This module exploits a stack-based buffer overflow in Mailenable smtp for Windows, allowing remote attackers to execute arbitrary code via AUTH command input.
This module exploits a heap based buffer overflow handling the X-LINK2STATE command in the SMTP service of Exchange Server.
This module exploits a stack-based buffer overflow in CA BrightStor ARCserve Backup for Windows and installs a level0 agent.
This module exploits a buffer overflow in the status command of MailEnable and installs an agent. The status command requires an authenticated session, so valid credentials are required.
This module exploits a stack buffer overflow in the Microsoft Windows Plug and Play service and installs a level0 agent (MS05-039).
This module exploits a vulnerability in the memory_limit function in PHP and installs a level0 agent.
By sending a specially crafted SMB packet, this exploit performs a Denial of Service attack on the target machine.
This module exploits a buffer overflow in the Message Queuing component of Microsoft Windows allowing remote attackers to execute arbitrary code via a crafted message and installing an agent.
This module exploits a stack buffer overflow in the MySQL MaxDB WebTool Server and installs a level0 agent.
Pagination
- Previous page
- Page 100