Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intellitamper intellitamper 2.07 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-5868
Stack-based buffer overflow in IntelliTamper 2.07 and 2.08 allows user-assisted malicious users to execute arbitrary code via a long ProxyLogin value in a configuration (.cfg) file.
Intellitamper Intellitamper 2.07
Intellitamper Intellitamper 2.08
1 EDB exploit
NA
CVE-2008-5755
Stack-based buffer overflow in IntelliTamper 2.07 and 2.08 allows remote malicious users to execute arbitrary code via a MAP file containing a long URL, possibly a related issue to CVE-2006-2494.
Intellitamper Intellitamper 2.07
Intellitamper Intellitamper 2.08
2 EDB exploits
NA
CVE-2008-3361
Stack-based buffer overflow in IntelliTamper 2.07 allows remote web sites to execute arbitrary code via a long HTTP Server header.
Intellitamper Intellitamper 2.0.7
2 EDB exploits
NA
CVE-2008-3583
Buffer overflow in the HTML parser in IntelliTamper 2.07 allows remote malicious users to execute arbitrary code via a long URL in the SRC attribute of an IMG element. NOTE: this might be related to CVE-2008-3360. NOTE: it was later reported that 2.08 Beta 4 is also affected.
Intellitamper Intellitamper 2.0.7
1 EDB exploit
NA
CVE-2008-3360
Stack-based buffer overflow in the HTML parser in IntelliTamper 2.0.7 allows remote malicious users to execute arbitrary code via a long URL in the HREF attribute of an A element, a different vulnerability than CVE-2006-2494.
Intellitamper Intellitamper 2.0.7
4 EDB exploits
NA
CVE-2006-2494
Stack-based buffer overflow in IntelliTamper 2.07 allows remote malicious users to execute arbitrary code via a crafted .map file.
Lacaveprods Intellitamper
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started