Section:  .. / 0910-exploits  /

Page 6 of 9
<< 1 2 3 4 5 6 7 8 9 >> Files 125 - 150 of 210
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: ypupdated_exec.rb.txt
Description:
This exploit targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request.
Author:I)ruid
File Size:2268
Related OSVDB(s):11517
Related CVE(s):CVE-1999-0209
Last Modified:Oct 28 19:28:41 2009
MD5 Checksum:cc2a467ac393cc38f358d8b11bed9cc8

 ///  File Name: pajax_remote_exec.rb.txt
Description:
RedTeam has identified two security flaws in PAJAX versions 0.5.1 and below. It is possible to execute arbitrary PHP code from unchecked user input. Additionally, it is possible to include arbitrary files on the server ending in ".class.php".
Author:Matteo Cantoni
File Size:2260
Related OSVDB(s):24618
Related CVE(s):CVE-2006-1551
Last Modified:Oct 30 14:40:19 2009
MD5 Checksum:5c46e5087345be555dac48b809d7b6d6

 ///  File Name: ib_inet_connect.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2244
Related OSVDB(s):38605
Related CVE(s):CVE-2009-5243
Last Modified:Oct 27 16:12:34 2009
MD5 Checksum:039beeb0e71e77b3753f7a53673f30bc

 ///  File Name: openview_connectednodes_exec.rb.txt
Description:
This Metasploit module exploits an arbitrary command execution vulnerability in the HP OpenView connectedNodes.ovpl CGI application. The results of the command will be displayed to the screen.
Author:Valerio Tesei
File Size:2211
Related OSVDB(s):19057
Related CVE(s):CVE-2005-2773
Last Modified:Oct 30 14:36:15 2009
MD5 Checksum:70212cc6ee078b781d5e49c11799122c

 ///  File Name: proftpd-mod_ctrls-opensuse10_2.pl.t..>
Description:
ProFTPd version 1.3.0 mod_ctrls local stack overflow root exploit that binds a shell to port 19091.
Author:Michael Domberg
Homepage:http://www.devtarget.org/
File Size:2204
Last Modified:Oct 12 17:33:09 2009
MD5 Checksum:7ae33616bc34fe84beb8bf9728dd2540

 ///  File Name: ttyprompt.rb.txt
Description:
This Metasploit module uses a buffer overflow in the Solaris 'login' application to bypass authentication in the telnet daemon.
Author:MC,cazz
File Size:2167
Related OSVDB(s):690
Related CVE(s):CVE-2001-0797
Last Modified:Oct 28 19:32:02 2009
MD5 Checksum:f5056b503daf505f4150aa873c19a321

 ///  File Name: joomlasoundset-sql.txt
Description:
Joomla Soundset component version 1.0 suffers from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:2164
Last Modified:Oct 5 19:30:50 2009
MD5 Checksum:5ec3ecbd474f4562d8ee61c2f42948c0

 ///  File Name: ib_jrd8_create_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2146
Related OSVDB(s):38606
Related CVE(s):CVE-2007-5243
Last Modified:Oct 27 16:14:02 2009
MD5 Checksum:66eb6005ee3f9ffc7a052a19a632ee73

 ///  File Name: ib_open_marker_file.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2133
Related OSVDB(s):38610
Related CVE(s):CVE-2007-5244
Last Modified:Oct 27 16:15:26 2009
MD5 Checksum:f6c842774ee783e5ac3505f466abf25e

 ///  File Name: 9sg_google_apps_uri.txt
Description:
Google Apps googleapps.url.mailto:// URI handler cross-browser remote command execution exploit.
Author:Nine:Situations:Group::Pyrokinesis
Homepage:http://retrogod.altervista.org/
File Size:2117
Last Modified:Oct 1 21:46:48 2009
MD5 Checksum:2937f0d96f1e8eec83fa97995f55dc35

 ///  File Name: describe.rb.txt
Description:
This Metasploit module exploits a buffer overflow in RealServer 7/8/9 and was based on Johnny Cyberpunk's THCrealbad exploit. This code should reliably exploit Linux, BSD, and Windows-based servers.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2116
Related OSVDB(s):4468
Last Modified:Oct 27 18:18:44 2009
MD5 Checksum:6094aa9a91491f3755f7e3cd2e7c367a

 ///  File Name: veritas_netbackup_cmdexec.rb.txt
Description:
This Metasploit module allows arbitrary command execution on an ephemeral port opened by Veritas NetBackup, whilst an administrator is authenticated. The port is opened and allows direct console access as root or SYSTEM from any source address.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2110
Related OSVDB(s):11026
Related CVE(s):CVE-2004-1389
Last Modified:Oct 27 17:28:39 2009
MD5 Checksum:8427f7207c40d2c8437b522340d70c3a

 ///  File Name: ib_pwd_db_aliased.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:2101
Related OSVDB(s):38607
Related CVE(s):CVE-2007-5243
Last Modified:Oct 27 16:17:04 2009
MD5 Checksum:20990f30e3c1bca0c41eb265d3de6ca7

