GIMP is prone to a buffer overlow when a specially crafted packet is sent to its Script-Fu Server service. This allows a remote attacker to execute arbitrary code on vulnerable installations of the application.
This module exploits a remote buffer overflow vulnerability in the ihDataArchiver.exe service included in several GE SCADA applications by sending a malformed packet to the 14000/TCP port.
This module exploits a buffer overflow in FutureSoft TFTP Server, that allows remote attackers to execute arbitrary code via a long malformed filename and installs an agent if successful.
This module exploits a remote buffer overflow in the Fujitsu SystemcastWizard application by sending a specially crafted packet to the port 4011/UDP.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Free Download Manager Control Server. The vulnerability is caused due to a boundary error within Free Download Manager Control Server when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
A vulnerability in the freeSSHd SSH Server allows remote attackers to bypass authentication via a crafted session. This module exploits the vulnerability and installs an agent into the target host.
An internal memory buffer may be overrun while handling long "USER" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the FreeFTPdService.exe process. FreeFTPD will be left inaccessible after successful exploitation.
An internal memory buffer may be overrun while handling long "PASS" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the FreeFTPdService.exe process. FreeFTPD will be left inaccessible after successful exploitation.
FreeFloat FTP server is prone to a buffer-overflow vulnerability when handling overly long replies.
There is a vulnerability in the message dispatcher used by FSSO Windows Active Directory and FSSO Novell eDirectory The software installs a service which by default listens on port 8000 TCP. By sending a specially crafted packet it is possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the FSSO user, which is generally a Windows AD domain user
Pagination
- Previous page
- Page 89
- Next page