Razer Synapse Service version 1.0.0 suffers from a DLL injection vulnerability that can escalate privileges to SYSTEM.
462cb9cffc5b2c1587857c2adb98822a
Ivanti Workspace Manager versions prior to 10.3.90 suffer from a bypass vulnerability.
7d5aa5b55686f1b2087f5cd444c7b3cc
Netperf version 2.6.0 suffers from a stack-based buffer overflow.
0ef5dc2f9b7f60ca2b8b2d08ffec6dec
WhatsApp version 2.18.61 suffers from a memory corruption vulnerability.
4e0f56a67db6bc6666fda14e307078c1
SIPP version 3.3 is prone to a local unauthenticated stack-based overflow vulnerability.
5459f811bc8d030cf2944fee6f093f97
Linkedin mobile iOS application version 9.11.8592.4 suffers from a CPU resource exhaustion vulnerability.
548e38902cc5abaceaeb0c3f8618bdd6
WhatsApp version 2.18.31 on iOS suffers from a remote memory corruption vulnerability.
e1523bcfb6fbea3ce35f934bb2914515
PMS version 0.42 suffers from a buffer overflow vulnerability.
040caf5340322857b30d22ea4686e161
Crashmail version 1.6 suffers from a buffer overflow vulnerability.
67108b1d2db46a902d2cb0412d654c26
SC version 7.16 suffers from a stack-based buffer overflow vulnerability.
f31013dba0290d48f00a17b2a876d39b
EChat Server version 3.1 suffers from a buffer overflow vulnerability in CHAT.ghp.
e8de314cc62dfc852d982ec99b634622
Asterisk version 13.17.2 chan_skinny remote memory corruption exploit.
3b1c78eff3f3c7398a3f857e84fd7446
BOCHS version 2.6-5 suffers from a local buffer overflow vulnerability.
ef2db4986d49397d9379bd42918b2da5
Asterisk Project Security Advisory - If the chan_skinny (AKA SCCP protocol) channel driver is flooded with certain requests it can cause the asterisk process to use excessive amounts of virtual memory eventually causing asterisk to stop processing requests of any kind.
2cbedc51743649be0104f9790f0c2743
Asterisk version 13.17.2~dfsg-2 suffers from a remote unauthenticated memory exhaustion vulnerability.
359301b570dd73a9d68c81fd132e7f30
WhatsApp versions 2.17.52 and below suffer from a memory corruption vulnerability that can result in a denial of service.
52cf023f313d359776c21c2b3eebd1fb
MAWK versions 1.3.3-17 and below are susceptible to a stack-based buffer overflow vulnerability.
f76cf831d1aaa6799ae5841ed1ae6276
FASM (Flat Assembler) versions 1.7.21 and below suffer from a buffer overflow vulnerability.
7c1545562143b51d0bc05b2a8fb262b9
This exploit leverages an MTA handler remote code execution vulnerability in Microsoft Word.
85fe06cb7ff43ba872bc7b0a4c7dd68f
JAD version 1.5.8e-1kali1 suffers from a buffer overflow vulnerability.
2b1879456767fcc7e710df4a24db0153
Mapscrn version 2.0.3 suffers from stack-based buffer overflow vulnerability.
406c0b12c32c26fbf877f8cf3b7d4086
TiEmu versions 2.08 and below suffer from a stack-based buffer overflow vulnerability.
9908056248904c47270eb4b99180cdc0
JAD Java Decompiler version 1.5.8e suffers from a local buffer overflow vulnerability.
3b626d2eb1114b900fb1ebc78f48d3e3
SMBv1 SrvOs2FeaToNt OOB is prone to a remote code execution vulnerability because the application fails to perform adequate boundary-checks on user-supplied input. This exploit leverages this vulnerability as described in MS17-010.
27aed1d2f12f7dbbf27284d6b7558bd7
iSelect version 1.4 suffers from a local buffer overflow vulnerability.
125ae804412a8c8c891b68bebc901c43