header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Hotfoon Dialer Buffer Overflow Vulnerability

A buffer overflow vulnerability has been reported for the Hotfoon dialer. The vulnerability exists in a text input field for dialing telephone numbers. Reportedly, Hotfoon4.exe does not adequately perform boundary checks on this field. It is possible to crash the service and execute code.

QNX RTOS Packager Vulnerability

It has been reported that the packager fails to use absolute paths to execute system commands. This could potentially allow an attacker to trick the program into running a trojaned binary. Because the vulnerable packager is installed setuid root by default, this could allow a local attacker to take complete control over a system.

Cross Site Scripting Vulnerability in Perception LiteServe

It has been reported that LiteServe fails to sanitize query strings from indexed folders. It is possible for an attacker to exploit this issue by constructing a malicious link, containing encoded HTML and script code. When the malicious link is clicked by an unsuspecting user, the attacker-supplied HTML and script code will be executed by their web client. Attacks of this nature may make it possible for attackers to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.

CGIEmail Remote Buffer Overflow Vulnerability

A remotely exploitable buffer overflow has been discovered in a component included with CGIEmail. By sending a maliciously constructed GET request to the vulnerable server, it is possible for a remote attacker to overrun a buffer, potentially resulting in the execution of arbitrary system commands with the privileges of the mail server.

Plaintext Credentials Storage

CuteCast is a web-based streaming media server application. It has been reported that the default configuration of CuteCast is insecure, as it stores user information in a publicly accessible directory. This includes plaintext credentials, which can be accessed via the URL http://www.example.com/cgi-bin/cutecast/members/<username>.user.

Recent Exploits: