House of Rabbit 的核心思想随着ASLR、PIE、NX等防护机制的普及,传统的栈溢出和代码注入变得举步维艰。攻击者的焦点逐渐转向了堆利用。glibc的堆分配器(ptmalloc2)特别复杂性,是漏洞利用的“富矿”。House of Rabbit技术是通过一个可控的堆溢出或写原语,伪造一个堆块,然后利用malloc_consolidate向前合并机制,通过堆溢出或其他内存破坏漏洞,伪造
A vulnerability classified as problematic was found in Glitter Unicorn Wallpaper App 7.x/8.0 on Android. This affects an unknown function. Executing manipulation can lead to denial of service.
The identification of this vulnerability is CVE-2023-29723. The attack can only be executed locally. There is no exploit available.
A vulnerability has been found in SofaWiki up to 3.8.9 and classified as critical. Affected by this vulnerability is an unknown functionality. Performing manipulation results in unrestricted upload.
This vulnerability is identified as CVE-2023-29721. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability has been found in Glitter Unicorn Wallpaper App 7.x/8.0 on Android and classified as critical. Affected by this vulnerability is an unknown functionality. This manipulation causes improper authorization.
This vulnerability is tracked as CVE-2023-29722. The attack is restricted to local execution. No exploit exists.
A vulnerability was found in SofaWiki up to 3.8.9. It has been classified as problematic. Affected by this issue is some unknown functionality of the file index.php. Performing manipulation results in cross site scripting.
This vulnerability is known as CVE-2023-29720. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability has been found in Vade Secure Gateway and classified as problematic. The affected element is an unknown function of the file /css/. Performing manipulation results in cross site scripting.
This vulnerability is identified as CVE-2023-29713. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Vade Secure Gateway and classified as problematic. The impacted element is an unknown function of the component Cookie Handler. Executing manipulation of the argument username/password/language can lead to cross site scripting.
This vulnerability is tracked as CVE-2023-29714. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Devs CRM Plugin up to 1.1.8 on WordPress. It has been declared as problematic. Affected is an unknown function of the file /wp-json/devs-crm/v1/attendances of the component REST API Endpoint. The manipulation results in password hash with insufficient computational effort.
This vulnerability was named CVE-2025-13092. The attack may be performed from remote. There is no available exploit.
A vulnerability classified as critical was found in dugudlabs Eyewear Prescription Form Plugin up to 6.0.1 on WordPress. This issue affects some unknown processing. The manipulation of the argument catIds results in missing authorization.
This vulnerability is reported as CVE-2025-14365. The attack can be launched remotely. No exploit exists.
A vulnerability classified as problematic has been found in Devs CRM Plugin up to 1.1.8 on WordPress. The affected element is an unknown function of the file /wp-json/devs-crm/v1/bulk-update of the component API Endpoint. This manipulation causes missing authorization.
This vulnerability is registered as CVE-2025-13093. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as critical, was found in WP Directory Kit Plugin up to 1.4.7 on WordPress. The affected element is an unknown function. Such manipulation of the argument hide_fields/attr_search leads to sql injection.
This vulnerability is traded as CVE-2025-13089. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Design Import Export Plugin up to 2.2 on WordPress. This affects an unknown function of the component XML File Import. Such manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-14050. The attack can be launched remotely. No exploit exists.
A vulnerability was found in GenerateBlocks Plugin up to 2.1.2 on WordPress. It has been rated as problematic. This affects the function get_user_meta_rest of the file generateblocks/v1/meta/. This manipulation of the argument names/email/phone/address causes information disclosure.
This vulnerability is tracked as CVE-2025-12512. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability has been found in HT Plugins HT Slider for Elementor Plugin up to 1.7.4 on WordPress and classified as problematic. This impacts an unknown function. Performing manipulation of the argument slide_title results in cross site scripting.
This vulnerability was named CVE-2025-14278. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as problematic has been discovered in Custom Post Type UI Plugin up to 1.18.1 on WordPress. This vulnerability affects unknown code of the component Import Handler. Such manipulation of the argument label leads to cross site scripting.
This vulnerability is listed as CVE-2025-14056. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Employee Spotlight Plugin up to 5.1.3 on WordPress. It has been declared as problematic. Affected by this issue is the function employee_spotlight_check_optin. The manipulation results in missing authorization.
This vulnerability is identified as CVE-2025-13403. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, was found in Vade Secure Gateway. Impacted is an unknown function. Such manipulation of the argument X-Rewrite-URL leads to cross site scripting.
This vulnerability is referenced as CVE-2023-29712. It is possible to launch the attack remotely. No exploit is available.