This module exploits a stack-based buffer overflow vulnerability in Symantec AMS Intel Handler Service and install an agent into the target machine.
This module exploits a stack-based buffer overflow vulnerability in Symantec AMS Intel Handler Service and installs an agent onto the target machine.
This module exploits a stack-based buffer overflow vulnerability in Symantec AMS Intel Alert Handler Service and install an agent into the target machine.
This module exploits a stack-based buffer overflow in the Surgemail Server 3.x
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing SurgeMail Mail Server. The vulnerability is caused due to a boundary error within SurgeMail Mail Server. A buffer overflow vulnerability is located in the function which handles the real CGI executables. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to this module.
This module exploits a local privilege escalation vulnerability in certain packages shipped with Sun xVM VirtualBox for the Linux platform. After successful exploitation an agent running as root will be installed.
After successful exploitation an agent will be deployed. This agent will inherit the user identity and capabilities of the abused service, usually root.
This module exploits a buffer overflow vulnerability in the Sun Web Server Webdav service when parsing OPTION requests. After successful exploitation an agent will be installed. The process being exploited is usually run as root.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software using Sunway Force Control SCADA. A stack based buffer overflow in the SNMP NetDBServer service of Sunway Forcecontrol is triggered when sending an overly long string to the listening service on port 2001. Authentication is not required to exploit this vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing Sunway Force Control SCADA. A buffer-overflow vulnerability affects the httpsvr.exe webserver included in the device. This issue occurs when handling an excessively large URI. Authentication is not required to exploit this vulnerability.
Pagination
- Previous page
- Page 91
- Next page