what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

XenApp / XenDesktop Heap Corruption
Posted Jul 29, 2011
Authored by Moritz Jodeit, Alexios Fakos | Site nruns.com

A heap corruption vulnerability has been found in the Citrix XML Service of XenApp and XenDesktop which is installed on every server used for sharing applications. Successful exploitation allows arbitrary code execution on the server running the XML service.

tags | exploit, arbitrary, code execution
SHA-256 | a967d2b7f8fefd73301e6eaf2dfb4c514e1473ca7edba87c15475fe6dc0abe7e

Related Files

launchd Heap Corruption
Posted Jun 30, 2022
Authored by Google Security Research, Ian Beer

launchd suffers from a heap corruption vulnerability due to incorrect rounding in launch_data_unpack.

tags | advisory
advisories | CVE-2014-1359
SHA-256 | 5728e5ebf948c4d9fcd1bcdca177b71ce40167df17cbb2d5d1900427d642880f
Trojan-Proxy.Win32.Symbab.o MVID-2022-0610 Heap Corruption
Posted Jun 7, 2022
Authored by malvuln | Site malvuln.com

Trojan-Proxy.Win32.Symbab.o malware suffers from a heap corruption vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | d87eadfc59cb93da41ff57f425f1d203ea3db932253b3a8c23cde42e7b31c47c
Backdoor.Win32.Agent.sah MVID-2021-0386 Heap Corruption
Posted Nov 1, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.sah malware suffers from a heap corruption vulnerability.

tags | exploit
systems | windows
SHA-256 | 9bd7d625393c123503e2aacbba917dba574c419749f4f776de7c51f373105884
Backdoor.Win32.LanaFTP.k MVID-2021-0369 Heap Corruption
Posted Oct 18, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.LanaFTP.k malware suffers from a heap corruption vulnerability.

tags | exploit
systems | windows
SHA-256 | 5fcc42211515bab2781a60422bcf2329b80f6fb504e0d97e4296e185b79579d5
Virus.Win32.Shodi.e MVID-2021-0281 Heap Corruption
Posted Jul 5, 2021
Authored by malvuln | Site malvuln.com

Virus.Win32.Shodi.e malware suffers from a heap corruption vulnerability.

tags | exploit, virus
systems | windows
SHA-256 | e5992ed5886d827c3b902f3c357da73a453ca8caafc54ce4c28cd1746fa34680
Red Hat Security Advisory 2021-2591-01
Posted Jun 30, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2591-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include a heap corruption vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-28211
SHA-256 | 063296efe6ec4ddecef8d49f7c83574f5883cb0e1c3061e0abcb882bf3db323f
QT TIFF Processing Heap Overflow
Posted Jun 4, 2021
Authored by Google Security Research, natashenka

There is a heap corruption bug that can occur when QT processes a malformed TIFF image. It happens because the size of the QImageData backing the image is calculated is calculated using the format of the image, meanwhile TIFFReadScanline calculates the length to be read based on TIFFScanlineSize, which determines the size base on three tags in the TIFF file, width, samples per pixel and bits per sample.

tags | exploit
SHA-256 | 765990ea3bd9f2c14232bcfa3535efba165c1990d1e7949df33a649783e33d0b
Backdoor.Win32.NetSpy.10 MVID-2021-0235 Heap Corruption
Posted Jun 1, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.NetSpy.10 malware suffers from a heap corruption vulnerability.

tags | exploit
systems | windows
SHA-256 | 40b0ad730bc229a47ab2cc59e18aa1563785c0fe02e126f3084c40235157b48d
Backdoor.Win32.Agent.gmug MVID-2021-0194 Heap Corruption
Posted Apr 30, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.gmug malware suffers from a heap corruption vulnerability.

tags | exploit
systems | windows
SHA-256 | 88399c2d9a4a3ecb689286c86845703121ea80b4bbcb96466285c0b81ea351ea
Backdoor.Win32.Agent.afq MVID-2021-0190 Heap Corruption
Posted Apr 28, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.afq malware suffers from a heap corruption vulnerability.

tags | exploit
systems | windows
SHA-256 | f46ad9d6ff8413bc6b571690fc3661a3308a61b6a2b3b6ba4da2b61e6ce40019
Trojan.Win32.Cafelom.bu MVID-2021-0080 Heap Corruption
Posted Feb 9, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Cafelom.bu malware suffers from a heap corruption vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | c495636b818cd7c3b7660d9376094f54b60fc76dab0d98070462b30ed384dc61
Gnome Fonts Viewer 3.34.0 Heap Corruption
Posted Sep 11, 2020
Authored by Cody Winkler

Gnome Fonts Viewer version 3.34.0 suffers from a heap corruption vulnerability.

tags | exploit
SHA-256 | b4cad54e554bbab9f8d624efd6e9178670861a574b49852d72899b50251f5294
Microsoft Font Subsetting DLL MakeFormat12MergedGlyphList Heap Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in MakeFormat12MergedGlyphList.

