In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
Heap buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
This module exploits a buffer overflow vulnerability in PCMan FTP Server. This vulnerability can be exploited remotely by sending a specially crafted USER command to port TCP/21.
This module also know as EternalRomance exploits the ms17-010 vulnerability by taking advantage of a remote pool overflow in the smb transaction handling code of the windows smb driver. You will need to provide windows credentials in order to exploit the remote host. This module should never crash a target, so if the exploit does not work probably its because the credentials were wrong.
HP Intelligent Management Center is prone to a remote vulnerability that allows attackers to execute commands under the context of system.
Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 7.2 allows remote attackers to execute arbitrary code via a malicious login request to forum.ghp
A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated remote attacker, to execute arbitrary commands with SYSTEM user privileges. This module will access the specified remote target using SMB, and install an agent with SYSTEM user privileges.
AVEVA InduSoft Web Studio is prone to a remote vulnerability that allows attackers to execute commands under the context of de program user.
Advantech WebAccess is prone to a remote vulnerability that allows attackers to execute commands under the context of de program user.
Advantech WebAccess is prone to a buffer overflow vulnerability on the RPC interface that could permit the execution of arbitrary remote code. A remote attacker can exploit this vulnerability to execute arbitrary code and completely compromise the computer.
Pagination
- Previous page
- Page 9
- Next page