The vulnerability is a buffer overflow in the mount daemons logging code which is supposed to log unauthorized mount attempts. This allows remote attackers to execute arbitrary code or cause a denial of service.
The vulnerability allows an attacker to display and delete arbitrary files on the system by exploiting a URL parameter in ColdFusion. The attacker can also upload and execute ColdFusion files without them being deleted.
The MetaWeb server bundled with MetaInfo products does not restrict access to the root directory, allowing an attacker to retrieve known files by using the /../ notation to escape to higher levels of the file structure. This vulnerability can be exploited through the web UIs of products like MetaIP and Sendmail, and can be used to retrieve sensitive files such as password files.
It is possible to run arbitrary code on any Intel machine running Cheyenne Inoculan version 4.0 for Windows NT prior to SP2. Inoculan runs as a service, called "Cheyenne InocuLAN Anti-Virus Server". When it starts, it replaces any shared directory with the same name and shares "CHEYUPD$" with full control for the everyone group. When the service starts, it does an update check in this directory (usually "C:InoculanUpdate") using the files ""<NtBox>CHEYUPD$EnglishNtIntelReadyfilelist.txt"" and [idem]...avh32dll.dll. Simply ""touching"" or modifying the file ""filelist.txt"" to look younger than real causes the update. The update causes the service to stop
A bug in the Advance Micro Devices K6 processor allows non-privileged code to crash the machine. The exploit code provided demonstrates how this can be achieved by accessing an invalid address that resembles an already cached address. The bug can be triggered by loading the address of something in a deep cache on the CPU, such as the _start function. The vulnerability can be mitigated under Linux 2.1.x.
There exists a buffer overflow in Lynx's built-in mailer that can be exploited when the victim tries to follow a hyperlink. Lynx makes blind assumption on e-mail address length, and sprintfs it into 512-bytes long buffer. The vulnerability is in LMail.c as part of the processing of "mailto:" URLs. The overflow can be triggered by using a 'mailto' hyperlink with a large amount of data, specifically over 2 kB of 'A's. This can lead to arbitrary code execution or a denial of service.
This exploit allows remote attackers to include and execute arbitrary files on the affected server.
There is a buffer overflow vulnerability in Qualcomm's Eudora Internet Mail Server. By connecting to its TCP port number 106 and issuing the USER command followed by a string over a thousand bytes in length, the server can crash, potentially causing the machine to go down.
There exists a buffer overflow in fingerd that allows a remote attacker to execute any local binaries.
This exploit allows an attacker to upload arbitrary files to a vulnerable Wordpress plugin called content-flow3d. The attacker needs to provide the target URL as a command-line argument. The exploit uses cURL to send a POST request to the upload.php file of the plugin with a file named bazinga.php.jpg. The exploit is tested on CentOS and Ubuntu Server 11.04.