Buffer overflow in libtelnet/encrypt.c in Inetutils and Heimdal implementations of telnetd allows remote attackers to execute arbitrary code with root permissions via a long encryption key.
This module exploits a command injection error in the function runScripts in vdccm (SynCE daemon), reached through a information message remote request. For this exploit to work, there must be at least one script file on the SynCE scripts directory.
This module exploits a buffer overflow on the DCE/RPC processing in the Snort 2.6.1.2 package. For this exploit to work, the DCE/RPC Preprocessor must be active on the configuration file, snort.conf. The agent will normally run as the "root" user.
The vulnerability is caused due to a boundary error while reading Telnet IAC. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted telnet IAC to the affected server.
A backdoor introduced by attackers allows unauthenticated users remote root access to systems which run the maliciously modified version of the ProFTPD daemon.
This module exploits a remote command execution vulnerability in the Zope web application server used by Plone, by sending a specially crafted HTTP request to the affected web site. The vulnerability exists because it is possible to remotely invoke the popen2 function from the Python os package with arbitrary arguments in the context of the affected server. This can be exploited by remote unauthenticated attackers to execute arbitrary code on the target machine.
This module exploits an argument injection vulnerability in PHP up to version 5.3.12 and 5.4.2 when running as a standalone CGI processor and takes advantage of the -d flag to achieve remote code execution.
The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
This module exploits a remote buffer-overflow in MySQL servers using the yaSSL library. The overflow is located in the 'ProcessOldClientHello' function on the yaSSL library.
A backdoor introduced in the source code of MyBB 1.6.4 allows remote unauthenticated attackers to execute arbitrary PHP code on systems running vulnerable installations of MyBB.
Pagination
- Previous page
- Page 2
- Next page