This module allows arbitrary command execution on an ephemeral port opened by Veritas NetBackup, whilst an administrator is authenticated. The port is opened and allows direct console access as root or SYSTEM from any source address.
This module exploits a stack overflow in the NetWare CIFS.NLM driver. Since the driver runs in the kernel space, a failed exploit attempt can cause the OS to reboot.
This exploits the buffer overflow found in Samba versions 2.2.0 to 2.2.8. This particular module is capable of exploiting the bug on Mac OS X PowerPC systems.
This module uses a documented security weakness to execute arbitrary commands on any system running distccd.
This is a remote heap overflow vulnerability in the Bakbone Netvault software. It was tested on the demo version of the software. The exploit allows an attacker to trigger a heap overflow and gain remote code execution.
The exploit allows an attacker to execute arbitrary code on a remote system running Pine version 4.56 or earlier. The exploit can be achieved using two methods: 1) standard shellcode and 2) ret to libc. The details of the exploit can be found in the iDefense advisory: http://www.idefense.com/advisory/09.10.03.txt. The exploit requires the distance from a variable to the EIP/EBP register, which can be bruteforced to achieve a high success rate. The exploit can be used to create a worm or gain control over the target system.
This exploit takes advantage of a buffer overflow vulnerability in MiniShare HTTP Server 1.5.5. It allows an attacker to execute arbitrary code on the targeted system.
This exploit allows an attacker to retrieve the admin MD5 hash and username from a PhotoPost application by sending a specially crafted HTTP request.
When downloading files through Firefox and choosing the "Open with" option, Firefox will create a temporary file in the form of RANDOM.part. When the download completes, Firefox saves the completed file in the "/tmp" directory as its original filename and opens it with the program's handler. However, if there is already a file with an identical filename in the temporary file directory, Firefox saves and opens the newly downloaded file using a naming scheme that appends a dash and the next available number in order. This vulnerability allows local users to write a malicious file with the same name as the intended file and have Firefox open it instead.