This module exploits a remote stack-based buffer overflow in FlexNet License Server Managerby sending a malformed packet to the 27000/TCP port.
This module exploits a remote format string vulnerability in FireFly Media Server by sending a sequence of HTTP requests to the 3689/TCP port.
This module exploits a buffer overflow vulnerability in the database service (fbserver.exe) of the FireBird SQL application. The exploit triggers a stack-based buffer overflow by sending a specially crafted "username" value to port 3050/TCP of the vulnerable system and installs an agent if successful.
This module exploits a buffer overflow vulnerability in the database service (fbserver.exe) of the FireBird SQL application. The exploit triggers a stack-based buffer overflow by sending a specially crafted "create" request to port 3050/TCP of the vulnerable system and installs an agent if successful.
This module exploits a remote buffer overflow in Firebird SQL by sending a malformed packet to the 3050/TCP port.
An internal memory buffer may be overrun while handling "HEAD" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the FileSharingWizard.exe process.
This vulnerability allows remote attackers to execute arbitrary code on installations of FileCopa FTP Server, which can be exploited by malicious people to compromise a vulnerable system. FileCopa FTP Server is prone to a buffer-overflow vulnerability when handling data through the LIST command, a large amount of data can trigger an overflow in a finite-sized internal memory buffer. Successful login in the ftp server is required to exploit this vulnerability. Anonymous user is enabled by default.
A stack overflow found in EZHomeTech EzServer by supplying a packet with an overly long string.
The Dovecot documentation contains an example using a dangerous configuration option for Exim, which leads to a remote command execution vulnerability.
The internal string handling functions of the Exim software contain a function called string_format(). The version of this function included with Exim versions prior to 4.70 contains a flaw that can result in a buffer overflow. This module exploits the vulnerability to install an agent. Additionally, this module also attempts to exploit the Alternate Configuration Privilege Escalation Vulnerability in Exim (CVE-2010-4345). If the second exploit is successful, the agent is installed with root privileges.
Pagination
- Previous page
- Page 120
- Next page