Twenty Year Anniversary
Showing 1 - 25 of 10,639 RSS Feed

Overflow Files

GNU inetutils 1.9.4 telnet.c Overflows
Posted Dec 14, 2018
Authored by Hacker Fantastic

GNU inetutils versions 1.9.4 and below are vulnerable to a stack overflow vulnerability in the client-side environment variable handling which can be exploited to escape restricted shells on embedded devices. Most modern browsers no longer support telnet:// handlers, but in instances where URI handlers are enabled to the inetutils telnet client this issue maybe remotely triggerable. A stack-based overflow is present in the handling of environment variables when connecting telnet.c to remote telnet servers through oversized DISPLAY arguments. A heap-overflow is also present which can be triggered in a different code path due to supplying oversized environment variables during client connection code.

tags | exploit, remote, overflow, shell
MD5 | 17d3bfcc3f5ceb86b75256a45640ade5
Zortam MP3 Media Studio 24.15 Local Buffer Overflow
Posted Dec 14, 2018
Authored by Manpreet Singh Kheberi

Zortam MP3 Media Studio version 24.15 SEH local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | da9a9e7ebc4b79e3190486888ee7e704
LanSpy 2.0.1.159 Buffer Overflow
Posted Dec 12, 2018
Authored by Gionathan Reale

LanSpy version 2.0.1.159 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
MD5 | 3ac41bf9025e49e85846795af82daed6
CyberLink LabelPrint 2.5 Stack Buffer Overflow
Posted Dec 11, 2018
Authored by modpr0be, f3ci | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in CyberLink LabelPrint 2.5 and below. The vulnerability is triggered when opening a .lpp project file containing overly long string characters via open file menu. This results in overwriting a structured exception handler record and take over the application. This Metasploit module has been tested on Windows 7 (64 bit), Windows 8.1 (64 bit), and Windows 10 (64 bit).

tags | exploit, overflow
systems | windows, 7
advisories | CVE-2017-14627
MD5 | acb856f3a5d193a4fad88b2e1c8c5548
Red Hat Security Advisory 2018-3803-01
Posted Dec 11, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3803-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 71.0.3578.80. Issues addressed include buffer overflow and out of bounds write vulnerabilities.

tags | advisory, web, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2018-17480, CVE-2018-17481, CVE-2018-18335, CVE-2018-18336, CVE-2018-18337, CVE-2018-18338, CVE-2018-18339, CVE-2018-18340, CVE-2018-18341, CVE-2018-18342, CVE-2018-18343, CVE-2018-18344, CVE-2018-18345, CVE-2018-18346, CVE-2018-18347, CVE-2018-18348, CVE-2018-18349, CVE-2018-18350, CVE-2018-18351, CVE-2018-18352, CVE-2018-18353, CVE-2018-18354, CVE-2018-18355, CVE-2018-18356, CVE-2018-18357, CVE-2018-18358
MD5 | e510bdf95aba2e4d56e14cce8631390c
TRENDnet Command Injection / Buffer Overflow / Cross Site Scripting
Posted Dec 9, 2018
Authored by Mathias Payer, Hamed Okhravi, Prashast Srivastava, Howard Shrobe

TRENDnet devices suffer from buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
advisories | CVE-2018-19239, CVE-2018-19240, CVE-2018-19241, CVE-2018-19242
MD5 | 515ae13889d41a0f5bf739405ef16b9b
MiniShare 1.4.1 HEAD / POST Buffer Overflow
Posted Dec 7, 2018
Authored by Rafael Pedrero

MiniShare version 1.4.1 suffers from multiple buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability
advisories | CVE-2004-2271, CVE-2018-19861, CVE-2018-19862
MD5 | 597a47d5ba041592c6980bf8d2f57017
SQLMAP - Automatic SQL Injection Tool 1.2.12
Posted Dec 7, 2018
Authored by Bernardo Damele | Site sqlmap.sourceforge.net

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Various updates.
tags | tool, web, overflow, arbitrary, vulnerability, sql injection
systems | unix
MD5 | 431249d7af567a0c9086f93e62aa44fa
HTML5 Video Player 1.2.5 Buffer Overflow
Posted Dec 1, 2018
Authored by T3jv1l, Kagan Capar, d3ckx1 | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in HTML5 Video Player 1.2.5.

tags | exploit, overflow
MD5 | 28064e1d851cf3f4c38dc5727f0b0896
ATool 1.0.0.22 Stack Buffer Overflow
Posted Dec 1, 2018
Authored by Aloyce J. Makalanga

ATool version 1.0.0.2 suffers from a stack buffer overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2018-19650
MD5 | 175e62a0fb789b39770e9a99aaf344aa
Red Hat Security Advisory 2018-3666-01
Posted Nov 27, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3666-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include buffer overflow, denial of service, and null pointer vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2018-14633, CVE-2018-14646
MD5 | e2ca62529c03a74b642860ad9fede87e
Red Hat Security Advisory 2018-3651-01
Posted Nov 27, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3651-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, denial of service, and null pointer vulnerabilities.

