Category Archives: Checkpoint

Checkpoint

Repetitive POP3 Login Failures

An attacker may attempt to gain access to email accounts by repeatedly trying to log in using various passwords, eventually finding the correct one, a technique known as “Brute Force”. Successful exploitation may result in an unauthorized access to an email account.

SAP SQL Anywhere .NET Data Provider Column Alias Buffer Overflow (CVE-2014-9264)

A buffer overflow vulnerability exists in SAP SQL Anywhere .NET Data Provider. The vulnerability is caused by insufficient boundary checks in the handling of column aliases. If an application allows untrusted input to be used as the column alias in an SQL query, by sending crafted requests to the application, an attacker can overflow a stack-based buffer. A successful attack will result in arbitrary code execution in the context of the application.

Sweet Orange Exploit Kit Landing Page

Sweet Orange exploit kit is a web exploit kit that operates by delivering malicious payload to the victim’s computer. Remote attackers can infect users with Sweet Orange exploit kit by enticing them to visit a malicious web page. Successful infection will allow the attacker to perform Remote Code Execution on the victim’s computer.