The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 holds a memory corruption vulnerability that allows the bypassing of "dataOffsets[]" boundary checks. This module exploits such vulnerability allowing for remote code execution.
The vulnerability is caused due to a boundary error within Mini HTTPD when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. Arbitrary code can be directly executed by overwriting a return address. This update only adds CVE Number.
This module exploits a vulnerability in "win32k.sys" by calling to the "TrackPopupMenuEx" function.
This update adds support to Windows 7 64 bits and Windows 2008 R2.
This update adds support to Windows 7 64 bits and Windows 2008 R2.
A heap overflow in the ActiveX control qp2.cab in IBM Lotus Quickr for Domino allows remote attackers to execute arbitrary code via a crafted argument to the Attachment_Names method.
The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.
This update adds support for Mac OS X 10.7.4 (i386).
This update adds support for Mac OS X 10.7.4 (i386).
Aloaha PDF Suite is prone to a security vulnerability when processing PDF files. This vulnerability could be exploited by a remote attacker to execute arbitrary code on the target machine by enticing Aloaha users to open a specially crafted PDF file.
The DefaultActionMapper class in Apache Struts2 supports a method for short-circuit navigation state changes by prefixing parameters with "action:" or "redirect:". The information contained in these prefixes is not properly sanitized before being evaluated as OGNL expressions on the server side, which allows remote attackers to execute arbitrary Java code on the server.
This module exploits the vulnerability in any web application built on top of vulnerable versions of the Apache Struts 2 framework.
This module exploits the vulnerability in any web application built on top of vulnerable versions of the Apache Struts 2 framework.
This module exploits a vulnerability in srv2.sys via a SMB 2 malformed packet.
This Update adds support for attacking over IPv6 and additional support for Windows Server 2008
This Update adds support for attacking over IPv6 and additional support for Windows Server 2008
This module exploits a TinyWebGallery local file-include vulnerability because TinyWebGallery fails to properly sanitize user-supplied input. The module takes advantage of the logging capabilities of the attacked software to remotely execute arbitrary code.
This update fixes some issues related with an updated library.
Support for various platforms was added.
This update fixes some issues related with an updated library.
Support for various platforms was added.
This module exploits a vulnerability in "win32k.sys" by calling to the "TrackPopupMenuEx" function.
Pagination
- Previous page
- Page 83
- Next page