the original cloud security
Showing 1 - 25 of 100 RSS Feed

Files

OpenOffice DOC Memory Corruption
Posted Jul 26, 2013
Authored by Jeremy Brown

Apache OpenOffice suffers from a vulnerability that is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file. Specially crafted documents can be used for denial-of-service attacks. Further exploits are possible but have not been verified. Versions affected include Apache OpenOffice 3.4.0 to 3.4.1 on all platforms.

tags | advisory
advisories | CVE-2013-2189
MD5 | 5ff23bea25fe066db860831c72f1dc8a

Related Files

Apache OpenOffice Text Document Malicious Macro Execution
Posted Feb 10, 2017
Authored by sinn3r | Site metasploit.com

This Metasploit module generates an Apache OpenOffice Text Document with a malicious macro in it. To exploit successfully, the targeted user must adjust the security level in Macro Security to either Medium or Low. If set to Medium, a prompt is presented to the user to enable or disable the macro. If set to Low, the macro can automatically run without any warning. The module also works against LibreOffice.

tags | exploit
MD5 | 79e465107cfd91f5c5020df4f837616e
Apache OpenOffice 1.0 Windows Installer Trojan Execution
Posted Nov 26, 2016
Authored by Cyril Vallicari

The Apache OpenOffice installer for Windows contained a defective operation that could trigger execution of unwanted software installed by a Trojan Horse application. The installer defect is known as an unquoted Windows search path vulnerability. In the case of Apache OpenOffice installers for Windows, the PC must have previously been infected by a Trojan Horse application (or user) running with administrator privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit. The exploit may already have operated on the user's PC.

tags | advisory, trojan
systems | windows
advisories | CVE-2016-6803
MD5 | 7705d5ab1a4089c1df13600a4048d119
Apache OpenOffice 4.1.2 Privilege Escalation
Posted Oct 25, 2016
Authored by Stefan Kanthak, Himanshu Mehta

The Apache OpenOffice installer for Windows contained a defective operation that allows execution of arbitrary code with elevated privileges. All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2016-6804
MD5 | 389fdee23e63ed75ffd3a23a4c7a561b
OpenOffice Targeted Data Exposure Using Crafted OLE Objects
Posted Aug 22, 2014

OpenOffice suffers from a targeted data exposure vulnerability that can be performed using crafted OLE objects. Apache OpenOffice versions 4.1.0 and older on Windows and OpenOffice versions may be affected.

tags | advisory
systems | windows
advisories | CVE-2014-3575
MD5 | 68325aeba2d703ca798fa807a5da5659
OpenOffice 4.1.0 Calc Command Injection
Posted Aug 22, 2014
Authored by James Kettle, Rohan Durve

Apache OpenOffice versions 4.1.0 and below on Windows suffers from a command injection vulnerability when loading calc spreadsheets. OpenOffice.org versions may also be affected.

tags | advisory
systems | windows
advisories | CVE-2014-3524
MD5 | 52153d0f9b6f03f458e36fc45c3685c0
Apache OpenOffice 3.4.0 Logic Errors
Posted Aug 29, 2012
Authored by Timo Warns | Site openoffice.org

When OpenOffice reads an ODF document, it first loads and processes an XML stream within the file called the manifest. Apache OpenOffice 3.4.0 has logic errors that allows a carefully crafted manifest to cause reads and writes beyond allocated buffers.

tags | advisory
advisories | CVE-2012-2665
MD5 | 4a1eecc2fd43210f99fc9fdafd3fd83f
LibreOffice / OpenOffice Code Execution
Posted Aug 10, 2012
Authored by Timo Warns | Site pre-cert.de

LibreOffice versions prior to 3.5.5 and Apache OpenOffice versions 3.4.0 and below suffer from a code execution vulnerability.

tags | advisory, code execution
advisories | CVE-2012-2665
MD5 | c6aa2fe07674cc81309e02117c4c0ffd
OpenOffice.org vclmi.dll Integer Overflow
Posted May 16, 2012
Authored by TieLei Wang

