
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
149 lines
No EOL
4.7 KiB
Text
149 lines
No EOL
4.7 KiB
Text
Ghostscript is prone to a remote denial-of-service vulnerability because it fails to properly validate user-supplied input.
|
|
|
|
Exploiting this issue allows remote attackers to crash the application and possibly to execute code, but this has not been confirmed.
|
|
|
|
|
|
Vulnerable: Ubuntu Ubuntu Linux 8.10 sparc
|
|
Ubuntu Ubuntu Linux 8.10 powerpc
|
|
Ubuntu Ubuntu Linux 8.10 lpia
|
|
Ubuntu Ubuntu Linux 8.10 i386
|
|
Ubuntu Ubuntu Linux 8.10 amd64
|
|
Ubuntu Ubuntu Linux 8.04 LTS sparc
|
|
Ubuntu Ubuntu Linux 8.04 LTS powerpc
|
|
Ubuntu Ubuntu Linux 8.04 LTS lpia
|
|
Ubuntu Ubuntu Linux 8.04 LTS i386
|
|
Ubuntu Ubuntu Linux 8.04 LTS amd64
|
|
Ubuntu Ubuntu Linux 6.06 LTS sparc
|
|
Ubuntu Ubuntu Linux 6.06 LTS powerpc
|
|
Ubuntu Ubuntu Linux 6.06 LTS i386
|
|
Ubuntu Ubuntu Linux 6.06 LTS amd64
|
|
Sun Solaris 9_x86
|
|
Sun Solaris 9
|
|
Sun Solaris 10_x86
|
|
Sun Solaris 10
|
|
Sun OpenSolaris build snv_99
|
|
Sun OpenSolaris build snv_96
|
|
Sun OpenSolaris build snv_95
|
|
Sun OpenSolaris build snv_94
|
|
Sun OpenSolaris build snv_93
|
|
Sun OpenSolaris build snv_92
|
|
Sun OpenSolaris build snv_91
|
|
Sun OpenSolaris build snv_90
|
|
Sun OpenSolaris build snv_89
|
|
Sun OpenSolaris build snv_88
|
|
Sun OpenSolaris build snv_87
|
|
Sun OpenSolaris build snv_86
|
|
Sun OpenSolaris build snv_85
|
|
Sun OpenSolaris build snv_84
|
|
Sun OpenSolaris build snv_83
|
|
Sun OpenSolaris build snv_82
|
|
Sun OpenSolaris build snv_81
|
|
Sun OpenSolaris build snv_80
|
|
Sun OpenSolaris build snv_78
|
|
Sun OpenSolaris build snv_77
|
|
Sun OpenSolaris build snv_76
|
|
Sun OpenSolaris build snv_68
|
|
Sun OpenSolaris build snv_67
|
|
Sun OpenSolaris build snv_64
|
|
Sun OpenSolaris build snv_61
|
|
Sun OpenSolaris build snv_59
|
|
Sun OpenSolaris build snv_57
|
|
Sun OpenSolaris build snv_54
|
|
Sun OpenSolaris build snv_50
|
|
Sun OpenSolaris build snv_47
|
|
Sun OpenSolaris build snv_45
|
|
Sun OpenSolaris build snv_39
|
|
Sun OpenSolaris build snv_36
|
|
Sun OpenSolaris build snv_29
|
|
Sun OpenSolaris build snv_22
|
|
Sun OpenSolaris build snv_19
|
|
Sun OpenSolaris build snv_13
|
|
Sun OpenSolaris build snv_114
|
|
Sun OpenSolaris build snv_113
|
|
Sun OpenSolaris build snv_112
|
|
Sun OpenSolaris build snv_111a
|
|
Sun OpenSolaris build snv_111
|
|
Sun OpenSolaris build snv_110
|
|
Sun OpenSolaris build snv_109
|
|
Sun OpenSolaris build snv_108
|
|
Sun OpenSolaris build snv_107
|
|
Sun OpenSolaris build snv_106
|
|
Sun OpenSolaris build snv_105
|
|
Sun OpenSolaris build snv_104
|
|
Sun OpenSolaris build snv_103
