This module exploits a remote code execution vulnerability in Tomcat Manager by using an default user account to upload an arbitrary file.
This module exploits a stack-based buffer overflow in the IBM Tivoli Storage Manager Express CAD Service 5.3
Local File Inclusion vulnerability in admin/index.php in TinyWebGallery 1.7.6 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include local files via the lang parameter, which leads to execute arbitrary PHP code by injecting data into the log files.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing MiniShare. The vulnerability is caused due to a boundary error within MiniShare when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. Authentication is not required to exploit this vulnerability.
This module exploits a buffer overflow vulnerability in the handling of Error Packet for overwrite all the .bss section and some portion of the .idata section. An agent is installed if successful. This vulnerability can be exploited remotely by sending a very long TFTP Error Packet in service or standalone version.
This module exploits a buffer overflow vulnerability in the handling of Error Packet for overwrite all the .bss section and some portion of the .idata section. and installs an agent if successful. This vulnerability can be exploited remotely by sending a very long TFTP Error Packet in service or standalone version.
Buffer overflow in libtelnet/encrypt.c in Inetutils and Heimdal implementations of telnetd allows remote attackers to execute arbitrary code with root permissions via a long encryption key.
The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords.
This module exploits a stack based buffer overflow on Sysax Multi Server when parsing an overly long username at the beginning of an SSH session.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Sync Breeze Server. A remote user can send specially crafted data to TCP port 9121 to trigger a stack overflow and execute arbitrary code on the target system.
Pagination
- Previous page
- Page 89
- Next page