This package updates the Arkeia Network Backup exploit.
This update fixes an issue with the 'reuse connection' mode on Impact V7.5
This module exploits a integer overflow condition on local X.org servers with MIT-SHM extension activated.
Exploits a missing verification of parameters within the vmsplice_to_user(), copy_from_user_mmap_sem(), and get_iovec_page_array() functions in fs/splice.c before using them to perform certain memory operations. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted vmsplice() system call, and allows an unprivileged process to elevate privileges to root.
This module exploits a stack buffer overflow vulnerability in the Sourcefire Snort DCE/RPC preprocessor. An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code with the privileges of the Snort process.
This update adds support for Redhat Enterprise Linux 4 and FreeBSD 6.2 on Impact 7.5
This update adds support for Redhat Enterprise Linux 4 and FreeBSD 6.2 on Impact 7.5
This update adds support for Linux, Freebsd and additional MySQL versions.
This update adds the vulnerability name to reports.
This module exploits a remote buffer-overflow in MySQL servers using yaSSL.
This module exploits a command injection error in the function runScripts in vdccm (SynCE daemon), reached through an information message remote request.
This module exploits a vulnerability in ISC DHCP Server. The vulnerability is caused due to the improper handling of DHCP requests within dhcpd in the cons_options() function in options.c. This causes a stack-based buffer corruption by sending a specially crafted DHCP request specifying a maximum message size smaller than 278 bytes.
This update adds support for Linux.
This update adds support for Linux.
Pagination
- Previous page
- Page 52
- Next page