header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Use-After-Free in TextField setFormat Method

The TextField setFormat method in Adobe Flash contains a use-after-free vulnerability. By passing an object parameter with a defined valueOf function, or by overriding a constructor of the object parameter, an attacker can free the TextField parent object. This can lead to subsequent use of the freed object, potentially allowing for arbitrary code execution.

Overflow in ui::PlatformCursor WebCursor::GetPlatformCursor method

There is an overflow in the ui::PlatformCursor WebCursor::GetPlatformCursor method. The issue is in the x11 implementation, but it appears to affect other platform-specific implementations as well. The buffer is allocated based on the width and height of the custom_size_, but the memcpy is performed using the size of the custom_data_. This can lead to a buffer overflow.

R2K Gallery v1.7 Local File Include Vuln

The R2K Gallery v1.7 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by manipulating the 'pictures_folder' and 'lang2' parameters in the 'galeria.php' script to include arbitrary files from the local system. This can lead to unauthorized access, information disclosure, and possibly remote code execution.

Stack-based Out-of-Bounds Memory Read in Wireshark

A stack-based out-of-bounds memory read vulnerability exists in Wireshark. By feeding a malformed file to tshark, an attacker can trigger a crash due to a stack-based buffer overflow, leading to potential remote code execution or denial of service.

Recent Exploits: