what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

SharePoint DataSet / DataTable Deserialization
Posted Jul 31, 2020
Authored by Soroush Dalili, mr_me, Spencer McIntyre | Site metasploit.com

A remotely exploitable vulnerability exists within SharePoint that can be leveraged by a remote authenticated attacker to execute code within the context of the SharePoint application service. The privileges in this execution context are determined by the account that is specified when SharePoint is installed and configured. The vulnerability is related to a failure to validate the source of XML input data, leading to an unsafe deserialization operation that can be triggered from a page that initializes either the ContactLinksSuggestionsMicroView type or a derivative of it. In a default configuration, a Domain User account is sufficient to access SharePoint and exploit this vulnerability.

tags | exploit, remote
advisories | CVE-2020-1147
MD5 | 1951b8a6649841f289b9e4feb3f9e3b0

Related Files

Asterisk Project Security Advisory - AST-2012-007
Posted May 29, 2012
Authored by Richard Mudgett | Site asterisk.org

Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the IAX2 channel driver if an established call is placed on hold without a suggested music class.

tags | advisory
advisories | CVE-2012-2947
MD5 | b42ab63005025daa63e9cb6fd1a5db15
Asterisk Project Security Advisory - AST-2012-006
Posted Apr 23, 2012
Authored by Matt Jordan | Site asterisk.org

Asterisk Project Security Advisory - A remotely exploitable crash vulnerability exists in the SIP channel driver if a SIP UPDATE request is processed within a particular window of time.

tags | advisory
MD5 | 32e74fe214613d789749549a4bf27817
Procyon Core Server 1.06 Code Execution
Posted Oct 13, 2011
Authored by Knud | Site nsense.fi

nSense Vulnerability Research Security Advisory - The coreservice.exe process in Procyon core server versions 1.06 and below contains a remotely exploitable memory corruption flaw which allows for remote code execution. The affected component is coreservice.exe, which listens on port 23, running as SYSTEM. Sending a long string will trigger the overflow.

tags | advisory, remote, overflow, code execution
MD5 | 7862be1d876807d2610afc63f38d61f6
Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
Posted Apr 16, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A remotely exploitable vulnerability has been discovered in Adobe Acrobat Reader for Linux. Specifically, the vulnerability is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block, which may lead to a heap based buffer overflow and execution of arbitrary code. Adobe Systems Acrobat Reader versions 8.1.6, 9.2 and 9.3 for Linux are all affected.

tags | advisory, overflow, arbitrary
systems | linux
advisories | CVE-2010-0196
MD5 | afd50cb6d98b9c555824913d145bfd18
Motorola Milestone (Droid) Smartphone Denial Of Service
Posted Feb 8, 2010
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

A remotely exploitable vulnerability has been found in the JavaScript Engine of the MobileSafari Browser(based on Webkit Engine) used on the Motorola Milestone(droid) smartphone. Proof of concept code included.

tags | exploit, javascript, proof of concept
MD5 | db4037dc53ce2046e2b0b7e88971bc02
Apple Safari 4.0.4 Denial Of Service
Posted Feb 5, 2010
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

A remotely exploitable denial of service vulnerability has been found in the JavaScript Engine of the Apple Safari Browser (based on Webkit Engine). Versions 4.0.4 and below are affected.

tags | exploit, denial of service, javascript
systems | apple
MD5 | a2d703466bd6c7e58b572371698bdb82
Debian Linux Security Advisory 1970-1
Posted Jan 14, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1970-1 - It was discovered that a significant memory leak could occur in openssl, related to the reinitialization of zlib. This could result in a remotely exploitable denial of service vulnerability when using the Apache httpd server in a configuration where mod_ssl, mod_php5, and the php5-curl extension are loaded.

tags | advisory, denial of service, memory leak
systems | linux, debian
advisories | CVE-2009-4355
MD5 | 8d1a271bb5317cdc26ad5321030a05a4
ACDSee XBM File Buffer Overflow
Posted Jan 9, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A remotely exploitable vulnerability has been discovered in multiple ACDSee Systems products. Specifically, the vulnerability is due to a boundary errorwhen processing XBM image files and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with the privileges of the logged-on user.

