A boundary error exists in the dhost.dll component of Novell eDirectory post authentication when processing list of modules. This can be exploited to cause a stack-based buffer overflow via a specially crafted request with an overly long module name.
This module exploits a remote buffer overflow in Novell eDirectory by sending a malformed packet to the 524/TCP port.
A boundary error exists in the HTTP Protocol Stack (httpstk) component of iMonitor within the "BuildRedirectURL()" function when processing "Host" HTTP headers. This can be exploited to cause a stack-based buffer overflow via a specially crafted request with an overly long "Host" header.
This module exploits a vulnerability in Novell Netware Client when sending a specially crafted RPC packet over the XTIERRPCPIPE named pipe.
This module exploits a stack overflow condition by sending a specially long crafted packet to a NJStar MiniSMTP server.
This module exploits a remote buffer overflow in Nginx by sending a malformed chunked request.
This vulnerability allows remote attackers to execute arbitrary code on installations of Net Transport Server, which can be exploited by malicious people to compromise a vulnerable system. Net Transport is prone to a stack-based buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data.
An internal memory buffer may be overrun while handling long "USER" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the NetTerm NetFTPD.exe process. FreeFTPD will be left inaccessible after successful exploitation.
This module exploits a stack based buffer overflow in Netsupport Agent via a long control hostname to TCP port 5405.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Netmechanica NetDecision HTTP Server. A buffer overflow in NetDecision's HTTP service is exploited when a long URL is managed by the HTTP Server's active window. For successfull exploitation, the victim need to have the HttpSvr's window open. Authentication is not required to exploit this vulnerability.
Pagination
- Previous page
- Page 104
- Next page