This module exploits a buffer overflow vulnerability in BigAnt IM Server. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/6661.
This module exploits a buffer overflow vulnerability in BigAnt IM Server. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/6661.
This module exploits a buffer overflow vulnerability in Bifrost Server. This vulnerability can be exploited remotely by sending a specially crafted packet to port TCP/81.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing MiniShare. The UPS management software contains a built-in web server which allows for remote management of the UPS. The management interface is protected by a username and password and the authentication is performed via Basic authentication. There is a small stack-based overflow in the base64 decoding routine which handles the Basic authentication data. Authentication is not required to exploit this vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing BadBlue. The vulnerability is caused due to a boundary error in ext.dll when processing an overly long PassThru command. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command.
A Buffer Overflow exist in DAQFactory service who listens on the UDP port 20034 when logs the informations of the incoming NETB packets.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing AVID Media Composer. A remote user can send specially crafted data to TCP port 4659/4660 (AvidPhoneticIndexer.exe) to trigger a stack overflow and execute arbitrary code on the target system.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Avaya Windows Portable Device Manager (WinPDM). A remote user can send specially crafted data to UDP port 3217 (UniteHostRouter.EXE) to trigger a stack overflow and execute arbitrary code on the target system.
This module upload and execute a file in Avaya IP Office and installs an agent into the target host.
This module exploits a buffer overflow vulnerability during the processing of TFTP Read/Write request packet types. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted packet with an overly long filename field.
Pagination
- Previous page
- Page 97
- Next page