This module exploits a stack buffer overflow in Computer Associates BrightStor ARCserve Backup r11.1 - r11.5. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.
This exploit takes advantage of a buffer overflow vulnerability in Libxine version 1.14 or below. By providing a specially crafted MPEG file, an attacker can trigger a segmentation fault and potentially execute arbitrary code.
This is an exploit for a stack buffer overflow vulnerability in the PunyLib.dll library of Foxmail 5.0. The exploit allows remote attackers to execute arbitrary code on the target system by sending a specially crafted email.
This module exploits a weak password vulnerability in the Lyris ListManager MSDE install. During installation, the 'sa' account password is set to 'lminstall'. Once the install completes, it is set to 'lyris' followed by the process ID of the installer. This module brute forces all possible process IDs that would be used by the installer.
This module exploits a stack buffer overflow in MOXA MDM Tool 2.1. When sending a specially crafted MDMGw (MDM2_Gateway) response, an attacker may be able to execute arbitrary code.
This module exploits a stack buffer overflow in the svchost service, when the netware client service is running. This specific vulnerability is in the nwapi32.dll module.
This exploits a buffer overflow found in the nsiislog.dll ISAPI filter that comes with Windows Media Server. This module will also work against the 'patched' MS03-019 version. This vulnerability was addressed by MS03-022.
This module exploits a buffer overflow in SIPfoundry's sipXezPhone version 0.35a. By sending a long CSeq header, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application.
This module exploits a stack buffer overflow in TFTPD32 version 2.21 and prior. By sending a request for an overly long file name to the tftpd32 server, a remote attacker could overflow a buffer and execute arbitrary code on the system.
This module exploits a stack buffer overflow in Oracle 8i. When sending a specially crafted packet containing an overly long ARGUMENTS string to the TNS service, an attacker may be able to execute arbitrary code.