A buffer Overflow exists within the dpwinsdr.exe process which listens on TCP port 3817 by default. The process has insufficient bounds checking on user-supplied data copied to a fixed-length buffer on the stack. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed opcode 0x330 message packets to the target.
HP Data Protector Express is prone to a buffer-overflow when handling folder names in an insecure way by the dpwindtb.dll component.
This module exploits a buffer overflow vulnerability in HP Data Protector by sending a specially crafted EXEC_CMD request.
This update fixes an issue when using InjectorEgg.
This update fixes an issue when using InjectorEgg.
This module exploits a default password vulnerability in Symantec Messaging Gateway.
A Format string vulnerability in the nsrd RPC service within EMC NetWorker? allows remote attackers to execute arbitrary code via format string specifiers in a crafted message.
This fixes a misspelling in the identity.xml file.
This update fixes the failure when running this module on multiple systems.
This module exploits two vulnerabilities in HP SiteScope to gain remote code execution. The first vulnerability is an authentication bypass in the getSiteScopeConfiguration operation available through the APISiteScopeImpl AXIS service to grab the administrator credentials from the server running HP SiteScope. The second vulnerability is a directory traversal in the UploadFileHandler url that allows to upload files to the server into a directory that allows for scripting.
This update adds support to Debian 6.0.0 and adds support for attacking IPv6 targets.
This module exploits a heap overflow bug in Samba Server by sending a crafted request packet via DCERPC call.
This module exploits a heap overflow bug in Samba Server by sending a crafted request packet via DCERPC call.
TurboFTP Server is prone to a buffer-overflow when processing a malformed PORT command.
Pagination
- Previous page
- Page 40
- Next page