header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Local Buffer Overrun in BlackICE PC Protection

BlackICE PC Protection is prone to a local buffer overrun when handling excessive input in certain configuration directives parsed from the firewall.ini file included with the software. When the system is restarted, and the affected software reads the malicious firewall.ini file, both the blackice.exe and blackd.exe executables will crash.

Remote Heap-based Buffer Overrun in GNU cfengine cfservd

The vulnerability exists in the cfengine cfservd AuthenticationDialogue() function due to a lack of sufficient boundary checks on challenge data received from a client. A remote attacker can exploit this vulnerability to corrupt in-line heap based memory management data.

Remote Heap-Based Buffer Overrun Vulnerability in GNU cfengine cfservd

The GNU cfengine cfservd is prone to a remote heap-based buffer overrun vulnerability. The vulnerability exists in the cfengine cfservd AuthenticationDialogue() function due to a lack of sufficient boundary checks performed on challenge data received from a client. An attacker can exploit this vulnerability to corrupt in-line heap-based memory management data.

YaPiG Remote Code Execution

A vulnerability in YaPiG allows a remote attacker to execute malicious scripts on a vulnerable system. The issue arises due to a lack of sanitization of user-supplied data. An attacker can upload a file with a '.php' extension, which will be parsed and executed by the PHP engine when requested. Successful exploitation of this vulnerability can lead to the execution of malicious script code on the server.

Free Web Chat Server Denial of Service Vulnerabilities

The Free Web Chat server is prone to multiple denial of service vulnerabilities. The first vulnerability occurs due to insufficient sanitization on username data, allowing a user with a void name to be added, resulting in a NullPointerException. The second vulnerability is caused by improper management of multiple connections from the same location, leading to resource consumption. A remote attacker can exploit these vulnerabilities to deny service to legitimate users.

Recent Exploits: