This module exploits a remote stack-based buffer overflow in Eudora Qualcomm WorldMail IMAPd Service. SEH gets overwritten when using UID command. by sending a malformed packet to the 143/TCP port.
This module exploits a remote stack-based buffer overflow in Ericom AccessNow Server by sending a malformed packet to the 8080/TCP port.
This module exploits a buffer overflow vulnerability in Enterasys NetSight. This vulnerability can be exploited remotely by sending a specially crafted packet to port UDP/514.
The best practice for installations of EMC Replication Manager is to register a Replication Manager Client (irccd.exe) instance with the appropiate Replication Manager Server (ird.exe) as soon as the client software is installed on a host. Registration is performed by Replication Manager administrators from within the Replication Manager Server. In the time span exposed before registering a Replication Manager Client instance with a Replication Manager Server, the RunProgram function of the Replication Manager Client instance can be invoked with arbitrary arguments by remote unauthenticated attackers in order to execute arbitrary code with SYSTEM privileges on the vulnerable machine. This module exploits this misconfiguration scenario in order to install an agent on machines running still unregistered instances of EMC Replication Manager Client.
This module exploits a format string vulnerability in EMC NetWorker sending a crafted package to nsrd RPC service.
This module exploits a remote code execution vulnerability in EMC Data Protection Advisor (DAP). Vulnerable installations of EMC DPA exposes the EJBInvokerServlet invoker servlet which does not require any type of authentication by default on certain profiles and allow remote attackers to invoke MBean methods and execute arbitrary code.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing EMC AutoStart. A remote user can send specially crafted data to TCP port 8045 to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing EMC AlphaStor. A remote user can send specially crafted data to TCP port 41025 to trigger a stack overflow and execute arbitrary code on the target system.
This module exploits a buffer overflow vulnerability in in the Library Control Program (LCP) in EMC AlphaStor. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/3500.
The Device Manager service (rrobotd.exe) in EMC AlphaStor is prone to an OS command injection vulnerability when processing DCP commands. A remote unauthenticated attacker can exploit this in order to execute arbitrary code with SYSTEM privileges on the vulnerable machine.
Pagination
- Previous page
- Page 126
- Next page