header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NukeCalendar Multiple Vulnerabilities

NukeCalendar, a third-party calendar module for PHP-Nuke, is vulnerable to multiple security issues. These include path disclosure, SQL injection, and cross-site scripting. These vulnerabilities can lead to the disclosure of sensitive information, compromise of user accounts, compromise of the bulletin board, and potential attacks against the database through SQL injection.

Multiple Vulnerabilities in NukeCalendar

NukeCalendar, a third-party calendar module for PHP-Nuke, is vulnerable to multiple issues including path disclosure, SQL injection, and cross-site scripting. These vulnerabilities can lead to the disclosure of sensitive information, compromise of user accounts and bulletin boards, and potential attacks against the database through SQL injection.

Multiple vulnerabilities in NukeCalendar module for PHP-Nuke

The NukeCalendar module for PHP-Nuke is prone to multiple vulnerabilities including path disclosure, SQL injection, and cross-site scripting. These vulnerabilities could result in the disclosure of sensitive information, compromise of user accounts or bulletin boards, and possible attacks against the database implementation itself through SQL injection.

FirstClass Desktop Client Local Buffer Overflow Vulnerability

The FirstClass Desktop Client is prone to a local buffer overflow vulnerability. This vulnerability could allow attackers to execute arbitrary code on a vulnerable system, potentially leading to elevated privileges. The issue is reported to exist due to the 'PROXYADDR' variable of the 'LOCAL NETWORK.FCP' configuration file.

Mcafee FreeScan CoMcFreeScan Browser Object Remote Buffer Overflow Vulnerability

The Mcafee FreeScan CoMcFreeScan browser object is prone to a remote buffer overflow vulnerability. The issue occurs due to a lack of sufficient boundary checks performed on data assigned to the object variable 'ScanParam'. An attacker can exploit this vulnerability by crafting a malicious website that, when viewed, would result in arbitrary code execution in the context of the user running the browser with an affected browser object installed.

Symantec Virus Detection Denial of Service Vulnerability

The Symantec Virus Detection Symantec.SymVAFileQuery.1 COM object is prone to a denial of service vulnerability. When the object is invoked with excessive data, the browser will crash. Successful exploitation would immediately produce a denial of service condition in the affected browser. Although initially reported as a buffer overflow, this issue does not appear to present any threat of remote code execution. It should be noted that the vulnerable object may not be invoked from scripts outside of the Symantec domain, however, vulnerabilities that permit malicious content to be executed in the context of the domain (such as HTML injection or cross-site scripting vulnerabilities as well as web browser security model issues) may still permit exploitation of this issue.

Buffer Overflow Vulnerability in Blaxxun Contact 3D Browser Object

The Blaxxun Contact 3D browser object for Internet Explorer is prone to a buffer overflow vulnerability. The issue is due to a lack of sufficient boundary checks performed on data assigned to a browser object variable. An attacker can exploit this vulnerability to seize control of the execution flow for the affected browser object and influence execution flow into an attacker-supplied payload.

Recent Exploits: