3 results (0.005 seconds)

CVSS: 10.0EPSS: 4%CPEs: 49EXPL: 0

Heap-based buffer overflow in the iGateway service for various Computer Associates (CA) iTechnology products, in iTechnology iGateway before 4.0.051230, allows remote attackers to execute arbitrary code via an HTTP request with a negative Content-Length field. • http://marc.info/?l=full-disclosure&m=113803349715927&w=2 http://secunia.com/advisories/18591 http://securityreason.com/securityalert/380 http://securitytracker.com/id?1015526 http://supportconnectw.ca.com/public/ca_common_docs/igatewaysecurity_notice.asp http://www.idefense.com/intelligence/vulnerabilities/display.php?id=376 http://www.osvdb.org/22688 http://www.securityfocus.com/archive/1/423288/100/0/threaded http://www.securityfocus.com/archive/1/423403/100/0/threaded http:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 18%CPEs: 26EXPL: 3

Buffer overflow in the Discovery Service in BrightStor ARCserve Backup 9.0 through 11.1 allows remote attackers to execute arbitrary commands via a large packet to TCP port 41523, a different vulnerability than CVE-2005-0260. • https://www.exploit-db.com/exploits/815 https://www.exploit-db.com/exploits/16408 http://archives.neohapsis.com/archives/bugtraq/2005-02/0123.html http://archives.neohapsis.com/archives/bugtraq/2005-02/0141.html http://archives.neohapsis.com/archives/bugtraq/2005-02/0201.html http://secunia.com/advisories/14293 http://www.kb.cert.org/vuls/id/966880 http://www.osvdb.org/13814 http://www.securityfocus.com/bid/12536 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx •

CVSS: 7.5EPSS: 96%CPEs: 23EXPL: 3

Stack-based buffer overflow in the Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 allows remote attackers to execute arbitrary code via a long string sent to port (1) 6070 or (2) 6050. Desbordamiento de búfer en Backup Agent for Microsoft SQL Server in BrightStor ARCserve Backup Agent for SQL Server 11.0 permite que atacantes remotos ejecuten código arbitrario mediante el envío de una cadena larga al puerto 6070 ó 6050. • https://www.exploit-db.com/exploits/16403 https://www.exploit-db.com/exploits/1130 http://www.idefense.com/application/poi/display?id=287&type=vulnerabilities&flashstatus=true http://www.kb.cert.org/vuls/id/279774 http://www.securityfocus.com/bid/14453 http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=33239 https://exchange.xforce.ibmcloud.com/vulnerabilities/21656 •