interbase-gds-exploit.c...

- AV AC AU C I A
发布: 2002-09-26
修订: 2025-04-13

This exploit uses a symbolic link vulnerability in the Borland Interbase gds_lock_mgr binary to overwrite /etc/xinetd.d/xinetdbd with code that spawns a root shell on port 666 TCP.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息