After successful exploitation, this module executes an agent as the unprivileged IUSR or IWAM user.
Iconics Genesis SCADA HMI Genbroker Server has a integer overflow vulnerabilities while handling crafted packages in opcode 0x4b0.
This module exploits a remote memory corruption on IBM Tivoli Storage Manager FastBack by sending a specially crafted sequence of packets to the affected application.
IBM Tivoli Storage is prone to a buffer overflow vulnerability that affects the FastBackMount server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the FastBackMount process.
This module exploits a remote buffer overflow in the TSM Remote Client Agent (dsmagent) by sending a specially crafted sequence of packets to the affected application.
This module exploits a stack-based buffer overflow vulnerability in IBM Tivoli Endpoint by sending a specially crafted HTTP request. The specific flaw exists within the lcfd.exe process which listens by default on TCP port 9495. To reach this page remotely authentication is required. However, by abusing a built-in account an attacker can access the restricted pages. While parsing requests to one of these, the process blindly copies the contents of a POST variable to a 256 byte stack buffer.
This module exploits a buffer overflow vulnerability in the Community Services Multiplexer (StMux.exe) by requesting a specially crafted URL.
This module exploits a stack-based buffer overflow vulnerability in IBM Lotus Domino by sending a specially crafted HTTP request to the Web Administration Interface.
This module exploits a stack-based buffer overflow in the nHTTP.exe application, a component of Lotus Domino Server, by sending an HTTP request with an invalid value for the If-Modified-Since parameter. Authentication is not required for this exploit to work.
This module exploits a remote stack-based buffer overflow vulnerability in the nrouter.exe component of IBM Lotus Domino when it parses the ORGANIZER field of an iCalendar invitation. This can be exploited by a remote, unauthenticated attacker to execute arbitrary code by sending a specially crafted e-mail with an embedded iCalendar invitation to the Lotus Domino SMTP server. In order to make the Domino server parse the crafted e-mail message, you must supply any valid e-mail address within the target Lotus Domino domain. However, note that no user interaction is required in order to exploit the vulnerability.
Pagination
- Previous page
- Page 82
- Next page