header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Interaction SIP Proxy Remote Denial of Service Vulnerability

This vulnerability allows a remote user to overwrite heap memory of i3sipproxy. The request size varies, but size=2900 bytes works in most of the cases. Successful exploitation of this bug for code execution requires a magic combination of pre-allocations, data, and size.

Multiple Input Validation Vulnerabilities in HoneyComb Archive

HoneyComb Archive is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, and the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Cross-Site Scripting Vulnerability in D-Man

D-Man is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'title' parameter.An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site.

HTML Injection Vulnerability in LiveJournal

The HTML injection vulnerability in LiveJournal allows an attacker to inject HTML and script code into the dynamically generated content, potentially leading to the execution of malicious code in the context of the affected website. This can result in the theft of cookie-based authentication credentials and control over how the site is rendered to the user.

Integer-Overflow Vulnerability in Blender

Blender is susceptible to an integer-overflow vulnerability. This issue is due to the application's failure to properly sanitize user-supplied input before using it in a memory allocation and copy operation. This issue allows attackers to execute arbitrary machine code in the context of the user running the affected application.

Info-ZIP ‘unzip’ Filename Buffer Overflow Vulnerability

This vulnerability in Info-ZIP 'unzip' allows attackers to execute arbitrary machine code in the context of users running the affected application. The issue arises due to the application's failure to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer.

Multiple input validation vulnerabilities in Mercury CMS

The vulnerabilities in Mercury CMS are due to a failure in properly sanitizing user-supplied input. Successful exploitation could lead to compromise of the application, disclosure or modification of data, theft of authentication credentials, and other attacks. The vulnerabilities include SQL injection and cross-site scripting (XSS) vulnerabilities.

Komodo CMS Multiple Input Validation Vulnerabilities

Komodo CMS is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

Recent Exploits: