header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

abcm2ps Remote Buffer Overflow Vulnerability

abcm2ps is prone to a remote buffer overflow vulnerability due to a lack of proper boundary checks. An attacker can exploit this issue by crafting a malicious ABC file containing excessive string data, replacement memory addresses, and executable instructions. If a user processes this file through the application, the attacker's instructions may be executed, potentially compromising the application.

abcpp Buffer Overflow Vulnerability

abcpp is prone to a buffer overflow vulnerability. This issue is exposed when the program is used to handle directives in ABC music notation files. Since the ABC files may originate from an external or untrusted source, this issue is considered remote in nature. Successful exploitation will result in execution of arbitrary code in the context of the user running the application.

VB2C Remote Buffer Overflow Vulnerability

VB2C is prone to a remote buffer overflow vulnerability. This vulnerability occurs due to the application's failure to properly check boundaries before copying user-supplied data into sensitive process buffers. An attacker can exploit this issue by crafting a malicious FRM file containing excessive string data, replacement memory addresses, and executable instructions. If a user processes the file through the application, the attacker's instructions may be executed, potentially compromising the vulnerable computer.

Stack Buffer Overflow Vulnerabilities in abc2midi

abc2midi is susceptible to two stack buffer overflow vulnerabilities. These issues occur when the application fails to properly bounds check user-supplied image data before copying it into fixed-size memory buffers. Remote attackers can exploit these vulnerabilities to alter the flow of execution and potentially execute attacker-supplied machine code in the context of the application attempting to read malicious ABC files.

abc2mtex Buffer Overflow Vulnerability

abc2mtex is prone to a buffer overflow vulnerability. This issue is exposed when the program is used to convert ABC music notation files to MTEX format. In particular, the issue is due to insufficient bounds checking of key data in ABC notation files. Since the ABC files may originate from an external or untrusted source, this issue is considered remote in nature. Successful exploitation will result in execution of arbitrary code in the context of the user running the application.

Privilege Escalation in uml_utilites uml_net Application

The uml_utilites uml_net application may permit unprivileged malicious local users to shut down the slip network interface. This is due to the program being installed setuid root by default. This vulnerability could be exploited to deny network services over slip on an affected computer.

asp2php Buffer Overflow Vulnerability

The asp2php application is prone to a buffer overflow vulnerability when converting an ASP file to PHP. The vulnerability is related to parsing of tokens in ASP files. An attacker can exploit this vulnerability by providing a malicious ASP file, which can lead to the execution of arbitrary code in the context of the user running the application.

Ringtone Tools Remote Buffer Overflow Vulnerability

The Ringtone Tools application fails to carry out proper boundary checks before copying user-supplied data into sensitive process buffers, leading to a remote buffer overflow vulnerability. An attacker can exploit this by crafting a malicious eMelody file with excessive string data, replacement memory addresses, and executable instructions. If a user processes this file through the application, the attacker's instructions may be executed, potentially compromising the application.

WorkBoard Cross-Site Scripting Vulnerabilities

WorkBoard is affected by various cross-site scripting vulnerabilities. These vulnerabilities are caused by a failure to properly sanitize user-supplied URI input. An attacker can create a malicious URI link containing hostile HTML and script code, which, if followed, can lead to the execution of the code in the victim's web browser. This can result in theft of authentication credentials or other attacks.

Recent Exploits: