Show filters
65 Total Results
Displaying 41-50 of 65
Sort by:
Attacker Value
Unknown
CVE-2023-34287
Disclosure Date: May 03, 2024 (last updated September 18, 2024)
Ashlar-Vellum Cobalt CO File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-17892.
0
Attacker Value
Unknown
CVE-2023-34286
Disclosure Date: May 03, 2024 (last updated September 18, 2024)
Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-17891.
0
Attacker Value
Unknown
CVE-2023-39427
Disclosure Date: October 26, 2023 (last updated November 07, 2023)
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
0
Attacker Value
Unknown
CVE-2022-42948
Disclosure Date: March 24, 2023 (last updated October 08, 2023)
Cobalt Strike 4.7.1 fails to properly escape HTML tags when they are displayed on Swing components. By injecting crafted HTML code, it is possible to remotely execute code in the Cobalt Strike UI.
0
Attacker Value
Unknown
CVE-2022-39197
Disclosure Date: September 22, 2022 (last updated October 08, 2023)
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).
0
Attacker Value
Unknown
CVE-2022-23317
Disclosure Date: February 15, 2022 (last updated October 07, 2023)
CobaltStrike <=4.5 HTTP(S) listener does not determine whether the request URL begins with "/", and attackers can obtain relevant information by specifying the URL.
0
Attacker Value
Unknown
CVE-2016-10597
Disclosure Date: June 01, 2018 (last updated November 26, 2024)
cobalt-cli downloads resources over HTTP, which leaves it vulnerable to MITM attacks.
0
Attacker Value
Unknown
CVE-2008-6202
Disclosure Date: February 20, 2009 (last updated October 04, 2023)
SQL injection vulnerability in CoBaLT 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) urun.asp, (2) admin/bayi_listele.asp, (3) admin/urun_grup_listele.asp, and (4) admin/urun_listele.asp.
0
Attacker Value
Unknown
CVE-2008-6203
Disclosure Date: February 20, 2009 (last updated October 04, 2023)
SQL injection vulnerability in adminler.asp in CoBaLT 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown
CVE-2002-1361
Disclosure Date: December 23, 2002 (last updated February 22, 2025)
overflow.cgi CGI script in Sun Cobalt RaQ 4 with the SHP (Security Hardening Patch) installed allows remote attackers to execute arbitrary code via a POST request with shell metacharacters in the email parameter.
0