This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Simple Web Server. The vulnerability is caused due to a boundary error within Simple Web Server when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. Authentication is not required to exploit this vulnerability.
This module exploits a remote stack-based buffer overflow in Siemens Tecnomatix FactoryLink by sending a malformed packet to CSService listening on port 7580.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing SIELCO SISTEMI Winlog when Run TCP/IP server is enabled in CONFIGURATION-OPTIONS-TCP/IP. The vulnerability is caused due to a boundary error within SIELCO SISTEMI Winlog when processing a malformed request. This can be exploited to cause a stack-based buffer overflow in Runtime.exe via a crafted 0x02 opcode packet. Authentication is not required to exploit this vulnerability.
This module exploits a buffer overflow vulnerability in the LDAP service (sidvault.exe) of the SIDVault LDAP application. The exploit triggers a stack-based buffer overflow by sending a specially crafted packet to port 389/TCP of the vulnerable system and installs an agent if successful.
This module exploits a stack overflow in Serv-U Web Client by sending a specially crafted POST request.
Serv-U supports an FTP command, "MDTM", which is used to change a file's modification time. An internal memory buffer may be overrun while handling an malformed time zone as MDTM argument. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the serv-u process, typically administrator or system. The Serv-U server will be left inaccessible after successful exploitation.
An internal memory buffer may be overrun while handling "site chmod" command with an overly long filename. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the serv-u process, typically administrator or system. This bug requires the FTP user to have write privileges on at least one directory to be exploited. The Serv-U server will be left inaccessible after successful exploitation.
The Modbus Serial Driver creates a listener on Port 27700/TCP. When a connection is made, the Modbus Application Header is first read into a buffer. If a large buffer size is specified in this header, a stack-based buffer overflow can be done.
This Stack-based buffer overflow exploits a vulnerability in Schneider Electric's Interactive Graphical SCADA System (IGSS) that allows remote attackers to execute arbitrary code by sending a specially crafted packet to TCP port-12397.
This module exploits a heap overflow vulnerability in the Schneider Electric Accutech Manager Server by sending a malformed packet to the 2537/TCP port to crash the application.
Pagination
- Previous page
- Page 65
- Next page