Adobe ColdFusion is vulnerable to a remote authentication-bypass, allowing the attacker to upload an agent and execute it. The agent may have SYSTEM privileges if ColdFusion is installed as a service in Windows.
Active Fax Server's FTP service has a buffer overflow vulnerability that can be exploited by a remote authenticated atacker. The bug can be triggered after the user has aunthenticated himself by sending a RETR command followed by a very large string. ActiveFax server will be left inaccessible after successful exploitation.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing ActFax Server. The vulnerability is caused due to a boundary error when processing an overly long Print Job command on the Line Printer Daemon Server (LPD-Server) . This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing ActFax Server. The vulnerability is caused due to a boundary error when processing an overly long USER name on the FTP Server. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing ActFax Raw Server. A Buffer Overflow vulnerability in ActFax Server RAW server used to transfer fax messages without protocols. Data fields. @F506,@F605, and @F000 are vulnerable.
A buffer overflow exists in RobNetScan.dll component of the Robot Communication Runtime used in some ABB programs for the communications to the IRC5, IRC5C, and IRC5P robot controllers.
A buffer overflow exists in Wserver.exe component of ABB MicroSCADA which listens on TCP port 12221.
This module exploits a remote stack-based buffer overflow in IGSSdataServer by sending a malformed packet to the 12401/TCP port.
This module exploits a vulnerability in 3S CoDeSys Gateway Server. The vulnerability can be exploited remotely by uploading and executing a file.
This module exploits a buffer overflow vulnerability during the processing of TFTP Read/Write request packet types and cause a stack-based buffer overflow by sending a specially crafted packet with an overly long mode field.
Pagination
- Previous page
- Page 73
- Next page