There is a vulnerability in the message dispatcher used by FSSO Windows Active Directory and FSSO Novell eDirectory The software installs a service which by default listens on port 8000 TCP. By sending a specially crafted packet it is possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the FSSO user, which is generally a Windows AD domain user
This module exploits a remote stack-based buffer overflow in FlexNet License Server Managerby sending a malformed packet to the 27000/TCP port.
This module exploits a remote format string vulnerability in FireFly Media Server by sending a sequence of HTTP requests to the 3689/TCP port.
This module exploits a buffer overflow vulnerability in the database service (fbserver.exe) of the FireBird SQL application. The exploit triggers a stack-based buffer overflow by sending a specially crafted "username" value to port 3050/TCP of the vulnerable system and installs an agent if successful.
This module exploits a buffer overflow vulnerability in the database service (fbserver.exe) of the FireBird SQL application. The exploit triggers a stack-based buffer overflow by sending a specially crafted "create" request to port 3050/TCP of the vulnerable system and installs an agent if successful.
This module exploits a remote buffer overflow in Firebird SQL by sending a malformed packet to the 3050/TCP port.
An internal memory buffer may be overrun while handling "HEAD" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the FileSharingWizard.exe process.
This vulnerability allows remote attackers to execute arbitrary code on installations of FileCopa FTP Server, which can be exploited by malicious people to compromise a vulnerable system. FileCopa FTP Server is prone to a buffer-overflow vulnerability when handling data through the LIST command, a large amount of data can trigger an overflow in a finite-sized internal memory buffer. Successful login in the ftp server is required to exploit this vulnerability. Anonymous user is enabled by default.
A stack overflow found in EZHomeTech EzServer by supplying a packet with an overly long string.
The Dovecot documentation contains an example using a dangerous configuration option for Exim, which leads to a remote command execution vulnerability.
Pagination
- Previous page
- Page 61
- Next page