tags | advisory, overflow, arbitrary
MD5 | 2758665ec021f8418e7ce696848fe0c0
Mercur v5.0 IMAP SP3 SELECT Buffer Overflow
Posted Nov 26, 2009
Authored by Jacopo Cervini | Site metasploit.com

Mercur v5.0 IMAP server is prone to a remotely exploitable stack-based buffer overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer. Credit to Tim Taylor for discover the vulnerability.

tags | exploit, overflow, imap
advisories | CVE-2006-1255
MD5 | 6dd73139a26090ff81c7d73873e5ada8
Core Security Technologies Advisory 2009.1027
Posted Nov 19, 2009
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - A remotely exploitable vulnerability was found in the database server core component of IBM SolidDB. Exploitation of this bug does not require authentication and will lead to a remotely triggered denial of service of the database service.

tags | exploit, denial of service
advisories | CVE-2009-3840
MD5 | 9820dbf2ebbf27080352d447cbbac752
Core Security Technologies Advisory 2009.0814
Posted Nov 18, 2009
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - HP Openview Network Node Manager is one of the most widely-deployed network monitoring and management platforms used throughout enterprise organizations today. The platform includes many server and client-side core components with a long list of previously disclosed security bugs. In this case, a remotely exploitable vulnerability was found in the database server core component used by NNM. Exploitation of the bug does not require authentication and will lead to a remotely triggered denial of service of the internal database service. HP Openview NNM version 7.53 is affected.

tags | exploit, denial of service
advisories | CVE-2009-3840
MD5 | 478db223a44f2e0af69ed0e378911abb
Adobe Acrobat Code Execution
Posted Oct 17, 2009
Authored by Alexios Fakos | Site nruns.com

A remotely exploitable vulnerability has been found in Adobe Acrobat Reader/Acrobat Firefox plugin. Versions 8.1.3 through 8.1.6 are affected.

tags | advisory
advisories | CVE-2009-2991
MD5 | 7f6056a9b0301dd6a64ac4de6621da59
Gentoo Linux Security Advisory 200909-13
Posted Sep 15, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200909-13 - A remotely exploitable off-by-one error leading to a heap overflow was found in irssi which might result in the execution of arbitrary code. Nemo discovered an off-by-one error leading to a heap overflow in irssi's event_wallops() parsing function. Versions less than 0.8.13-r1 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2009-1959
MD5 | f3098506842a6773cd78766e370ee869
Core Security Technologies Advisory 2009.0519
Posted Jul 8, 2009
Authored by Core Security Technologies, Diego Juarez | Site coresecurity.com

Core Security Technologies Advisory - Awakening's Winds3D Viewer, which runs as a plugin within most popular web browsers, is vulnerable to a remotely exploitable arbitrary command execution vulnerability which can be triggered by making the user visit a malicious link/website. Versions 3.5.0.0 and 3.0.0.5 are vulnerable.

tags | exploit, web, arbitrary
advisories | CVE-2009-2386
MD5 | dd8314606e5d9fe5e80ed6775b92d050
CFNetwork Heap Buffer Overflow
Posted May 15, 2009
Authored by Moritz Jodeit | Site nruns.com

A remotely exploitable vulnerability has been found in the HTTP header parsing code of the CFNetwork framework.

tags | advisory, web
advisories | CVE-2009-0157
MD5 | 4de6a44438fd53b33ceb6be7fa654bc9
IBM Tivoli Storage Manager Express Backup Heap Corruption
Posted Mar 11, 2009
Site assurent.com

A remotely exploitable vulnerability has been discovered in the backup service of IBM Tivoli Storage Manager server. Specifically, the vulnerability is due to improper memory handling when processing incoming client requests and can lead to heap corruption. This vulnerability can allow attackers to inject and execute arbitrary code on the target host with System or root privileges. The vulnerability has been confirmed in IBM Tivoli Storage Manager Express version 5.3.7.3.

