ID MSF:EXPLOIT/WINDOWS/LPD/WINCOMLPD_ADMIN Type metasploit Reporter Rapid7 Modified 2017-09-14T02:03:34
This module exploits a stack buffer overflow in WinComLPD <= 3.0.2. By sending an overly long authentication packet to the remote administration service, an attacker may be able to execute arbitrary code.
All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.If you are an owner of some content and want it to be removed, please mail to firstname.lastname@example.org Vulners, 2018