GenBroker runs as a Windows service on port 38080 when Iconics Genesis 32 is installed. This service is affected by an integer overflow vulnerability during the handling of inbound packets, caused by the allocation of the memory needed for the creation of an array trusting the number of elements passed by the client.
This module exploits a memory corruption in the DNS Client Service by sending a specially crafted LLMNR broadcast query to crash the service.
This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This update fixes some mistakes in the module documentation.
This module exploits a vulnerability on Microsoft Windows SMTP Server 64 bits sending a malformed DNS response from a spoofed DNS Server.
This module exploits a vulnerability on Microsoft Windows SMTP Server 64 bits sending a malformed DNS response from a spoofed DNS Server.
This module shuts down the Blackmoon FTP Server because it fails to properly handle user-supplied malformed packets.
This module adds support to Microsoft Windows 2003, Microsoft Windows Vista and Microsoft Windows Seven as a "guest OS".
This module exploits a vulnerability on Microsoft Hyper-V sending a crafted packet from the "guest OS" to the "host OS" through the vmbus mechanism.
This module exploits a vulnerability on Microsoft Hyper-V sending a crafted packet from the "guest OS" to the "host OS" through the vmbus mechanism.
This module shuts down the TYPSoft FTP Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program
VicFTPS is prone to a remote denial-of-service vulnerability because the application fails to handle exceptional conditions.
Inetserv shuts down the POP3 Server because it fails to properly handle user-supplied malformed RETR packets.
This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application.
The flaw exists within the novell-tftp.exe component which listens by
default on UDP port 69. When handling a request the process blindly
copies user supplied data into a fixed-length buffer on the heap.
default on UDP port 69. When handling a request the process blindly
copies user supplied data into a fixed-length buffer on the heap.
Pagination
- Previous page
- Page 13
- Next page