Section:  .. / 0911-exploits  /

Page 3 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 50 - 75 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: bopup_comm.rb.txt
Description:
This Metasploit module exploits a stack overflow in Bopup Communications Server 3.2.26.5460. By sending a specially crafted packet, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2070
Related OSVDB(s):55275
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9950c86723c462529c0ddf010425403b

 ///  File Name: borland_interbase.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland Interbase 2007. By sending a specially crafted create-request packet, a remote attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2022
Related OSVDB(s):38602
Related CVE(s):CVE-2007-3566
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:758b178ae6d807059f2e66aa8748c5ec

 ///  File Name: borland_starteam.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland CaliberRM 2006. By sending a specially crafted GET request to the STMulticastService, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1933
Related OSVDB(s):44039
Related CVE(s):CVE-2008-0311
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9c5ce50f5e4af43e3d4622c1e9b2df1a

 ///  File Name: ca_brightstor_addcolumn.rb.txt
Description:
The CA BrightStor ARCserve Backup ActiveX control (ListCtrl.ocx) is vulnerable to a stack-based buffer overflow. By passing an overly long argument to the AddColumn() method, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Author:dean
Homepage:http://www.metasploit.com
File Size:3348
Related OSVDB(s):43214
Related CVE(s):CVE-2008-1472
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f32567a5b886b9294455755b1bfa7d96

 ///  File Name: ca_cab.rb.txt
Description:
This Metasploit module exploits a stack overflow in CA eTrust Antivirus 8.1.637. By creating a specially crafted CAB file, an an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2810
Related CVE(s):CVE-2007-2864
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:487bf159b57f26a38ad1fffaedebfde7

 ///  File Name: ca_igateway_debug.rb.txt
Description:
This Metasploit module exploits a vulnerability in the Computer Associates iTechnology iGateway component. When True is enabled in igateway.conf (non-default), it is possible to overwrite the stack and execute code remotely.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2417
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8978f67ab92426d063102e129c0c84af

 ///  File Name: cacti087e-xss.txt
Description:
Cacti versions 0.8.7e and below suffer from cross site scripting and privilege escalation vulnerabilities.
Author:Moritz Naumann
File Size:5548
Related CVE(s):CVE-2009-4032
Last Modified:Nov 27 16:16:19 2009
MD5 Checksum:c9b52762868a585b0277459094ec071e

 ///  File Name: cain_abel_4918_rdp.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.
Author:Trancek
Homepage:http://www.metasploit.com
File Size:2075
Related OSVDB(s):50342
Related CVE(s):CVE-2008-5405
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f850832390113f08d7022838d50e886d

 ///  File Name: cam_log_security.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA CAM service by passing a long parameter to the log_security() function. The CAM service is part of TNG Unicenter. This Metasploit module has been tested on Unicenter v3.1.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2288
Related OSVDB(s):18916
Related CVE(s):CVE-2005-2668
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d4527ecf49de18832a8a7e75c620b9d4

 ///  File Name: ccproxy_telnet_ping.rb.txt
Description:
This Metasploit module exploits the YoungZSoft CCProxy <= v6.2 suite Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command.
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:2344
Related OSVDB(s):11593
Related CVE(s):CVE-2004-2416
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3e097f89c82a14bf523c336c5d45d5ac

 ///  File Name: cesarftp_mkd.rb.txt
Description:
This Metasploit module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.
Author:MC
Homepage:http://www.metasploit.com
File Size:1958
Related OSVDB(s):26364
Related CVE(s):CVE-2006-2961
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0b5769e2692d2b14fb668f894409bb96

 ///  File Name: CORE-2009-0814.txt
Description:
Core Security Technologies Advisory - HP Openview Network Node Manager is one of the most widely-deployed network monitoring and management platforms used throughout enterprise organizations today. The platform includes many server and client-side core components with a long list of previously disclosed security bugs. In this case, a remotely exploitable vulnerability was found in the database server core component used by NNM. Exploitation of the bug does not require authentication and will lead to a remotely triggered denial of service of the internal database service. HP Openview NNM version 7.53 is affected.
Homepage:http://www.coresecurity.com/corelabs/
File Size:17244
Related CVE(s):CVE-2009-3840
Last Modified:Nov 18 11:05:50 2009
MD5 Checksum:478db223a44f2e0af69ed0e378911abb

 ///  File Name: CORE-2009-0908.txt
Description:
Core Security Technologies Advisory - Autodesk SoftImage Scene TOC suffers from an arbitrary command execution vulnerability.
Homepage:http://www.coresecurity.com/corelabs/
File Size:7609
Related CVE(s):CVE-2009-3576
Last Modified:Nov 23 18:26:12 2009
MD5 Checksum:b209c96ce0b7ed762f088f1d97120089