|
|
Sun OpenSolaris build snv_102
|
|
Sun OpenSolaris build snv_101a
|
|
Sun OpenSolaris build snv_101
|
|
Sun OpenSolaris build snv_100
|
|
Sun OpenSolaris build snv_02
|
|
Sun OpenSolaris build snv_01
|
|
S.u.S.E. SUSE Linux Enterprise Server 9
|
|
S.u.S.E. SLE 11
|
|
S.u.S.E. SLE 10
|
|
S.u.S.E. openSUSE 11.1
|
|
S.u.S.E. openSUSE 11.0
|
|
S.u.S.E. openSUSE 10.3
|
|
S.u.S.E. Open-Enterprise-Server 0
|
|
S.u.S.E. Novell Linux Desktop 9
|
|
rPath rPath Linux 2
|
|
RedHat Fedora 9 0
|
|
RedHat Fedora 8 0
|
|
RedHat Enterprise Linux WS 4
|
|
RedHat Enterprise Linux WS 3
|
|
RedHat Enterprise Linux WS 2.1 IA64
|
|
RedHat Enterprise Linux WS 2.1
|
|
RedHat Enterprise Linux ES 4
|
|
RedHat Enterprise Linux ES 3
|
|
RedHat Enterprise Linux ES 2.1 IA64
|
|
RedHat Enterprise Linux ES 2.1
|
|
RedHat Enterprise Linux Desktop Workstation 5 client
|
|
RedHat Enterprise Linux Desktop 5 client
|
|
RedHat Enterprise Linux AS 4
|
|
RedHat Enterprise Linux AS 3
|
|
RedHat Enterprise Linux AS 2.1 IA64
|
|
RedHat Enterprise Linux AS 2.1
|
|
RedHat Enterprise Linux Desktop version 4
|
|
RedHat Enterprise Linux 5 server
|
|
RedHat Desktop 3.0
|
|
Pardus Linux 2008 0
|
|
MandrakeSoft Linux Mandrake 2009.0 x86_64
|
|
MandrakeSoft Linux Mandrake 2009.0
|
|
MandrakeSoft Linux Mandrake 2008.1 x86_64
|
|
MandrakeSoft Linux Mandrake 2008.1
|
|
MandrakeSoft Linux Mandrake 2008.0 x86_64
|
|
MandrakeSoft Linux Mandrake 2008.0
|
|
MandrakeSoft Corporate Server 4.0 x86_64
|
|
MandrakeSoft Corporate Server 3.0 x86_64
|
|
MandrakeSoft Corporate Server 3.0
|
|
MandrakeSoft Corporate Server 4.0
|
|
Ghostscript Ghostscript 8.15.2
|
|
Ghostscript Ghostscript 8.0.1
|
|
Ghostscript Ghostscript 8.61
|
|
Ghostscript Ghostscript 8.60
|
|
Ghostscript Ghostscript 8.57
|
|
Ghostscript Ghostscript 8.56
|
|
Ghostscript Ghostscript 8.54
|
|
Ghostscript Ghostscript 8.15
|
|
Avaya Proactive Contact 3.0.2
|
|
Avaya Proactive Contact 4.1
|
|
Avaya Proactive Contact 4.0
|
|
Avaya Proactive Contact 3.0
|
|
Avaya Proactive Contact 0
|
|
Avaya Messaging Storage Server MSS 3.0
|
|
Avaya Messaging Storage Server MM3.0
|
|
Avaya Messaging Storage Server 5.0
|
|
Avaya Messaging Storage Server 4.0
|
|
Avaya Messaging Storage Server 3.1
|
|
Avaya Messaging Storage Server 2.0
|
|
Avaya Messaging Storage Server 1.0
|
|
Avaya Messaging Storage Server
|
|
Avaya Message Networking MN 3.1
|
|
Avaya Message Networking 3.1
|
|
Avaya Message Networking
|
|
Avaya Intuity AUDIX LX 2.0 SP2
|
|
Avaya Intuity AUDIX LX 2.0 SP1
|
|
Avaya Intuity AUDIX LX 2.0
|
|
Avaya Intuity AUDIX LX 1.0
|
|
Avaya Intuity AUDIX
|
|
|
|
Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10327.pdf (2009-12-05-34337.pdf) |