tags | exploit
advisories | CVE-2019-1152
SHA-256 | 9ad072537e464902161bb1d614b4ef7d91d6dfd438e7a9b6bda50e71f2ad8176
Microsoft Font Subsetting DLL ReadAllocFormat12CharGlyphMapList Heap Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in ReadAllocFormat12CharGlyphMapList.

tags | exploit
advisories | CVE-2019-1151
SHA-256 | 13242e827b1f0a3ff93c57d1a71e5f493fc85117660e0d5e79eebecfaf18ab70
Microsoft Font Subsetting DLL ReadTableIntoStructure Heap Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in ReadTableIntoStructure.

tags | exploit
advisories | CVE-2019-1150
SHA-256 | 544427667509a091f6d7efe745438ad65a9a17d6c0bfcf266fd3e755022d8081
Microsoft Font Subsetting DLL FixSbitSubTables Heap Corruption
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Microsoft Font Subsetting DLL suffers from a heap corruption vulnerability in FixSbitSubTables.

tags | exploit
advisories | CVE-2019-1149
SHA-256 | f46d17c954f6e94d032c69f8511236395dead5379f423b21f856132b36934f44
Oracle Java Runtime Environment GlyphIterator::setCurrGlyphID Heap Corruption
Posted Apr 17, 2019
Authored by Google Security Research, mjurczyk

A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts.

tags | exploit, java
advisories | CVE-2019-2698
SHA-256 | 3c3d35dfc5426eaa61ae91b3e754f6e09c909445eb2f9484504d724fdedd1db5
Oracle Java Runtime Environment sc_FindExtrema4 Heap Corruption
Posted Apr 17, 2019
Authored by Google Security Research, mjurczyk

A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library.

tags | exploit, java
advisories | CVE-2019-2697
SHA-256 | cc1fdb072ca05f2a5b04c3cb9301fdc0fce66245b901c57e61aba6f76f5054ec
FaceTime VCPDecompressionDecodeFrame Memory Corruption
Posted Nov 6, 2018
Authored by Google Security Research, natashenka

There is a heap corruption vulnerability in VCPDecompressionDecodeFrame which is called by FaceTime. This bug can be reached if a user accepts a call from a malicious peer.

tags | exploit
advisories | CVE-2018-4366
SHA-256 | 1bd312f7b4a101fec53ac225a7f3d6e0201421a8aa365cfae0b3c2da6c90a236
WhatsApp RTP Processing Heap Corruption
Posted Oct 11, 2018
Authored by Google Security Research, natashenka

WhatsApp suffers from a heap corruption vulnerability in RTP processing.

tags | exploit
SHA-256 | e053dae6b5c926d9d1c66aa29e059009fecb9861a5a9937ccd1fa50f7ffcea53
Debian Security Advisory 4154-1
Posted Mar 28, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4154-1 - A heap corruption vulnerability was discovered in net-snmp, a suite of Simple Network Management Protocol applications, triggered when parsing the PDU prior to the authentication process. A remote, unauthenticated attacker can take advantage of this flaw to crash the snmpd process (causing a denial of service) or, potentially, execute arbitrary code with the privileges of the user running snmpd.

tags | advisory, remote, denial of service, arbitrary, protocol
systems | linux, debian
advisories | CVE-2015-5621, CVE-2018-1000116
SHA-256 | c2fdf78354d35abec9941075f6a4273bb1213ca58a281c089f7c7f2f8527420a
Microsoft MsMpEng VFS API Heap Corruption
Posted Jun 24, 2017
Authored by Tavis Ormandy, Google Security Research

The Microsoft MsMpEng mpengine x86 emulator suffers from a heap corruption vulnerability in VFS API.

tags | exploit, x86
SHA-256 | 46362a2418387131b284b6f99ffbd92b63a52b28cf6850b31bc0119ebc171b9f
Adobe Flash ATF Parser Heap Corruption
Posted Jun 24, 2017
Authored by Google Security Research, natashenka

Adobe Flash suffers from a heap corruption vulnerability in the ATF parser.

tags | exploit
advisories | CVE-2017-3078
SHA-256 | aa2b6fd4f44a098e6ecba7504988e0d89a5e75e3bc29a11c164bf7ac741679b8
Apple MacOS NSUnarchiver Heap Corruption
Posted May 24, 2017
Authored by Google Security Research, Ian Beer

Apple MacOS NSUnarchiver suffers from a heap corruption vulnerability due to lack of bounds checking in [NSBuiltinCharacterSet initWithCoder:].

tags | exploit
systems | apple
advisories | CVE-2017-2523
SHA-256 | e2849820975ba9e34e34473279ce9b4842b59d2332429f539fffbd8657173888
Adobe Flash Margin Handling Heap Corruption
Posted May 17, 2017
Authored by Google Security Research, natashenka

Adobe Flash suffers from a heap corruption vulnerability in the margin handling.

tags | exploit
advisories | CVE-2017-3061
SHA-256 | 19f24cf279fd2e72d032220c5d8428c8270508c3c25f9006996eac40ba0cc4ad
Page 1 of 4
Back1234Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close