 ///  File Name: CORE-2009-0909.txt
Description:
Core Security Technologies Advisory - Autodesk 3DS Max Application Callbacks suffers from an arbitrary command execution vulnerability.
Homepage:http://www.coresecurity.com/corelabs/
File Size:6946
Related CVE(s):CVE-2009-3577
Last Modified:Nov 23 18:28:16 2009
MD5 Checksum:f146c94bba1eb57f049eee4566a80d19

 ///  File Name: CORE-2009-0910.txt
Description:
Core Security Technologies Advisory - Autodesk Maya Script Nodes suffers from an arbitrary command execution vulnerability.
Homepage:http://www.coresecurity.com/corelabs/
File Size:7317
Related CVE(s):CVE-2009-3578
Last Modified:Nov 23 18:29:33 2009
MD5 Checksum:992dec8c33937be89fdd1c1717b8d5a9

 ///  File Name: CORE-2009-0912.txt
Description:
Core Security Technologies Advisory - Blender embeds a python interpreter to extend its functionality. Blender .blend project files can be modified to execute arbitrary commands without user intervention by design. An attacker can take full control of the machine where Blender is installed by sending a specially crafted .blend file and enticing the user to open it.
Homepage:http://www.coresecurity.com/corelabs/
File Size:6678
Related CVE(s):CVE-2009-3850
Last Modified:Nov 5 14:23:53 2009
MD5 Checksum:3f35540862c9c7a87d3aca95c31184c7

 ///  File Name: CORE-2009-1027.txt
Description:
Core Security Technologies Advisory - A remotely exploitable vulnerability was found in the database server core component of IBM SolidDB. Exploitation of this bug does not require authentication and will lead to a remotely triggered denial of service of the database service.
Homepage:http://www.coresecurity.com/corelabs/
File Size:9157
Related CVE(s):CVE-2009-3840
Last Modified:Nov 18 19:03:18 2009
MD5 Checksum:9820dbf2ebbf27080352d447cbbac752

 ///  File Name: corelanc0d3r_aimp2.pl.txt
Description:
AIMP2 versions 2.51 build 330 and below audio converter playlist buffer overflow exploit.
Author:corelanc0d3r
File Size:3552
Last Modified:Nov 16 21:27:28 2009
MD5 Checksum:35d505fe4e89f91a78d5adb05693724e

 ///  File Name: corelanc0d3r_xion_xpsp3.pl.txt
Description:
Xion Audio Player version 1.0 build 121 local buffer overflow exploit.
Author:corelanc0d3r
Related Exploit:xionap-overflow.txt
File Size:3076
Last Modified:Nov 3 17:35:21 2009
MD5 Checksum:23e8837a0bd388f45a51407c82508d0f

 ///  File Name: creative_software_cachefolder.rb.tx..>
Description:
This Metasploit module exploits a stack overflow in Creative Software AutoUpdate Engine. When sending an overly long string to the cachefolder() property of CTSUEng.ocx an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3509
Related OSVDB(s):45655
Related CVE(s):CVE-2008-0955
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:10d75b9d3dc9e4dcd59f10bb71395070

 ///  File Name: ctxsys-drvxtabc-create_tables.sql.t..>
Description:
Oracle ctxsys.drvxtabc.create_tables exploit that grants DBA permissions to an unprivileged user.
Author:Andrea Purificato
Homepage:http://rawlab.mindcreations.com/
File Size:1039
Last Modified:Nov 30 16:51:28 2009
MD5 Checksum:530e2fcc7b0fa4758298209db0e79f9e

 ///  File Name: ctxsys-drvxtabc-create_tablesV2.sql..>
Description:
Oracle ctxsys.drvxtabc.create_tables exploit that grants DBA permissions to an unprivileged user. This version uses an evil cursor technique.
Author:Andrea Purificato
Homepage:http://rawlab.mindcreations.com/
File Size:1063
Last Modified:Nov 30 16:53:05 2009
MD5 Checksum:213928693d65f40e6f45150351d69835

 ///  File Name: cve-2009-0692.c
Description:
ISC DHCP dhclient scripts_write_params() stack buffer overflow exploit.
Author:Jon Oberheide
File Size:7716
Related CVE(s):CVE-2009-0692
Last Modified:Nov 16 22:03:22 2009
MD5 Checksum:0ec16a6f3d31b4088eedff4643bf281b

 ///  File Name: deliverscript-rfi.txt
Description:
DeliveryScript suffers from multiple remote file inclusion vulnerabilities.
Author:kaMtiEz
Homepage:http://www.indonesiancoder.com/
File Size:4147
Last Modified:Nov 16 19:57:56 2009
MD5 Checksum:2f6c0e0a43909dd1987d543b16a009b3

 ///  File Name: destinymediaplayer16.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist
Author:Trancek
Homepage:http://www.metasploit.com
File Size:1927
Related OSVDB(s):53249
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3581cd695a23ad3d7a48380e5a9aaa5c