 ///  File Name: mysql_yassl.rb.txt
Description:
This Metasploit module exploits a stack overflow in the yaSSL (1.7.5 and earlier) implementation bundled with MySQL versions 6.0 and below. By sending a specially crafted Hello packet, an attacker may be able to execute arbitrary code.
Author:MC
File Size:2057
Related OSVDB(s):41195
Related CVE(s):CVE-2008-0226
Last Modified:Oct 27 16:20:12 2009
MD5 Checksum:690b5fdd36e38c0b026a4e0fc9ad7a54

 ///  File Name: eclipsebirt-xss.txt
Description:
Eclipse BIRT versions 2.2.1 and below suffer from a cross site scripting vulnerability.
Author:euronymous
File Size:2050
Last Modified:Oct 15 14:49:02 2009
MD5 Checksum:81d8a19633ed901c8d14f8ccc2ffc970

 ///  File Name: mambo_cache_lite.rb.txt
Description:
This Metasploit module exploits a remote file inclusion vulnerability in includes/Cache/Lite/Output.php in the Cache_Lite package in Mambo 4.6.4 and earlier.
Author:MC
File Size:1983
Related CVE(s):CVE-2008-2905
Last Modified:Oct 30 14:31:46 2009
MD5 Checksum:22e651699eccbe7326a64912218e25e4

 ///  File Name: joomlaphotoblog-sql.txt
Description:
The Joomla Photo Blog component versions Alpha 3 and Alpha 3a suffer from a remote SQL injection vulnerability.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:1950
Last Modified:Oct 23 13:48:41 2009
MD5 Checksum:175bd358f08718e8358ededa5678e01d

 ///  File Name: novelldcon-xss.txt
Description:
Novell Edirectory version 8.8 SP5 suffers from a cross site scripting vulnerability.
Author:Francis Provencher
File Size:1946
Last Modified:Oct 1 21:27:54 2009
MD5 Checksum:125cd2ded34c978cd6b8cfb2163c964b

 ///  File Name: GVI_2009-01_EN.txt
Description:
AfterLogic WebMail Pro versions 4.7.10 and below suffer from a cross site scripting vulnerability.
Author:Gardien Virtuel,Sebastien Duquette
Homepage:http://www.gardienvirtuel.com/
File Size:1936
Last Modified:Oct 6 19:09:20 2009
MD5 Checksum:a0b64bc2021a48bd1a680b6fef594de3

 ///  File Name: snort285-dos.txt
Description:
Snort versions 2.8.5 and below suffer from an IPv6 related remote denial of service vulnerability.
Author:laurent gaffie
File Size:1934
Last Modified:Oct 23 13:36:42 2009
MD5 Checksum:3c22f17e6a527be646ae04024532eba1

 ///  File Name: imap_uw_lsub.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the 'LSUB' command of the University of Washington IMAP service. This vulnerability can only be exploited with a valid username and password.
Author:patrick
File Size:1932
Related OSVDB(s):12037
Related CVE(s):CVE-2000-0284
Last Modified:Oct 27 13:47:33 2009
MD5 Checksum:d5073c5825c30d4318a8c8afe36b8b80

 ///  File Name: base_qry_common.rb.txt
Description:
This Metasploit module exploits a remote file inclusion vulnerability in the base_qry_common.php file in BASE 1.2.4 and earlier.
Author:MC
File Size:1902
Related CVE(s):CVE-2006-2685
Last Modified:Oct 30 14:02:08 2009
MD5 Checksum:cf2955f5f983aae66fb35f221c6cff6c

 ///  File Name: spamassassin_exec.rb.txt
Description:
This Metasploit module exploits a flaw in the SpamAssassin spamd service by specifying a malicious vpopmail User header, when running with vpopmail and paranoid modes enabled (non-default). Versions prior to 3.1.3 are vulnerable.
Author:patrick
Homepage:http://www.metasploit.com
File Size:1878
Related OSVDB(s):26177
Related CVE(s):CVE-2006-2447
Last Modified:Oct 28 19:38:45 2009
MD5 Checksum:bf09f798b36904890a7967b9288a6b07

 ///  File Name: ddwrt_cgibin_exec.rb.txt
Description:
This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management server of wireless gateways running DD-WRT. This flaw allows an unauthenticated attacker to execute arbitrary commands as the root user account.
Author:H D Moore,gat3way
File Size:1870
Related OSVDB(s):55990
Related CVE(s):CVE-2009-2765
Last Modified:Oct 27 13:30:59 2009
MD5 Checksum:88878a65f95d5419e26c672e623f4f47

 ///  File Name: empirecms47-sql.txt
Description:
EmpireCMS47 remote SQL injection exploit that snags the administrative password hash.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:1831
Last Modified:Oct 5 19:18:48 2009
MD5 Checksum:10a022ce126a500a67e1d563d7ff60dc