This module exploits a vulnerability in Java Bridge component of Zend Server.
Insufficient sanitization in WebCalendar's /includes/settings.php lead to remote dcode execution.
The Administration Console of Oracle GlassFish Server is prone to a authentication bypass vulnerability, which can be achieved by performing HTTP TRACE requests. A remote unauthenticated attacker can exploit this to execute arbitrary code on a vulnerable server. This module will create a backdoor administrator account in the Administration Console of Oracle GlassFish and then deploy a .WAR application in order to install an agent on the target server.
This module exploits a stack based buffer overflow in Netsupport Agent via a long control hostname to TCP port 5405.
This module exploits a command injection error in the function _AddPrinterW in Samba 3, reached through an AddPrinter remote request. For this exploit to work, the "addprinter command" option must be enabled on smb.conf, the samba configuration file. The agent will normally run as the "nobody" user, and will have limited capabilities.
This module exploits a buffer overflow vulnerability in the mDNSResponder service running on certain versions of Apple Mac OS X. The vulnerability is exploited remotely by sending a specially crafted UPnP Internet Gateway Device (IGD) packet and installing an agent.
The vulnerability is caused due to a boundary error in the included web server when processing HTTP requests. This can be exploited to cause a stack-based buffer overflow via an overly long GET request.
This module sends to the target a crafted NetWkstaTransportEnum SMB Request exploiting a heap overflow.
This module exploits an arbitrary index array vulnerability in the cupsd service when parsing HPGL filetypes running on certain versions of Apple Mac OS X and Linux. The vulnerability is exploited remotely by sending a specially crafted IPP request packet to install an agent.
The best practice for web applications built on top of the Apache Struts 2 framework is to switch off Developer Mode (struts.devMode parameter in the struts.xml configuration file) before going into production. When devMode is left enabled, attackers can gain remote code execution by setting the 'debug=command' URL parameter and sending OGNL expressions through the 'expression' URL parameter. This module takes advantage of this misconfiguration scenario in order to deploy an agent in the target system.
Pagination
- Previous page
- Page 3
- Next page