By sending a malformed 'Directory' request it is possible to create a condition where free() is called on memory that is still in use. This can result in an exploitable condition when free() is called on the memory chunk a second time.
This module exploits a buffer overflow vulnerability in CoDeSys SCADA webserver. This vulnerability can be exploited remotely by sending a specially crafted packet to port 8080.
This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port.
This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port.
This module exploits a vulnerability in Citrix NetScaler server. Citrix NetScaler is prone to a memory-corruption vulnerability when handling certain SOAP requests.
An overly long packet content directly overwrites the SEH handler for the frame allowing for control over EIP. After successful exploitation an agent will be installed.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Secure ACS UCP. The vulnerability is caused due to a boundary error within Cisco Secure ACS UCP when processing passwords with CSuserCGI.exe vulnerable module. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to this module.
The Cisco NX-OS CDPD daemon is vulnerable to a buffer overflow attack. This bug can be exploited remotely. The attack must be issued from the same local net of the target host.
preg_replace using eval switch vulnerability in html2text library, allows remote attackers to execute arbitrary code.
An internal memory buffer may be overrun while handling long "MKD" commands. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the CesarFTP process. The CesarFTP server will be left inaccessible after successful exploitation.
Pagination
- Previous page
- Page 66
- Next page