Proof of concept exploit for Vypress Tonecast versions 1.3 and below that suffer from a denial of service vulnerability.
c226858f86c2b7ffdaf0c7c887183fe6005f6eea5fb4bb6d5e446510d8d578ad
Due to a mishandling of malformed streams, Vypress Tonecast versions 1.3 and below suffer from a denial of service vulnerability.
d3a7fe0efbddaae4a3879f2a9ee50f3d27c512f6f0a410cc2667ec3bcbe9c395
Google's custom websearch does not prevent javascript from being inserted into the url of the image, allowing malicious users to modify the content of the google page allowing in phishing attacks, or silently steal search terms/results/clicks or modify actual searches to always contain controlled results.
d9c65461a1497fbc4f6cd40c0919403531daf6ed450070d82214e35566cf98a1
Proof of concept exploit for Socat versions 1.4.0.2 and below that makes use of a format string vulnerability.
9ed0cf58b0b7dd6a47511b5d8f0661f3c0f25236007227a0b310775686548d06
An attacker can bypass native Lotus Notes HTML encoding in a computed value by adding square brackets to the beginning and end of a field of the following types computed, computed for display, computed when composed or a computed text element, Injecting HTML and JavaScript as desired.
9a7f30ad0770b3d630b3e6ee62d6e44a413988b48b90cf3a0cff46fcc0ad1239