Category Archives: Checkpoint

Checkpoint

Repetitive SMTP Login Failures

An attacker may attempt to gain access to email accounts by repeatedly trying to log in using various passwords, eventually finding the correct one, a technique known as “Brute Force”. Successful exploitation may result in an unauthorized access to an email account.

SAP SQL Anywhere .NET Data Provider Column Alias Buffer Overflow (CVE-2014-9264)

A buffer overflow vulnerability exists in SAP SQL Anywhere .NET Data Provider. The vulnerability is caused by insufficient boundary checks in the handling of column aliases. If an application allows untrusted input to be used as the column alias in an SQL query, by sending crafted requests to the application, an attacker can overflow a stack-based buffer. A successful attack will result in arbitrary code execution in the context of the application.