This module exploits a stack buffer overflow in the Computer Associates BrightStor ARCServe Backup Tape Engine service present in a function exposed as Opnum 38 of DCE-RPC interface 62b93df0-8b02-11ce-876c-00805f842837 v1.0.
This module exploits a buffer overflow vulnerability in the database service (ibserver.exe) of the Borland InterBase 2007 application. The exploit triggers an integer overflow and can cause a stack-based buffer overflow by sending a specially crafted packet to port 3050/TCP of the vulnerable system and installs an agent if successful.
This module exploits a buffer overflow vulnerability in the database service (ibserver.exe) of the Borland InterBase application. The exploit triggers a stack-based buffer overflow by sending a specially crafted "create" request to port 3050/TCP of the vulnerable system and installs an agent if successful.
This vulnerability allows remote attackers to execute arbitrary code on installations of Bopup Communications Server, which can be exploited by malicious people to compromise a vulnerable system. Bopup Communications Server is prone to a buffer-overflow vulnerability when handling a large amount of data, this can trigger an overflow in a finite-sized internal memory buffer.
An overly long header directly overwrites the SEH handler for the frame allowing for control over EIP. After successful exploitation an agent will be installed.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Blue Coat. The vulnerability is caused due to a boundary error in bcaaa-130.exe when processing an overly long command. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
A routine within the Protocol Analysis Module component that monitors ICQ server responses (used in all current ISS host, server, and network device solutions), contains a series of stack based buffer overflow vulnerabilities.
This module exploits a buffer overflow vulnerability in BigAnt IM Server. This vulnerability can be exploited remotely by uploading and executing a file.
This module exploits a vulnerability in the AntServer Module (AntServer.exe) to cause a stack-based buffer overflow, by sending a specially crafted, overly long "USV" request to the TCP port where the server is listening.
This module exploits a vulnerability in the AntServer Module (AntServer.exe) that can be exploited to cause a stack-based buffer overflow by sending a specially crafted, overly long HTTP GET request to TCP port where the server is listening.
Pagination
- Previous page
- Page 96
- Next page