header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RPM Remote Print Manager Remote Buffer Overflow Vulnerability

RPM Remote Print Manager is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into an insufficiently sized buffer. An attacker may exploit this issue to execute arbitrary code or cause denial-of-service conditions.

Sentinel Protection Server and Keys Server Directory Traversal Vulnerability

Sentinel Protection Server and Keys Server are prone to a directory-traversal vulnerability because the software fails to sufficiently sanitize user-supplied input data. Exploiting this issue may allow an attacker to access sensitive information that could aid in further attacks.

Opium OPI Server and CyanPrintIP Denial-of-Service and Format-String Vulnerabilities

Opium OPI Server and CyanPrintIP are prone to a denial-of-service vulnerability and a format-string vulnerability. An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

Larson Software Technology Network Print Server Format String and Buffer Overflow Vulnerabilities

Larson Software Technology Network Print Server is prone to a format-string vulnerability and a buffer-overflow vulnerability. An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

Joomla! and Mambo ‘com_comments’ Component SQL Injection Vulnerability

The Joomla! and Mambo 'com_comments' component is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Multiple cyan soft products Format-String and Denial-of-Service Vulnerabilities

Multiple cyan soft products are affected by a format-string vulnerability because they fail to adequately sanitize user-supplied input before passing it as the format-specifier to a formatted-printing function. These applications are also affected by a denial-of-service vulnerability because they fail to adequately handle certain commands during the start of a connection. Attackers can leverage these issues to execute arbitrary code in the context of the application or to terminate the application. Successful attacks will compromise the applications or deny access to legitimate users.

Rapid-Recipe SQL Injection Vulnerability

Rapid-Recipe is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

VWar SQL Injection Vulnerability

VWar is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

ExtremeZ-IP File and Print Servers Multiple Vulnerabilities

ExtremeZ-IP File and Print servers are prone to multiple vulnerabilities including denial-of-service and information-disclosure issues. Attackers can exploit these issues to cause denial-of-service conditions or to obtain potentially sensitive information.

Recent Exploits: