accept no compromises
Showing 1 - 6 of 6 RSS Feed

Files from Context Information Security Ltd

First Active2011-08-19
Last Active2013-01-10
Microsoft .NET Framework Privilege Escalation
Posted Jan 10, 2013
Authored by James Forshaw, Context Information Security Ltd | Site contextis.co.uk

The Microsoft .NET Framework contains an error in the Intermediate Language (IL) verifier which could allow hosted partial trust code to elevate privileges to escape a sandboxed environment resulting in arbitrary code execution with the permissions of the user. Affected are Microsoft .Net Frameworks versions 1.1 through 4.5.

tags | advisory, arbitrary, code execution
advisories | CVE-2013-0004
MD5 | b2c977d9688a0585d75e1206d9b93d0f
Citrix XenServer 6.0.2 Privilege Escalation
Posted Oct 30, 2012
Authored by James Forshaw, Context Information Security Ltd | Site contextis.co.uk

Citrix XenServer version 5.0 through 6.0.2 suffer from a privilege escalation vulnerability.

tags | advisory
advisories | CVE-2012-4606
MD5 | fc97283d76c9558cee6b0af7236ae621
.NET 4 Remote Code Execution
Posted May 31, 2012
Authored by James Forshaw, Context Information Security Ltd

.NET versions 1.0 through 4 suffer from a remote code execution vulnerability.

tags | advisory, remote, code execution
advisories | CVE-2012-0160, CVE-2012-0161
MD5 | fde464f2676d6b0c6ba962260016eae4
SAP AG Netweaver 7.02 Buffer Overflow
Posted Feb 18, 2012
Authored by Nico Leidecker, Context Information Security Ltd

SAP AG Netweaver version 7.02 suffers from a stack based buffer overflow vulnerability in the SAPHostControl service. Exploitation can lead to code execution.

tags | advisory, overflow, code execution
MD5 | 7770f88651d7fc27d8a77eaf76d6713a
Apache Reverse Proxy Bypass
Posted Oct 6, 2011
Authored by Michael Jordon, Context Information Security Ltd, David Robinson | Site contextis.co.uk

Context discovered a security vulnerability which allows for Apache in reverse proxy mode to be used to access internal/DMZ systems due to a weakness in its handling of URLs being processed by mod_rewrite. Versions 1.3 and 2.x are affected.

tags | exploit
advisories | CVE-2011-3368
MD5 | 9addd7449e86f0c37284f65e8907acf8
Firefox 4 / 5 Heap Overflows
Posted Aug 19, 2011
Authored by James Forshaw, Context Information Security Ltd

Context discovered two memory corruption issues related to Firefox code that processes WebGL, that could result in remote code execution via a malicious web page. Heap overflows make use of the WebGL shader compiler and the ANGLE library. Versions 4.0.1 and 5 are affected.

tags | advisory, remote, web, overflow, code execution
advisories | CVE-2011-2987, CVE-2011-2988
MD5 | 8811c7f58cd14b6dd8340557070d7ef3
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close