header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Blubster client v2.5 Remote Denial of Service

It has been reported that Blubster is prone to a remote denial of service vulnerability due to a port flooding attack on TCP port 701. The problem is reported to present itself when a remote attacker floods port 701 with voice chat session requests. This issue may cause the software to crash resulting in a denial of service to legitimate users. This attack may not be logged, therefore allowing an attack to exploit this issue persistently.

IdealBB HTML Injection Vulnerability

IdealBB is prone to an HTML injection vulnerability, which allows remote attackers to inject malicious HTML and script code into board messages. The attacker's code may be rendered in the web browser of the user viewing the malicious message. An example of this is the code provided in the description, which when clicked, will display an alert box containing the user's cookie information.

WIDZ Alert System Command Execution Vulnerability

WIDZ does not validate untrusted input when generating alerts. Alerts pass the essid of an unknown wireless access point through a system() call. By setting the essid of an unauthorized access point to include malformed information, the underlying operating system may be compromised. An attacker can set the essid of an unauthorized access point to include malicious code, which will be executed by the system() call.

Vpop3d Denial Of Service

A vulnerability has been reported for Vpop3d that may make it prone to denial of service attacks. The problem is said to occur due to the affected daemon failing to sufficiently handle USER name values of excessive length. As a result, if a malicious packet is received, after a specific amount of time the affected server may abnormally terminate.

Multiple Remote Denial of Service Vulnerabilities in WapServ

A remote attacker may exploit these conditions to trigger a denial of service of the WapServ server. To Crash Wap Serv: Send the following data over the specific listening ports: a) 0x00 (or any single byte value) to port 9200 (Connection-less non WTLS) or b) 0x89, 0x77, 0x13, 0x86, 0x3d to port 9201 (Connection-orientated non WTLS). To Cause Out Of Memory: Send the following over the specified listening ports: a) 0xa6, 0x09, 0x5d to port 9201 (Connection-orientated non WTLS).

Buffer Overflow in Avant Browser

It has been reported that a buffer overflow condition exists in the Avant Browser software that may cause an attacker to run arbitrary code on a vulnerable host in order to gain unauthorized access to the system. The vulnerability is due to a lack of boundary condition checks on URL values. This issue may cause an attack to run arbitrary code on a host in the context of the user running the vulnerable version of Avant Browser.

srcpd Integer Overflow Vulnerability

A vulnerability has been reported in srcpd that allows a remote attacker to cause a denial of service by exploiting an integer overflow error. The exploitation of this problem would consist of an attacker connecting to a server and issuing the 'go' command with a large integer value, causing an overflow condition. This issue would lead to a denial of service. Execution of arbitrary code may well be possible.

OpenBSD semget() System Call Vulnerability

A vulnerability has been discovered in the OpenBSD semget() system call. The problem occurs due to insufficient sanity checks before allocating memory using the user-supplied nsems value as an argument. As a result, an attacker may be capable of modifying the running kernel.

ViRobot Linux Server Security Vulnerabilities

Various potential security vulnerabilities have been reported for ViRobot Linux Server. Problems are said to occur within various setuid binaries installed by the program. Reports indicate that some of these binaries may be prone to buffer overruns, potentially making them exploitable to execute arbitrary code with elevated privileges.

Internet Explorer Object Tag Vulnerability

The problem occurs when Internet Explorer receives a response from the server when a web page containing an object tag is parsed. Successful exploitation of this vulnerability could allow a malicious object to be trusted and as such be executed on the local system. All code execution would occur in the security context of the current user.

Recent Exploits: