SlimFTPd server is prone to a stack buffer overflow when sending a LIST command with an overly-long argument. The attacker needs to be authenticated, so a successful login is required for the exploit to work.
An internal memory buffer may be overrun while handling long "USER" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the NetTerm NetFTPD.exe process.
A buffer overflow vulnerability when handling MP4 files that lead to code execution.
Traq is vulnerable to an authentication bypass vulnerability, this module exploits this vulnerability in order to install a plugin hook to ultimately install an agent in the target host.
This module sends HTTP requests with specially crafted data making the ASP.NET subsystem consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational.
This update fixes an issue when launching the module from an agent running in a Linux system.
This update fixes an issue when launching the module from an agent running in a Linux system.
A stack based buffer overflow in the SNMP NetDBServer service of Sunway Forcecontrol is triggered when sending an overly long string to the listening service on port 2001.
The flaw exists within the awhost32 component which is used when handling incoming connections. This process listens on TCP port 5631. When handling an authentication request the process copies the user supplied username unsafely to a fixed-length buffer.
The SSL protocol encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack on an HTTPS session.
This module attacks the SSLv3 implementation in the Oracle Java Runtime Enviroment. The module is capable of obtaining encrypted cookies from browsers running the affected Java Runtimes.
This module attacks the SSLv3 implementation in the Oracle Java Runtime Enviroment. The module is capable of obtaining encrypted cookies from browsers running the affected Java Runtimes.
TFTP Server is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before storing it in a finite-sized buffer.
This module sends HTTP requests with specially crafted data making the
PHP interpreter to consume lot of resources. This attack prevents the
victim server from processing requests from legitimate clients and
probably will make the server non-operational.
This is update fixes an issue when launching the module from an agent running in a linux system.
PHP interpreter to consume lot of resources. This attack prevents the
victim server from processing requests from legitimate clients and
probably will make the server non-operational.
This is update fixes an issue when launching the module from an agent running in a linux system.
Pagination
- Previous page
- Page 79
- Next page