tags | advisory, arbitrary, root
MD5 | 2094edaa2fa060134d2079a92af38c43
Novell eDirectory Accept-Language Buffer Overflow
Posted Mar 2, 2009
Site assurent.com

A remotely exploitable vulnerability has been discovered in the iMonitor component of Novell eDirectory. Specifically, the vulnerability is due to a boundary error when processing incoming HTTP requests and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with System or root privileges.

tags | advisory, web, overflow, arbitrary, root
MD5 | 6418c476a05d50529756334987fe121f
Oracle BEA WebLogic Server Apache Connector Buffer Overflow
Posted Jan 14, 2009
Site assurent.com

A remotely exploitable vulnerability has been discovered in the Apache Connector component of Oracle BEA WebLogic Server. Specifically, the vulnerability is due to a boundary error when processing incoming HTTP requests and can lead to a buffer overflow condition. This boundary error can lead to a Denial of Service (DoS) condition for the Apache HTTP server.

tags | advisory, web, denial of service, overflow
advisories | CVE-2008-5457
MD5 | 0f11a669cbc616f2cd6788c5253e45da
Pardus Linux Security Advisory 2008.67
Posted Nov 8, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory 2008-67 - A remotely exploitable heap-based buffer overflow exists in libcaudio versions prior to 0.99.12-2-2.

tags | advisory, overflow
systems | linux
MD5 | f7fc3b93688550b2623694dbb2e42a56
n.runs-SA-2008.004.txt
Posted Jul 29, 2008
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been found in the files parsing engine of AVG Anti-Virus that allows for a denial of service condition.

tags | advisory, denial of service, virus
MD5 | 14a4381a4f525e9d0c3a8d567a16d1c7
n.runs-SA-2007.027.txt
Posted Aug 25, 2007
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been discovered in the file parsing engine of Sophos AntiVirus versions prior to 2.48.0. The bug exists during the file parsing of UPX packed files.

tags | advisory
MD5 | b0835afbe5caf8f5efb6789787aef3df
n.runs-SA-2007.026.txt
Posted Aug 25, 2007
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been discovered in the file parsing engine of Sophos AntiVirus versions prior to 2.48.0. The bug exists during the file parsing of GZIP packed files.

tags | advisory
MD5 | 6d3d292b053123433e13560f96dea207
ASA-2007-019.txt
Posted Aug 8, 2007
Authored by Wei Wang, Jason Parker | Site asterisk.org

Asterisk Project Security Advisory - The Asterisk Skinny channel driver, chan_skinny, has a remotely exploitable crash vulnerability. A segfault can occur when Asterisk receives a "CAPABILITIES_RES_MESSAGE" packet where the capabilities count is greater than the total number of items in the capabilities_res_message array. Note that this requires an authenticated session.

tags | advisory
MD5 | e798ca193e72739ce8e5faa034a34d2a
ASA-2007-017.txt
Posted Jul 18, 2007
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - The Asterisk STUN implementation in the RTP stack has a remotely exploitable crash vulnerability. A pointer may run past accessible memory if Asterisk receives a specially crafted STUN packet on an active RTP port. The code that parses the incoming STUN packets incorrectly checks that the length indicated in the STUN attribute and the size of the STUN attribute header does not exceed the available data. This will cause the data pointer to run past accessible memory and when accessed will cause a crash.

tags | advisory
advisories | CVE-2007-3765
MD5 | 7406ca12249f52e17bf976b8271095c2
ASA-2007-016.txt
Posted Jul 18, 2007
Authored by Jason Parker | Site asterisk.org

Asterisk Project Security Advisory - The Asterisk Skinny channel driver, chan_skinny, has a remotely exploitable crash vulnerability. A segfault can occur when Asterisk receives a packet where the claimed length of the data is between 0 and 3, followed by length + 4 or more bytes, due to an overly large memcpy. The side effects of this extremely large memcpy have not been investigated.

tags | advisory
advisories | CVE-2007-3764
MD5 | 7910ebeb465f0d124f401f0746e0426b
Page 1 of 4
Back1234Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    0 Files
  • 2
    Aug 2nd
    0 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close