A stack-based buffer overflow exists in Audiotran 1.4.1. A remote attacker could trigger this vulnerability by enticing a victim to open a crafted file. Successful exploitation would allow remote attackers to execute arbitrary code via a long string in a playlist (.pls) file.
Category Archives: Checkpoint
Checkpoint
Altap Salamander 2.5 PE Viewer Buffer Overflow (CVE-2007-3314)
A buffer overflow exists in Altap Salamander. A remote attacker could trigger this vulnerability by creating a malicious file and convincing a user to view the file with the Portable Executable Viewer plugin within a vulnerable version of Salamander. Successful exploitation would allows remote attackers to execute arbitrary code via the PDB file.
Beetel Connection Manager Buffer Overflow
A stack-based buffer overflow vulnerability exists in Beetel Connection Manager. The vulnerability is due to improper parsing of parameters in the NetConfig.ini file. A remote attacker could exploit this vulnerability by enticing a user to use a crafted NetConfig.ini file.
F5 Big-IP TLS Information Disclosure (Ticketbleed; CVE-2016-9244)
An information disclosure vulnerability has been reported in F5 Big-IP TLS products. An attacker can leverage this vulnerability to disclose memory contents of a connected server.
UltraISO CUE File Parsing Buffer Overflow (CVE-2007-2888)
A stack-based buffer overflow exists in UltraISO. The vulnerability is due to lack of bounds validation which might lead to a buffer overflow. A remote attacker can execute arbitrary code by enticing a victim to open a CUE crafted file.
VUPlayer CUE File Buffer Overflow
A stack overflow exists in VUPlayer. The vulnerability is due to improper boundary checking of user-supplied input when processing CUE files. By enticing a victim to open a malicious CUE file, a remote attacker could execute arbitrary code on the affected system.
Suspicious Malvertising Redirection
Campaigns of malvertising, redirecting to malicious web pages, have been identified. Successful exploitation could result in remote code execution on the target system once the malicious page is loaded.
Microsoft Windows gdi32.dll Out Of Bounds Reads Information Disclosure (CVE-2017-0038)
An information disclosure vulnerability exists in Microsoft Windows gdi32.dll. A remote attacker can exploit this vulnerability by sending the target user a malicious file. Successful exploitation could result in an out-of-bounds read and access to private user data.
Adobe Flash Player Use After Free Code Execution (APSB17-04: CVE-2017-2993)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.
Adobe Flash Player Use After Free Code Execution (APSB17-04: CVE-2017-2994)
A remote code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error in Adobe Flash Player while handling a specially crafted SWF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted SWF file with an affected version of Flash Player.