This module exploits a command injection vulnerability in Interactive Graphical SCADA System and install an agent into the target machine.
IBM Lotus iNotes ActiveX control dwa85W.dll is vulnerable to a buffer overflow via a long argument to the Attachment_Times method.
The vulnerability is caused due to a boundary error within the handling of HTTP request.
A buffer overflow in the ActiveX control qp2.cab in IBM Lotus Quickr for Domino allows remote attackers to execute arbitrary code via a long argument to the Attachment_Times method.
The vulnerability exists within the QuickTimeVR.qtx component when processing a QTVRStringAtom having an overly large "stringLength" parameter. This can be exploited to cause a based buffer overflow and execute arbitrary code under the context of the user running the application.
This update adds support for Internet Explorer 6 and 8 and bypass DEP.
Also allows to send the mov file by email to open it directly with QuickTimePlayer.
This update adds support for Internet Explorer 6 and 8 and bypass DEP.
Also allows to send the mov file by email to open it directly with QuickTimePlayer.
The vulnerability is caused due to a boundary error within Simple Web Server when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
A stack buffer overflow exist in FlexNet License Server Manager due to the insecure usage of memcpy in the lmgrd service when handling crafted network packets.
The vulnerability is caused due to an error when processing qcd chunk structure.
This vulnerability exists within the tm1admsd.exe component Of IBM Cognos TM1. This process listens on TCP port 5498 by default. Multiple opcodes fail to validate user supplied length and data fields before copying their contents to a fixed length buffer on the stack.
Unsafe type handling performed by the AtomicReferenceArray class of the Oracle Java Runtime Environment can be abused to cause a type confusion error.
This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.
This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user.
Pagination
- Previous page
- Page 104
- Next page