This module exploits a remote buffer overflow vulnerability on the Calendar Manager Service Daemon.
This module exploits a vulnerability in the Oracle Database Server. The vulnerability is triggered when the server processes a long string inside the AUTH_SESSKEY property resulting in a stack-based buffer overflow.
This update adds support for Windows 2003 SP2 and Oracle 10.2.0.4.
This update adds support for Windows 2003 SP2 and Oracle 10.2.0.4.
This module exploits a buffer overflow vulnerability in the Sun Web Server Webdav service when parsing OPTION requests.
WARNING: This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as
possible to our customers that may be useful in some situations. Since
this module is not the final version it may contain bugs or have limited
functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as
possible to our customers that may be useful in some situations. Since
this module is not the final version it may contain bugs or have limited
functionality and may not have complete or accurate documentation.
Multiple vulnerabilities have been identified in Sun Java System Web Server, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by buffer overflow errors when processing malformed "TRACE" or "OPTIONS" requests, or overly long "Authorization: Digest" headers, which could be exploited by attackers to crash an affected server or execute arbitrary code. This exploit forces the server process to throw an unhandled exception and be restarted.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet. This update adds support for HP OpenView Storage Data Protector 6.0 and for Windows XP and Vista.
A remote buffer-overflow vulnerability affects Savant Web Server. This issue occurs because the application fails to validate the length of user-supplied strings before copying them into finite process buffers.
This module exploits a vulnerability in the AntServer Module
(AntServer.exe) to cause a stack-based buffer overflow, by sending a
specially crafted, overly long "USV" request to the TCP port where the
server is listening.
(AntServer.exe) to cause a stack-based buffer overflow, by sending a
specially crafted, overly long "USV" request to the TCP port where the
server is listening.
This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet.
This module exploits a buffer overflow vulnerability in the ovalarm.exe application, part of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted HTTP request to the ports 3443/TCP or 80/TCP of the vulnerable system and installs an agent if successful.
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
Pagination
- Previous page
- Page 71
- Next page