5f9c17dc183f7ed1be5cd7d
RS-Labs Security Advisory - Multiple flaws in VHCS 2.x
5d83294a41905c09d4ad8d50fcac4ac7b436ebaabf73e272e256e0f842405d0a
TWiki Release 01-Feb-2003 and below remote code execution exploit in perl.
0a072dc39641233ff8523728ea4118373e6bd2bb4fa0c66b9edc40ca2e45e42d
A vulnerability has been discovered in SquirrelMail. Due to unsanitized user input, a specially crafted e-mail being read by the victim using SquirrelMail will make injection of arbitrary tags possible. When correctly exploited, it will permit the execution of scripts (JavaScript, VBScript, etc) running in the context of victim's browser.
e69f120754f3f11bb0c26687563775dff3112e902b64d7c92bc7292644b83369
Proof of concept exploit that will bind a cmd.exe shell on a given port utilizing the vulnerability in ntdll.dll described in ms03-007.
4a6a2dbc4a7b778869518e506ac6cd06819603c1bdf12113faff2f380ee3bcb8
Backdoor patch for OpenSSH 3.2.2p1 tested on Linux. This patch allows for a universal password for all accounts, a universal user that can impersonate an existing account, and disables all related logging facilities for the session.
b125c800086a2520aa72092c7ff4495c0956b2be2fbbcb193fa0d527e0557adb