This module exploits a buffer overflow in the arguments of the Oracle Service Listener commands.
This module exploits a vulnerability in the Client System Analyzer component of the Oracle Database Server.
This module exploits a stack based buffer overflow in the Oracle process. This is done by sending an 'AUTH_SESSKEY' property longer than the 64 bytes expected.
The vulnerability is caused due to a boundary error within the authentication process. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted password to the affected server.
Omni-NFS Enterprise is a suite of network related tools, including an NFS Server. That server is vulnerable to stack-based buffer overflow caused by malicious NFS requests, and this module exploits that vulnerability in order to install an agent on the target machine.
Omni-NFS Enterprise is a suite of network related tools, including an FTP Server. That server is vulnerable to stack-based buffer overflow caused by malicious FTP requests, and this module exploits that vulnerability in order to install an agent on the target machine.
A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing the web interface of Now SMS MMS Gateway. The vulnerability is caused due to a boundary error within Now SMS MMS Gateway web interface which listens on port 8800 and allows the users to use the gateway for sending various types of messages. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the web interface. Authentication is not required to exploit this vulnerability.
This module exploits a vulnerability in the Novell ZENworks Mobile Management application by injecting code in the PHP session file and leveraging a Local File Inclusion in mdm.php to execute the injected PHP code. The agent installed by this exploit will run with the privileges of the "IUSR" user.
A remote code execution vulnerability in the UploadServlet component of Novell ZENworks Configuration Management allows remote attackers to execute arbitrary code. This module uploads an arbitrary .WAR file on the target in order to deploy an agent on it.
This module exploits a remote stack-based buffer overflow vulnerability in the Preboot Service component of Novell ZENworks Configuration Management, by sending a specially crafted packet to the port 998/TCP.
Pagination
- Previous page
- Page 70
- Next page