This module exploits a buffer overflow in Mozilla Firefox when parsing a malformed UTF-8 encoded URL.
This module improves several features for client side exploits.
This module exploits a XSS vulnerability in the opera:historysearch page in Opera which leads to remote command injection.
This module exploits a XSS vulnerability in the opera:historysearch page in Opera which leads to remote command injection.
This module exploits the random number generator in Debian's OpenSSL package being predictable. This vulnerability is used to generate SSH keys and to install an agent into the target host.
This update contains:
-Corrections of some documentation issues.
-Performance optimizations.
-New parameter for user's preferences.
This update contains:
-Corrections of some documentation issues.
-Performance optimizations.
-New parameter for user's preferences.
This update improves reliability on Solaris.
This module exploits a buffer overflow vulnerability in the Ghostscript software included in most Linux distributions. The vulnerability is caused by a buffer overflow in the ICC parser at the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier. The exploit is triggered when an unsuspecting user opens a specially crafted file distributed via an email.
This module exploits a buffer overflow vulnerability in the Apache Tomcat JK Web Server Connector and installs an agent. An attacker can use an overly long URL to trigger a buffer overflow in the URL work map routine (map_uri_to_worker()) in the mod_jk.so library, resulting in the compromise of the target system.
This package improves the reliability of the exploit.
This package improves the reliability of the exploit.
This module exploits the random number generator in Debian's OpenSSL package being predictable. This vulnerability is used to generate SSH keys and to install an agent into the target host.
By sending a malformed 'Directory' request it is possible to create a condition where free() is called on memory that is still in use. This can result in an exploitable condition when free() is called on the memory chunk a second time.
The agent installed by this exploit runs with administrative privileges.
This update improve the exploit reliability.
The agent installed by this exploit runs with administrative privileges.
This update improve the exploit reliability.
Pagination
- Previous page
- Page 51
- Next page