This module exploits a buffer overflow vulnerability in BigAnt IM Server. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/6661.
This module exploits a buffer overflow vulnerability in Bifrost Server. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/81.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing MiniShare. The UPS management software contains a built-in web server which allows for remote management of the UPS. The management interface is protected by a username and password and the authentication is performed via Basic authentication. There is a small stack-based overflow in the base64 decoding routine which handles the Basic authentication data. Authentication is not required to exploit this vulnerability.
A vulnerability in GNU Bash when processing trailing strings after function definitions in the values of environment variables allows remote attackers to execute arbitrary code via a crafted environment. This vulnerability can be leveraged to bypass restricted SSH access (i.e. when the SSH server forces the execution of a specific command, ignoring any command supplied by the client, either by specifying a 'ForceCommand' directive in the 'sshd_config' file, or by using the 'command' keyword in the 'authorized_keys' file) when the default shell for the user is Bash, allowing the remote attacker to execute arbitrary commands on the vulnerable system.
A vulnerability in GNU Bash when processing trailing strings after function definitions in the values of environment variables allows remote attackers to execute arbitrary code via a crafted environment. This vulnerability can be leveraged to bypass restricted SSH access (i.e. when the SSH server forces the execution of a specific command, ignoring any command supplied by the client, either by specifying a 'ForceCommand' directive in the 'sshd_config' file, or by using the 'command' keyword in the 'authorized_keys' file) when the default shell for the user is Bash, allowing the remote attacker to execute arbitrary commands on the vulnerable system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing BadBlue. The vulnerability is caused due to a boundary error in ext.dll when processing an overly long PassThru command. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
A Buffer Overflow exist in DAQFactory service who listens on the UDP port 20034 when logs the informations of the incoming NETB packets.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing AVID Media Composer. A remote user can send specially crafted data to TCP port 4659/4660 (AvidPhoneticIndexer.exe) to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Avaya Windows Portable Device Manager (WinPDM). A remote user can send specially crafted data to UDP port 3217 (UniteHostRouter.EXE) to trigger a stack overflow and execute arbitrary code on the target system.
This module upload and execute a file in Avaya IP Office and installs an agent into the target host.
Pagination
- Previous page
- Page 70
- Next page