This module exploits a remote buffer overflow in the TSM Remote Client Agent (dsmagent) by sending a specially crafted sequence of packets to the affected application.
This module exploits a buffer overflow vulnerability in the Toolbar application, part of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted HTTP request to the ports 3443/TCP or 80/TCP of the vulnerable system and installs an agent if successful.
A heap overflow in Netscape Network Security Services (NSS) library used by the Sun ONE Web Server is exploited remotely gaining control of the execution flow on the target host.
This package updates the exploit.
This package updates the exploit.
This update improves reliability on Solaris.
This module exploits a buffer overflow vulnerability in the Shared Trace Service (ovtrcsvc.exe) of the HP OpenView application. The exploit triggers a stack-based buffer overflow by sending a specially crafted packet to port 5053/TCP of the vulnerable system and installs an agent if successful.
This module exploits a format string vulnerability in the Sun Java Web Console and installs an agent.
This module exploits a buffer overflow vulnerability when parsing RPC requests through the LSA RPC interface in Samba 3.x. The exploit is triggered by sending a specially crafted RPC LsarLookupSids request to a vulnerable computer.
This is a remote exploit for an Authentication bypass vulnerability present in telnetd daemon for Solaris 10.
An error handling mechanism in the kernel of Mac OS X, provides the ability to control programs when certain types of errors are encountered. This module uses this mechanism to execute arbitrary code in privileged programs if an error is encountered.
Pagination
- Previous page
- Page 8