Metasploit modules that can be used to exploit IBM » Security Access Manager For Enterprise Single Sign-on
-
Exim GHOST (glibc gethostbyname) Buffer Overflow
Disclosure Date: 2015-01-27First seen: 2020-04-26exploit/linux/smtp/exim_gethostbyname_bofThis module remotely exploits CVE-2015-0235, aka GHOST, a heap-based buffer overflow in the GNU C Library's gethostbyname functions on x86 and x86_64 GNU/Linux systems that run the Exim mail server. Authors: - Unknown -
WordPress XMLRPC GHOST Vulnerability Scanner
First seen: 2020-04-26auxiliary/scanner/http/wordpress_ghost_scannerThis module can be used to determine hosts vulnerable to the GHOST vulnerability via a call to the WordPress XMLRPC interface. If the target is vulnerable, the system will segfault and return a server error. On patched systems, a normal XMLRPC error is returned. Authors: - Robert Rowley - Christophe De La Fuente - Chaim Sanders - Felipe Costa - Jonathan Claudius - Karl Sigler - Christian Mehlmauer <FireFart@gmail.com>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details