header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vulnerability in Roger Wilco Server

A user does not need to connect to the server over the TCP port to have UDP based audio streams handled. The attacker requires knowledge of user ID's connected to a target channel. By transmitting an audio stream to an affected server, it can be heard by all connected users without server administrator control.

Remote Denial of Service Vulnerability in Roger Wilco Server

The Roger Wilco Server is prone to a remote denial of service vulnerability. This vulnerability occurs due to a flaw in handling malicious UDP payloads. An attacker can exploit this vulnerability by sending malicious UDP payloads to the vulnerable server, causing it to deny service to legitimate users.

Buffer Overflow Vulnerability in cdp

cdp is prone to a buffer overflow vulnerability that may allow an attacker to cause a denial of service condition in the software. The issue exists due to insufficient boundary checks performed by the printTOC() function. The buffer overflow condition may occur if when a song with a track name exceeding 200 bytes is accessed via the application. If an attacker is able to overwrite sensitive memory locations, it may be possible to execute arbitrary instructions in the context of the user running cdp.

Remote HTTP Header Buffer Overflow in MPlayer

MPlayer is prone to a remote HTTP header buffer overflow vulnerability. This issue occurs due to a failure of the application to properly verify buffer bounds on the 'Location' HTTP header during parsing. Successful exploitation would immediately produce a denial of service condition in the affected process. This issue may also be leveraged to execute code on the affected system within the security context of the user running the vulnerable process.

WebCT Campus Edition HTML Injection Vulnerability

The WebCT Campus Edition is prone to an HTML injection vulnerability that may allow a remote attacker to execute arbitrary HTML or script code in the browser of an unsuspecting user. A malicious user could supply malicious HTML or script code to the application via the @import url() function of Microsoft Internet Explorer when posting a message on a forum, which would then be rendered in the browser of an unsuspecting user whenever the malicious message is viewed.

Recent Exploits: