This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing DATAC RealWin. A remote user can send specially crafted data to TCP port 910 to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing CATIA. The vulnerability is caused due to a boundary error when copying a user supplied input to a fixed size stack buffer.The copying procedure stops when a null byte is found and no size check is proceeded.
When the option imapmagicplus is activated on a Cyrus IMAP server the PROXY and LOGIN commands suffer a standard stack overflow, because the username is not checked against a maximum length when it is copied into a temporary stack buffer. This bug is exploited by this module to install an agent. Cyrus 2.2.8 and prior are vulnerable.