After successful exploitation an agent will be deployed with the privileges of the NTP daemon (usually root)
This module exploits a remote buffer overflow in Novell eDirectory by sending a malformed packet to the 524/TCP port.
This module exploits a remote buffer overflow in Nginx by sending a malformed chunked request.
This module exploits a stack based buffer overflow in Netsupport Agent via a long control hostname to TCP port 5405.
After successful exploitation an agent will be installed.
This module exploits a remote buffer-overflow in MySQL servers using the yaSSL library. The overflow is located in the 'ProcessOldClientHello' function on the yaSSL library.
This module exploits a remote buffer-overflow in MySQL servers using the yaSSL library. The overflow is located in the 'ProcessOldClientHello' function on the yaSSL library.
MySQL is reported prone to multiple vulnerabilities that can be exploited together by a remote authenticated attacker to execute arbitrary code. This exploit takes advantage of an input validation vulnerability that can be exploited by remote users that have INSERT and DELETE privileges on the 'mysql' administrative database.
A backdoor introduced in the source code of MyBB 1.6.4 allows remote unauthenticated attackers to execute arbitrary PHP code on systems running vulnerable installations of MyBB.
This module exploits a command injection error in the function _AddPrinterW in Samba 3, reached through an AddPrinter remote request. For this exploit to work, the "addprinter command" option must be enabled on smb.conf, the samba configuration file. The agent will normally run as the "nobody" user, and will have limited capabilities.
Pagination
- Previous page
- Page 36
- Next page