A remote code execution and local elevation of privilege vulnerability exists in Plug and Play that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. This is a remote code execution and local privilege elevation vulnerability. On Windows 2000, an anonymous attacker could remotely try to exploit this vulnerability. On Windows XP Service Pack 1, only an authenticated user could remotely try to exploit this vulnerability. On Window XP Service Pack 2 and Windows Server 2003, only an administrator can remotely access the affected component. Therefore, on Windows XP Service Pack 2 and Windows Server 2003, this is strictly a local privilege elevation vulnerability. An anonymous user cannot remotely attempt to exploit this vulnerability on Windows XP Service Pack 2 and Windows Server 2003.
A remote code execution and local elevation of privilege vulnerability exists in Plug and Play that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. This is a remote code execution and local privilege elevation vulnerability. On Windows 2000, an anonymous attacker could remotely try to exploit this vulnerability. On Windows XP Service Pack 1, only an authenticated user could remotely try to exploit this vulnerability. On Window XP Service Pack 2 and Windows Server 2003, only an administrator can remotely access the affected component. Therefore, on Windows XP Service Pack 2 and Windows Server 2003, this is strictly a local privilege elevation vulnerability. An anonymous user cannot remotely attempt to exploit this vulnerability on Windows XP Service Pack 2 and Windows Server 2003.
Stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 allows local users to gain root privileges via a long LD_PRELOAD environment variable (CAN-2003-0609). This exploit uses the ret-into-ld.so technique, to effectively bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).
It is possible to remotely spoof the 'SERVER_NAME' Microsoft® Internet Information Server® 5.0, 5.1 and 6.0 server variable by doing a modified HTTP request. Thus potentially revealing sensitive ASP code through the IIS 500-100.asp error page, the spoof also opens up a potential range of exploits in third party web applications and web services.
This algorithm is the method used by the chat program Ventrilo (http://www.ventrilo.com) for encoding the UDP packets used to get the status informations.
Mercora IMRadio 4.0.0.0 stores username and passwords in the Windows Registry in plain text. A local user can read the values.
This exploit is for Infradig Systems Inframail Advantage Server Edition 6.0 (Version: 6.37). It attempts to kill the FTP server by sending a USER command with a large number of 'A' characters as a parameter. This causes a buffer overflow and the server crashes.
This exploit is for Infradig Systems Inframail Advantage Server Edition 6.0 (Version: 6.37). It uses a buffer overflow vulnerability in the SMTP server to crash the service. The exploit sends a maliciously crafted 'MAIL FROM' command with an overly long string to the server, causing it to crash.
This exploit is used to crash the IA eMailServer Corporate Edition Version 5.2.2. Build: 1051. It sends a malformed LIST command to the server which causes it to crash.
This exploit is used to crash the GoodTech SMTP Server for Windows NT/2000/XP version 5.14. It works by sending a malformed RCPT TO command to the server. This causes the server to crash and stop responding.