tags | advisory, denial of service, overflow, kernel, vulnerability
systems | linux, redhat
advisories | CVE-2018-14633, CVE-2018-14646
MD5 | 64b13d003c3622e75f9798ff85218583
Arm Whois 3.11 Buffer Overflow
Posted Nov 26, 2018
Authored by zephyr

Arm Whois version 3.11 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | 1674361de53c2585bb62c5839ea38288
Debian Security Advisory 4343-1
Posted Nov 26, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4343-1 - It was discovered that a buffer overflow in liveMedia, a set of C++ libraries for multimedia streaming could result in the execution of arbitrary code when parsing a malformed RTSP stream.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2018-4013
MD5 | a08125685f26d25e8fd841c631aa35c9
VMware Security Advisory 2018-0030
Posted Nov 22, 2018
Authored by VMware | Site vmware.com

VMware Security Advisory 2018-0030 - VMware Workstation and Fusion updates address an integer overflow issue.

tags | advisory, overflow
advisories | CVE-2018-6983
MD5 | a36afe863a7a331ed9de526f59017e6c
Red Hat Security Advisory 2018-3643-01
Posted Nov 21, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3643-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an integer overflow vulnerability.

tags | advisory, overflow, kernel
systems | linux, redhat
advisories | CVE-2018-14634
MD5 | 6d25a3162fa4900b38136d8459c91896
HTML Video Player 1.2.5 Buffer Overflow
Posted Nov 17, 2018
Authored by Kagan Capar

HTML Video Player version 1.2.5 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | ab18abd61ba3a76adf1d443b98ca02f5
Asterisk Project Security Advisory - AST-2018-010
Posted Nov 15, 2018
Authored by Jan Hoffmann | Site asterisk.org

Asterisk Project Security Advisory - There is a buffer overflow vulnerability in dns_srv and dns_naptr functions of Asterisk that allows an attacker to crash Asterisk via a specially crafted DNS SRV or NAPTR response. The attacker's request causes Asterisk to segfault and crash.

tags | advisory, overflow
advisories | CVE-2018-17281
MD5 | 6aca45f3b7b194469327386eabbfe453
Ubuntu Security Notice USN-3821-1
Posted Nov 15, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3821-1 - Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly ensure that xattr information remained in inode bodies. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service. It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service, overflow, kernel, local
systems | linux, ubuntu
advisories | CVE-2018-10880, CVE-2018-13053, CVE-2018-13096, CVE-2018-14609, CVE-2018-14617, CVE-2018-17972, CVE-2018-18021
MD5 | a90659bad625eafc560423ef26975554
Red Hat Security Advisory 2018-3591-01
Posted Nov 14, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3591-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include an integer overflow vulnerability.

tags | advisory, overflow, kernel
systems | linux, redhat
advisories | CVE-2017-18344, CVE-2018-14634
MD5 | 4cf33ed3b32c329de89d3cc482fad8e0
Red Hat Security Advisory 2018-3558-01
Posted Nov 13, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3558-01 - The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module. Issues addressed include buffer overflow, bypass, denial of service, heap overflow, null pointer, out of bounds write, and use-after-free vulnerabilities.

tags | advisory, web, denial of service, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-7141, CVE-2016-7167, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625, CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000254, CVE-2017-1000257, CVE-2017-15710, CVE-2017-15715, CVE-2017-7407, CVE-2017-8816, CVE-2017-8817, CVE-2018-1000007
MD5 | 516f51a00fc5765270c849817fc3f4b4
XAMPP Control Panel 3.2.2 Buffer Overflow
Posted Nov 13, 2018
Authored by Gionathan Reale, Semen Alexandrovich Lyhin

XAMPP Control Panel version 3.2.2 SEH unicode buffer overflow exploit.

tags | exploit, overflow
MD5 | fc81a31ec51873be9f0185f023efc416
Debian Security Advisory 4338-1
Posted Nov 12, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4338-1 - Integer overflows in the processing of packets in network cards emulated by QEMU, a fast processor emulator, could result in denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2018-10839, CVE-2018-17962, CVE-2018-17963
MD5 | 15d509051fcf2fb66ea41acb025d14f0
Red Hat Security Advisory 2018-3531-01
Posted Nov 9, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3531-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.3.0. Issues addressed include an integer overflow vulnerability.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-12389, CVE-2018-12390, CVE-2018-12392, CVE-2018-12393
MD5 | 843de559af4fe7852cc002b06f9d059c
Red Hat Security Advisory 2018-3532-01
Posted Nov 9, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-3532-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 60.3.0. Issues addressed include an integer overflow.

tags | advisory, overflow
systems | linux, redhat
advisories | CVE-2018-12389, CVE-2018-12390, CVE-2018-12392, CVE-2018-12393
MD5 | d22c03b447c8e30dc1b1e1f825b1a72a
Page 1 of 426
Back12345Next

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    15 Files
  • 11
    Dec 11th
    30 Files
  • 12
    Dec 12th
    25 Files
  • 13
    Dec 13th
    15 Files
  • 14
    Dec 14th
    14 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close