TrendMicro is prone to an abuse in the talker.php function to get authentication bypass, combined with the mod TMCSS user-supplied unvalidated input before using it to execute a system calls leads us to execute arbitrary code. This exploit installs an OS Agent.
This module exploits a vulnerability in Apache Struts 2. The specific vulnerability relies on the Struts 1 plugin which might allow remote attackers to execute arbitrary code via a malicious field value passed in a raw message to the ActionMessage.
This module exploits a vulnerability in NVIDIA GPU drivers. By abusing a vulnerability in the driver's DxgDdiEscape interface handler, a local attacker can trigger a kernel arbitrary write, which can be leveraged to elevate privileges.
Cisco WebEx Network Recording Player is prone to a vulnerability that may allow execution of ATTRAC32.DLL if this module is located in the same folder than .ARF file.
SysGauge Server is prone to a buffer-overflow vulnerability when handling a crafted packet, this can trigger an overflow in a finite-sized internal memory buffer, and install an agent with SYSTEM privileges.
The specific flaw exists within the implementation of the 0x2723 opcode in the DrawSrv subsystem. A untrusted pointer dereference vulnerability exists previous to a call to memcpy. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system.
AllMediaServer Enterprise is prone to a buffer-overflow vulnerability when handling a crafted packet, this can trigger an overflow in a finite-sized internal memory buffer, and install an agent with SYSTEM privileges.
This module exploits a buffer overflow on IrfanView Formats plugin when parsing a specially crafted .XCF file.
This vulnerability allows local attackers to escalate privileges on vulnerable installations of IKARUS anti.virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of crafted IOCTL by the ntguard_x64.sys kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. This module will elevate the privileges of the current agent instead of installing a new one.
This module exploits an arbitrary file upload in DotCMS to install an agent.
Pagination
- Previous page
- Page 40
- Next page