This module exploits a stack buffer overflow in MOXA MDM Tool 2.1. When sending a specially crafted MDMGw (MDM2_Gateway) response, an attacker may be able to execute arbitrary code.
This module exploits a stack buffer overflow in the svchost service, when the netware client service is running. This specific vulnerability is in the nwapi32.dll module.
This exploits a buffer overflow found in the nsiislog.dll ISAPI filter that comes with Windows Media Server. This module will also work against the 'patched' MS03-019 version. This vulnerability was addressed by MS03-022.
This module exploits a buffer overflow in SIPfoundry's sipXezPhone version 0.35a. By sending a long CSeq header, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application.
This module exploits a stack buffer overflow in TFTPD32 version 2.21 and prior. By sending a request for an overly long file name to the tftpd32 server, a remote attacker could overflow a buffer and execute arbitrary code on the system.
This module exploits a stack buffer overflow in Oracle 8i. When sending a specially crafted packet containing an overly long ARGUMENTS string to the TNS service, an attacker may be able to execute arbitrary code.
The mpg123-0.59r program is vulnerable to a denial of service attack. When playing a specific evil song, the program crashes due to a SIGSEGV signal. The exact cause of the vulnerability is unknown and further investigation is required.
This module exploits a directory traversal vulnerability in Motorola's Timbuktu Pro for Windows 8.6.5.
This module attempts to exploit a buffer overflow vulnerability present in versions 2.2.2 through 2.2.6 of Samba. The Samba developers report this as: 'Bug in the length checking for encrypted password change requests from clients.' The bug was discovered and reported by the Debian Samba Maintainers.
This module can be used to install a WAR file payload on JBoss servers that have an exposed 'jmx-console' application. The payload is put on the server by using the jboss.system:BSHDeployer's createScriptDeployment() method.