This module sends a http request at "nmma.exe" service producing a buffer overflow and installs an agent.
This module exploits a remote stack-based buffer overflow in Novell iManager by creating a class with an overly long name. In order to exploit this vulnerability, you must be able to login to any Novell eDirectory server via the target iManager application. This exploit will bypass DEP on Windows 2003 platforms by disabling it in the context of the current process.
This module exploits an off-by-one condition by sending a specially crafted RCPT verb argument to a Novell GroupWise Internet Agent.
This module exploits a buffer overflow vulnerability in Novell File Reporter. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3037.
This module exploits a buffer overflow vulnerability in Novell File Reporter. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3037.
This module exploits a Directory traversal vulnerability in NFRAgent.exe in Novell File Reporter. This allows remote attackers to upload and execute files via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an FSFUI record. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3037.
This module exploits a vulnerability in Novell File Reporter by sending a specially crafted packet.
This module exploits a buffer overflow vulnerability in Novell File Reporter. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3037.
A boundary error exists in the dhost.dll component of Novell eDirectory post authentication when processing list of modules. This can be exploited to cause a stack-based buffer overflow via a specially crafted request with an overly long module name.
This module exploits a remote buffer overflow in Novell eDirectory by sending a malformed packet to the 524/TCP port.
Pagination
- Previous page
- Page 99
- Next page