A vulnerability is caused due to an integer overflow error in the vclmi.dll module when allocating memory for an embedded image object. This can be exploited to cause a heap-based buffer overflow via, for example using a specially crafted JPEG object within a DOC file. OpenOffice.org 3.3.0 and 3.4 beta users are advised to upgrade to Apache OpenOffice 3.4. Users who are unable to upgrade immediately should be cautious when opening untrusted documents.

tags | advisory, overflow
advisories | CVE-2012-1149
MD5 | 0d853304d9491d0cb7d8fb6c76e96fe2
Apache Archiva 1.3.3 Cross Site Scripting
Posted Feb 16, 2011
Authored by Brett Porter | Site archiva.apache.org

A request that included a specially crafted request parameter could be used to inject arbitrary HTML or Javascript into the Apache Archiva user management page. Versions 1.3.3 and earlier are affected.

tags | advisory, arbitrary, javascript
advisories | CVE-2011-0533
MD5 | 5c36aceb17edc3187785dac6f101face
Apache Continuum Cross Site Request Forgery
Posted Feb 10, 2011
Authored by Brett Porter | Site continuum.apache.org

Apache Continuum versions 1.3.6 and 1.4.0 Beta suffer from a cross site request forgery vulnerability. Earlier unsupported versions are also vulnerable.

tags | advisory, csrf
advisories | CVE-2010-3449
MD5 | 2bd9d355e5cecdbba70d5b3f29382f8d
Apache Continuum Cross Site Scripting
Posted Feb 10, 2011
Authored by Brett Porter | Site continuum.apache.org

A request that included a specially crafted request parameter could be used to inject arbitrary HTML or Javascript into Continuum project pages. Versions 1.3.6 and 1.4.0 Beta are affected along with unsupported, older revs.

tags | advisory, arbitrary, javascript
advisories | CVE-2011-0533
MD5 | 09e317e35e26263a626c5d31513d7a74
Apache Tomcat Denial Of Service
Posted Feb 5, 2011
Authored by Mark Thomas | Site tomcat.apache.org

Tomcat did not enforce the maxHttpHeaderSize limit while parsing the request line in the NIO HTTP connector. A specially crafted request could trigger an DoS via an OutOfMemoryError. Versions 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 are affected.

tags | advisory, web
advisories | CVE-2011-0534
MD5 | cf333be8a534d8e8100eaef2213d881e
Apache Tomcat Local Bypass
Posted Feb 5, 2011
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat suffers from a local bypass a of Security Manager file permissions. Versions from 7.0.0, 6.0.0 and 5.5.0 are affected.

tags | advisory, local
advisories | CVE-2010-3718
MD5 | 107b271fcf16f33e14987e888121d6d1
Apache CouchDB Cross Site Scripting
Posted Jan 31, 2011
Authored by Jan Lehnardt | Site couchdb.apache.org

Apache CouchDB versions 0.8.0 through 1.0.1 suffer from a cross site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2010-3854
MD5 | d0d3d927bcc86a3954a1f823c24627bf
CVE Checker 2.0
Posted Dec 2, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release includes the ability to scan changed/added files rather than the entire system, a command that helps to generate version matching rules, and a new switch to report vulnerabilities of software versions that are higher than the software versions you have on your system.
tags | vulnerability
systems | unix
MD5 | 1d52797e80a5c7ec547f421f3d9f0209
Apache Tomcat Manager Cross Site Scripting
Posted Nov 23, 2010
Authored by Mark Thomas | Site tomcat.apache.org

The session list screen (provided by sessionList.jsp) in affected versions of Apache Tomcat Manager uses the orderBy and sort request parameters without applying filtering and therefore is vulnerable to a cross-site scripting attack. Versions 7.0.0 through 7.0.4 and 6.0.12 through 6.0.29 are affected.

