16 results (0.010 seconds)

CVSS: 10.0EPSS: 16%CPEs: 1EXPL: 1

Stack-based buffer overflow in the database service (ibserver.exe) in Borland InterBase 2007 SP2 allows remote attackers to execute arbitrary code via a malformed opcode 0x52 request to TCP port 3050. NOTE: this might overlap CVE-2007-5243 or CVE-2007-5244. Desbordamiento de búfer basado en pila en el servicio de base de datos (ibserver.exe) de Borland InterBase 2007 SP2 permite a atacantes remotos ejecutar código de su elección a través de una petición opcode 0x52 malformada del puerto TCP 3050. NOTA: esto puede solapar CVE-2007-5243 o CVE-2007-5244. • https://www.exploit-db.com/exploits/5427 http://www.securityfocus.com/archive/1/490752/100/0/threaded http://www.securityfocus.com/bid/28730 http://www.securitytracker.com/id?1019834 https://exchange.xforce.ibmcloud.com/vulnerabilities/41932 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 73%CPEs: 1EXPL: 1

Stack-based buffer overflow in the PGMWebHandler::parse_request function in the StarTeam Multicast Service component (STMulticastService) 6.4 in Borland CaliberRM 2006 allows remote attackers to execute arbitrary code via a large HTTP request. Desbordamiento de búfer basado en pila en la función PGMWebHandler::parse_request del componente StarTeam Multicast Service (STMulticastService) 6.4 en Borland CaliberRM 2006 permite a atacantes remotos ejecutar código de su elección a través de una petición HTTP grande. • https://www.exploit-db.com/exploits/16434 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=675 http://secunia.com/advisories/29631 http://securitytracker.com/id?1019786 http://www.securityfocus.com/bid/28602 http://www.vupen.com/english/advisories/2008/1100 https://exchange.xforce.ibmcloud.com/vulnerabilities/41647 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 64%CPEs: 3EXPL: 6

Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through 8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote attackers to execute arbitrary code via a long attach request on TCP port 3050 to the open_marker_file function. Desbordamiento de búfer basado en pila en Borland InterBase LI 8.0.0.53 hasta la 8.1.0.253 sobre Linux, y posiblemente en versiones no especificadas sobre Solaris, permite a atacantes remotos ejecutar código de su elección a través de una respuesta adjunta larga sobre el puerto TCP 3050 en la función open_marker_file. • https://www.exploit-db.com/exploits/10019 https://www.exploit-db.com/exploits/16840 http://osvdb.org/38610 http://risesecurity.org/advisory/RISE-2007002 http://risesecurity.org/blog/entry/3 http://risesecurity.org/exploit/11 http://secunia.com/advisories/27058 http://www.securityfocus.com/bid/25917 http://www.securitytracker.com/id?1018772 http://www.vupen.com/english/advisories/2007/3381 https://exchange.xforce.ibmcloud.com/vulnerabilities/36956 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 47%CPEs: 17EXPL: 16

Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53 through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers to execute arbitrary code via (1) a long service attach request on TCP port 3050 to the (a) SVC_attach or (b) INET_connect function, (2) a long create request on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function, (3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f) PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database or (5) expand_filename2 function. Múltiples desbordamientos de búfer basados en pila en Borland InterBase LI 8.0.0.53 hasta 8.1.0.253, y WI 5.1.1.680 hasta 8.1.0.257, permite a atacantes remotos ejecutar código de su elección mediante (1) una petición larga de anexión a servicio en el puerto TCP 3050 a las funciones (a) SVC_attach o (b) INET_connect, (2) una petición larga de creación en el puerto TCP 3050 a las funciones (c) isc_create_database o (d) jrd8_create_database, (3) una petición de anexión larga en el puerto TCP 3050 a las funciones (e) isc_attach_database o (f) PWD_db_aliased, o vectores no especificados que involucran a las funciones (4) jrd8_attach_database o (5) expand_filename2. • https://www.exploit-db.com/exploits/16843 https://www.exploit-db.com/exploits/16844 https://www.exploit-db.com/exploits/10020 https://www.exploit-db.com/exploits/16839 https://www.exploit-db.com/exploits/10021 https://www.exploit-db.com/exploits/9954 https://www.exploit-db.com/exploits/16437 https://www.exploit-db.com/exploits/16447 https://www.exploit-db.com/exploits/16449 https://www.exploit-db.com/exploits/16440 https://www.exploit-db.com/exploits/16432 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 90%CPEs: 1EXPL: 1

Stack-based buffer overflow in the database service (ibserver.exe) in Borland InterBase 2007 before SP2 allows remote attackers to execute arbitrary code via a long size value in a create request to port 3050/tcp. Desbordamiento de búfer basado en pila en el servicio de base de datos (ibserver.exe) del Borland InterBase 2007 anterior al SP2 permite a atacantes remotos ejecutar código de su elección a través de un valor de tamaño grande en una petición "create" al puerto 3050/tcp. • https://www.exploit-db.com/exploits/16453 http://dvlabs.tippingpoint.com/advisory/TPTI-07-13 http://dvlabs.tippingpoint.com/blog/2007/07/24/step-by-step-of-how-tpti-07-013-was-discovered http://osvdb.org/38602 http://secunia.com/advisories/26189 http://securityreason.com/securityalert/2929 http://www.codegear.com/downloads/regusers/interbase http://www.securityfocus.com/archive/1/474561/100/0/threaded http://www.securityfocus.com/bid/25048 http://www.securitytracker.com/id& •