The vulnerability exists because of a buffer overrun in the remote debug functionality of FrontPage Server Extensions. This functionality enables users to remotely connect to a server running FrontPage Server Extensions and remotely debug content. An attacker who successfully exploited this vulnerability could be able to run code with IWAM_machinename account privileges on an affected system.
This module exploits a vulnerability in the .HTR ISAPI filter. After successful exploitation an agent will be installed.
This module exploits a vulnerability in the .ASP ISAPI filter. After successful exploitation an agent will be installed. The process being exploited is usually running with lowered privileges.
After successful exploitation, this module executes an agent as the unprivileged IUSR or IWAM user.
Iconics Genesis SCADA HMI Genbroker Server has a integer overflow vulnerabilities while handling crafted packages in opcode 0x4b0.
This module exploits a remote memory corruption on IBM Tivoli Storage Manager FastBack by sending a specially crafted sequence of packets to the affected application.
IBM Tivoli Storage is prone to a buffer overflow vulnerability that affects the FastBackMount server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the FastBackMount process.
This module exploits a remote buffer overflow in the TSM Remote Client Agent (dsmagent) by sending a specially crafted sequence of packets to the affected application.
This module exploits a stack-based buffer overflow vulnerability in IBM Tivoli Endpoint by sending a specially crafted HTTP request. The specific flaw exists within the lcfd.exe process which listens by default on TCP port 9495. To reach this page remotely authentication is required. However, by abusing a built-in account an attacker can access the restricted pages. While parsing requests to one of these, the process blindly copies the contents of a POST variable to a 256 byte stack buffer.
This module exploits a buffer overflow vulnerability in the Community Services Multiplexer (StMux.exe) by requesting a specially crafted URL.
Pagination
- Previous page
- Page 111
- Next page