This module exploits a remote stack-based buffer overflow vulnerability in HP Data Protector, by sending a specially crafted packet to the port 3817/TCP, which will trigger a buffer overflow when processed by the DtbClsLogin function in the dpwindtb.dll module. Authentication is not required to exploit this vulnerability.
This module exploits a design flaw in HP Data Protector by sending a specially crafted EXEC_SETUP request.
This module exploits a remote buffer overflow in the CRS.exe service included in the HP Data Protector application by sending a malformed packet.
This module exploits a remote buffer overflow in the CRS.exe service included in the HP Data Protector application by sending a malformed packet.
This module exploits a remote buffer overflow in the CRS.exe service included in the HP Data Protector application by sending a malformed packet.
This module exploits a remote code execution vulnerability in HP AutoPass License Server. The CommunicationServlet component in HP AutoPass License Server does not enforce authentication and has a directory traversal vulnerability allowing a remote attacker to execute arbitrary code trough a JSP page uploaded to the vulnerable server.
Insufficient sanitization in GroundWork Monitor monarch_scan.cgi lead to remote code execution.
Unsafe unpickle on Graphite lead to remote code execution.
There is a buffer overflow vulnerability in the administration web server for GoodTech Telnet Server which allows remote attackers to execute arbitrary code using an specially crafted string to port 2380.
This vulnerability allows remote attackers to execute arbitrary code on installations of Golden FTP Server, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error with the handling of passwords. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted passwords passed to the affected server.
Pagination
- Previous page
- Page 122
- Next page