DiskBoss Enterprise 8.4.16 - Local Buffer Overflow
EDB-ID: 42951Author: C4t0ps1sPublished: 2017-10-03CVE: N/A Type: LocalPlatform: WindowsVulnerable App:...
View ArticleClipBucket 2.8.3 - Remote Code Execution
EDB-ID: 42954Author: Meisam MonsefPublished: 2017-10-04CVE: N/A Type: WebappsPlatform: PHPVulnerable App: N/A # Date: 2017-10-04 # Exploit Author: Esecurity.ir # Vendor Homepage:...
View ArticleApache Zookeeper CVE-2017-5637 Denial of Service Vulnerability
Apache Zookeeper is prone to a denial-of-service vulnerability. Attackers may leverage this issue to cause denial-of-service conditions. Apache Zookeeper 3.4.0, 3.5.1, 3.5.2 are vulnerable....
View ArticleOCaml CVE-2015-8869 Multiple Security Vulnerabilities
OCaml is prone to the following vulnerabilities: 1. A buffer-overflow vulnerability 2. A information disclosure vulnerability Successfully exploiting these issues may allow an attacker to execute...
View ArticleWebKit JSC Incorrect Optimization
A proof of concept has been released that bypasses the fix for the original finding regarding an incorrect optimization in BytecodeGenerator::emitGetByVal in WebKit JSC.MD5 |...
View Articlee2openplugin OpenWebif 1.2.4 Code Execution
e2openplugin OpenWebif versions 0.2.9 through 1.2.4 suffer from a code execution vulnerability.MD5 | e3b736333b9d373249b51af3bd173ccfDownloadHello all,e2openplugin-OpenWebif is an open source web...
View ArticleWordPress Smush Image 2.7.4.1 Directory Traversal
WordPress Smush Image plugin version 2.7.4.1 suffers from a directory traversal vulnerability.MD5 | 74031598272cf1973422350b4130cab0DownloadClass File transversalRemote YesCredit Ricardo SanchezSmush...
View ArticleNetgear ReadyNAS Surveillance 1.4.3-16 Remote Command Execution
Netgear ReadyNAS Surveillance version 1.4.3-16 suffers from a remote command execution vulnerability.MD5 | f5b04fcd738b0b833d61f1bc22f69ffcDownload# Exploit Netgear ReadyNAS Surveillance 1.4.3-16...
View ArticleMozilla Firefox and Firefox ESR CVE-2017-7824 Buffer Overflow Vulnerability
Mozilla Firefox and Firefox ESR are prone to a buffer-overflow vulnerability because they fail to perform adequate boundary-checks on user supplied data. An attacker can exploit this issue to crash...
View ArticleWebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (2)
EDB-ID: 42955Author: Google Security ResearchPublished: 2017-10-04CVE: CVE-2017-7117 Type: DosPlatform: MultipleAliases: N/AAdvisory/Source: LinkTags: N/AVulnerable App: N/A Source:...
View ArticleGhostscript GhostXPS CVE-2017-9739 Heap Buffer Overflow Vulnerability
Ghostscript GhostXPS is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. An...
View ArticleGhostscript GhostXPS CVE-2017-9727 Denial of Service Vulnerability
Ghostscript GhostXPS is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Due to the nature of this...
View ArticleGhostscript GhostXPS CVE-2017-9612 Heap Buffer Overflow Vulnerability
Ghostscript GhostXPS is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it into an insufficiently sized buffer. An...
View ArticleGhostscript GhostXPS CVE-2017-9726 Denial of Service Vulnerability
Ghostscript GhostXPS is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service condition. Artifex Ghostscript GhostXPS 9.22 is vulnerable; other...
View ArticleAdobe Flash Player and AIR Multiple Unspecified Memory Corruption...
Adobe Flash Player and AIR are prone to multiple unspecified memory-corruption vulnerabilities. An attacker can exploit these issues to execute arbitrary code in the context of the user running the...
View ArticleAdobe Flash Player and AIR CVE-2015-3105 Unspecified Memory Corruption...
Adobe Flash Player and AIR are prone to an unspecified memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected...
View ArticleAdobe Flash Player CVE-2015-3113 Unspecified Heap Buffer Overflow Vulnerability
Adobe Flash Player is prone to an unspecified heap-based buffer-overflow vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the application. Failed...
View ArticleAdobe Flash Player and AIR CVE-2015-3104 Remote Integer Overflow Vulnerability
Adobe Flash Player and AIR are prone to an unspecified integer-overflow vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected...
View ArticleMicrosoft Windows GDI+ CVE-2015-1671 TrueType Font Handling Remote Code...
Microsoft Windows GDI+ is prone to a remote code-execution vulnerability. Successful exploits can allow attackers to execute arbitrary code with kernel-level privileges. Failed exploit attempts may...
View ArticleERS Data System 1.8.1 Java Deserialization
ERS Data System version 1.8.1 suffers from a java deserialization vulnerability.MD5 | 46d79529e7effccfc09cc535628d06f4Download# Exploit Title: ERS Data System 1.8.1 Deserialize Vulnerability# Google...
View Article