This exploit allows an attacker to remotely change the administrator password (or password hash) of Symantec Scan Engine.
This module exploits a buffer overflow in HP NNM's webappmon.exe. The vulnerability occurs when function 'execvp_nc' fails to do any bounds-checking before strcat is used to append user-supplied input to a buffer.
This module exploits a stack-based overflow in HP NNM's webappmon.exe. The vulnerability occurs when a long string of data is sent as OvJavaLocale's cookie value, OvWww.dll fails to properly do any bounds checking before this input is parsed in function OvWwwDebug(), which causes an overflow when sprintf_new() is called.
This module exploits a vulnerability in HP NNM's nnmRptConfig.exe. A remote user can send a long string data to the nameParams parameter via a POST request, which causes an overflow on the stack when function ov.sprintf_new() is used, and gain arbitrary code execution.
This module exploits a vulnerability in AVM2 action script virtual machine used in Adobe Flash Player versions 9.0 through 10. The AVM fails to properly verify bytecode streams prior to executing it. This can cause uninitialized memory to be executed. Utilizing heap spraying techniques to control the uninitialized memory region it is possible to execute arbitrary code. Typically Flash Player is not used as a standalone application. Often, SWF files are embeded in other file formats or specifically loaded via a web browser. Malcode was discovered in the wild which embeded a malformed SWF file within an Excel spreadsheet. This exploit is based off the byte stream found within that malcode sample.
Symantec LiveUpdate Administrator is prone to an HTML-injection vulnerability. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
The part of the server listening on port 910 is vulnerable to a buffer overflow happening in the function 004be510 that splits the input strings using some delimiters passed by the callee functions and copies them in a stack buffer of 1024 bytes. One of the ways to exploit the vulnerability in that function is through an On_FC_CONNECT_FCS_LOGIN packet containing a long username.
Iconics Genesis is a SCADA HMI solution used worldwide with customers that go from Beijing Traffic Control Center to the Pentagon and even Poste Italiane. It is the industry’s first and only fully scalable suite of OPC, SNMP, BACnet and Web-enabled HMI and SCADA applications.
CSService is a Windows service listening on port 7580. The logging function is vulnerable to a buffer-overflow caused by the usage of vsprintf with a stack buffer of 1Kb. The vulnerability can be exploited by sending a specially crafted packet to the service.
This exploit is a denial of service vulnerability in FTP servers. It sends a specially crafted packet to the FTP server which causes the server to crash. This exploit was discovered in 2008 and affects FTP servers running on Windows, Linux, and Mac platforms. The vulnerability is caused by a buffer overflow in the FTP server code which allows an attacker to send a malicious packet to the server which causes it to crash.