This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
75ccae32e6a681ca52041605578b4c74db2c5a1c796211d8a46bddd7f3d1665b
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
7ad400608089f7047729b20b5b39242d6c9b2aa7f9014358c786fa3d52c6c287
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
d3ca8564e0dac6b73da45fac60f76f4deb98eb63f6147abc4897595c43465773
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
63172546e969a58b1eeddfce0613c163b394447938646b9e5707ca94544913fb
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
6ec0d0b72e02a0c65f646f14cf76eedeab3d9199a07449c8c949412207c2f8d7
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
ab2756fdbe75cf2876139fa363d8263a33fa8d44c707093e27d9ad321e6174db
This Metasploit module exploits a buffer overflow vulnerability in adm_build_path() function of sadmind daemon.
18dec71a8c83fcf83504b2fddb72739d0a61a63af0287624b6f0d47b893416c4
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21-3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2".
acbb395a5906b68e89713da5a3ab475ec88cd94e22beb4896d17409571772f54
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
de6fac96fd0b6aa3c602b0926ac2f071a06c826a31b79903cd842f5737f7b63f
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
b80f3f01d5b09ec0df01689c15ecee32ca53ffad4905d8a3f3f94aeef0db9afb
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
f3b72345c222e40c6aaf748b6c4f32d67304fddd295a20f57eef48e39ed8ec37
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
6064154184357638969d135075df6a18b1fdd12c7031a8c3a01b541a382b4d19
This Metasploit module exploits a buffer overflow vulnerability in _tt_internal_realpath function of the ToolTalk database server (rpc.ttdbserverd).
88a4ae04dbbd87e452a4ac429ed2289e3ca47a131f8b4f30757977dc89504a85
ToolTalk suffers from a rpc.ttdbserverd _tt_internal_realpath related buffer overflow vulnerability. IBM AIX versions 5.1.0 through 6.1.3 appear affected.
444f71cdcf6793937036925f0f55f4904dc7eb7fd8ff621556e979d2148ce216
There exists a vulnerability within a function of the Sun Solstice AdminSuite sadmind, which when properly exploited can lead to remote compromise of the vulnerable system.
8ac2013b17795600d5228efb512a53587caa34b658cc30dbd1fd5363ec38e008
There exists a vulnerability within an architecture dependent function of the Apple Mac OS X 10.4.x kernel, which when properly exploited can lead to local compromise of the vulnerable system. Proof of concept code included.
a2f42affdf7e92cfb45ee12031a066c7505e5f3fb2f05c870d00879bbf8cb294
There exists multiple vulnerabilities within functions of Firebird Relational Database, which when properly exploited can lead to remote compromise of the vulnerable system.
1c86a390506eff2926bd6e4aa1194c457840db61d3266849eacf36611c21d7d8
There exists multiple vulnerabilities within functions of Borland InterBase, which when properly exploited can lead to remote compromise of the vulnerable system.
4677f1e27489c5e2f6da840db8cc4baacfe3704811d7e3fa34b629b2925dd959
This Metasploit module exploits a stack overflow in Borland Interbase 2007 by sending a specially crafted create request.
3e86d3a39bb4d94d658211aedac9393c5ed438275012efe2be5e6a027d43a17a
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the szone_free() to overwrite the size() or free() pointer in initial_malloc_zones structure. OSX version.
41df3765c835402280aab01fc03d46c9b2c7b29c3dc978680897dd0fb25af88e
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Solaris version.
de2f7abb618670f26477578d2cf35a14414c6516b9a7f7271f2d1b1d3ca0ba65
This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Linux version.
ecad9d88ed773b5eba7139281a534e16adc238b07ada385028643a4c54900d67
Remote exploit that makes use of overflows in versions 0.4.4 and below of LCDproc's daemon.
88025a702af48e6df6a33abdefbf654f1a43d47098fb37126af799e9e62b42d0
Priv8 Security Research Advisory #2004-002 - Versions 0.4.1 and below of LCDproc are vulnerable to multiple bugs that allow for arbitrary code execution.
82092cf612491eeb7dec6e405e05b133230a3034908b558a3d4ebed584972c09
Priv8 Security Research Advisory #2004-001 - All versions of LCDproc are vulnerable to a remotely exploitable buffer overflow that allows attackers to execute arbitrary code. The problem appears in function parse_all_client_messages() of parse.c file where a loop does not check if MAXARGUMENTS were reached, causing the program to crash when lots of arguments are passed to the function.
e6a3e47f9d3eb96f5fee396fb74b7e9a707654dae6aef17892ce43f2ff5ebf5c