tags | advisory, xss
advisories | CVE-2010-4172
MD5 | 315a8036e67802e9c0704e15dd03fd12
CVE Checker 1.0
Posted Oct 4, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: A few small error handling and buffer overflow problems were fixed.
tags | vulnerability
systems | unix
MD5 | f065dac607eb7ef7f7554bc74ad09efb
Linux Kernel pktcdvd Kernel Memory Disclosure
Posted Sep 29, 2010
Authored by Jon Oberheide

Linux kernel versions prior to 2.6.36-rc6 pktcdvd kernel memory disclosure exploit.

tags | exploit, kernel
systems | linux
advisories | CVE-2010-3437
MD5 | bd262a32a99c96cc365a054ad47cdf65
CVE Checker 0.6
Posted Sep 11, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Reporting performance was improved tremendously for recent SQLite libraries. Reporting on found software, regardless of it matching a CVE entry, was added, and quite a few bugs were fixed.
tags | vulnerability
systems | unix
MD5 | 0e7c5d0504b2ddc2e069ee1d3e0b7edd
CVE Checker 0.5
Posted Sep 3, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: The tool should now build properly on NetBSD and FreeBSD (although more user experience here is still welcome). This release introduces a cvereport command (example output can be found at the project site), and has lowered its initial dependency requirements. pullcves now only loads the CVE XML changes in the database, rather than iterating across all CVE XML entries.
tags | vulnerability
systems | unix
MD5 | d6c5e5538ebcc6e87a24a1ff70d38942
CVE Checker 0.4
Posted Aug 26, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release includes internal project files reorganization (more to the liking of the GNU autoconf/automake standards), fixes a database leak bug, and introduces a slightly more intelligent pullcves command (with multiple return code behavior to improve automation efforts). All documentation has been updated, and a pullcves manual page has been added.
tags | vulnerability
systems | unix
MD5 | 83ec8494760832e1e391601aa0a612e7
CVE Checker 0.3
Posted Aug 21, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: Cleanups in the CSV output have been made, and a few sample reporting files have been added. This release fixes a few bugs in file matching support and adds --no-check-certificates to the wget command.
tags | vulnerability
systems | unix
MD5 | 1de655f957214c0c9da92df1fadce655
Apache CouchDB Cross Site Request Forgery
Posted Aug 17, 2010
Authored by Jan Lehnardt | Site couchdb.apache.org

Apache CouchDB versions prior to version 0.11.1 are vulnerable to cross site request forgery (CSRF) attacks. A malicious website can POST arbitrary JavaScript code to well known CouchDB installation URLs (like http://localhost:5984/) and make the browser execute the injected JavaScript in the security context of CouchDB's admin interface Futon.

tags | advisory, web, arbitrary, javascript, csrf
MD5 | 65d8869788216e6c830f5184962e2e09
CVE Checker 0.2
Posted Aug 17, 2010
Authored by Sven Vermeulen | Site cvechecker.sourceforge.net

cvechecker reports about possible vulnerabilities on your system by scanning the installed software and matching the results with the CVE database. This is not a bullet-proof method and you will most likely have many false positives, but it is still better than nothing, especially if you are running a distribution with little security coverage.

Changes: This release fixes ./configure to fail when sqlite3 or libconfig isn\'t present. It fixes make to support make install. It fixes compiler warnings on size_t usage.
tags | vulnerability
systems | unix
MD5 | 10d25a36b8ae26465de794551a8fd3c8
Apache Tomcat Remote Denial Of Service / Information Disclosure
Posted Jul 10, 2010
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat suffers from denial of service and information disclosure vulnerabilities. Versions 5.5.0 through 5.5.29, 6.0.0 through 6.0.27 and 7.0.0 are affected.

tags | advisory, denial of service, vulnerability, info disclosure
advisories | CVE-2010-2227
MD5 | c6c324200350deaf9fdba926a4f1be01
Page 1 of 4
Back1234Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close