Section:  .. / 0911-exploits  /

Page 6 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 125 - 150 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: homeftpserver-traversal.txt
Description:
Home FTP Server version 1.10.1.139 suffers from a remote directory traversal vulnerability.
Author:zhangmc
File Size:1697
Last Modified:Nov 18 10:58:25 2009
MD5 Checksum:e6e598ba6e356872520260188444e14e

 ///  File Name: hp_nnm.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1809
Related OSVDB(s):39530
Related CVE(s):CVE-2007-6204
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7119a0e0e48141c5d7351d429402d4b2

 ///  File Name: hp_nnm_toolbar.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1806
Related OSVDB(s):53222
Related CVE(s):CVE-2008-0067
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:eebc7a8eae79fdcba76863cb51497d09

 ///  File Name: hp_ovtrace.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Operations version A.07.50. By sending a specially crafted packet, a remote attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1772
Related OSVDB(s):39527
Related CVE(s):CVE-2007-3872
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b12357fef68f74c168e826e0025b51ab

 ///  File Name: hploadrunner.rb.txt
Description:
This Metasploit module exploits a stack overflow in Persists Software Inc's XUpload ActiveX control(version 2.1.0.1) thats included in HP LoadRunner 9.0. By passing an overly long string to the AddFolder method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2552
Related OSVDB(s):39901
Related CVE(s):CVE-2007-6530
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:457ae3781adc6fd4411aab52dc3aa8d2

 ///  File Name: hpmqc_progcolor.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in SPIDERLib.Loader ActiveX control (Spider90.ocx) 9.1.0.4353 installed by TestDirector (TD) for Hewlett-Packard Mercury Quality Center 9.0 before Patch 12.1, and 8.2 SP1 before Patch 32. By setting an overly long value to 'ProgColor', an attacker can overrun a buffer and execute arbitrary code.
Author:Trancer
Homepage:http://www.metasploit.com
File Size:4001
Related OSVDB(s):34317
Related CVE(s):CVE-2007-1819
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:236739259c5f6f007c26b83d0392dadc

 ///  File Name: hppowerman-overflow.txt
Description:
HP Power Manager Administration universal buffer overflow exploit. Written in Python.
Author:Matteo Memelli
Homepage:http://offensive-security.com/
File Size:5447
Related CVE(s):CVE-2009-2685
Last Modified:Nov 16 20:10:25 2009
MD5 Checksum:2a749da727764a537ee0102d318e27e2

 ///  File Name: hsmserver.rb.txt
Description:
This Metasploit module exploits one of the multiple stack overflows in Computer Associates BrightStor HSM. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
Author:toto
Homepage:http://www.metasploit.com
File Size:1996
Related OSVDB(s):41363
Related CVE(s):CVE-2007-5082
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:59aa9dbb251f1704e4d16e690632a9f7

 ///  File Name: httpstk-overflow.txt
Description:
Novell eDirectory version 8.8 SP5 HTTPSTK login stack overflow proof of concept exploit.
Author:karak0rsan,murderkey
Homepage:http://tcc.hellcode.net/
File Size:1389
Last Modified:Nov 18 10:56:10 2009
MD5 Checksum:33cd6eebd0dad0717570b48b8ab86a01

 ///  File Name: hummingbird_exceed.rb.txt
Description:
This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.
Author:MC
Homepage:http://www.metasploit.com
File Size:1786
Related OSVDB(s):16957
Related CVE(s):CVE-2005-1815
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9f94cfb1c4e895dea6a1ae77a129d77d

 ///  File Name: ia_webmail.rb.txt
Description:
This exploits a stack overflow in the IA WebMail server. This exploit has not been tested against a live system at this time.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1585
Related OSVDB(s):2757
Related CVE(s):CVE-2003-1192
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b36b10d2eea9582419f82240c737857b

 ///  File Name: ib_isc_attach_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3849
Related OSVDB(s):38607
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a309e699ae44406d74ac0fa0e8c0da85

 ///  File Name: ib_isc_create_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3849
Related OSVDB(s):38606
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ff7271f28dbab6b339eb80b560771d39

 ///  File Name: ib_svc_attach.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3942
Related OSVDB(s):38605
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:221842da93044ac6124e2e9fcd093224

 ///  File Name: ibm_tpmfosd_overflow.rb.txt
Description:
This is a stack overflow exploit for IBM Tivoli Provisioning Manager for OS Deployment version 5.1.0.X.
Author:toto
Homepage:http://www.metasploit.com
File Size:6773
Related OSVDB(s):34678
Related CVE(s):CVE-2007-1868
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0e651970fd8db1555515d7abc16a76ac

 ///  File Name: ibm_tsm_cad.rb.txt
Description:
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1854
Related OSVDB(s):38161
Related CVE(s):CVE-2007-4880
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:44db477430884ff6275ce3fa63f48591

 ///  File Name: ibmegath_getxmlvalue.rb.txt
Description:
This Metasploit module exploits a stack overflow in IBM Access Support. When sending an overly long string to the GetXMLValue() method of IbmEgath.dll (3.20.284.0) an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3025
Related OSVDB(s):52958
Related CVE(s):CVE-2009-0215
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:2f2301a336dbfdee91f422c3664c854c

 ///  File Name: ibmlotusdomino_dwa_uploadmodule.rb...>
Description:
This Metasploit module exploits a stack overflow in IBM Lotus Domino Web Access Upload Module. By sending an overly long string to the "General_ServerName()" property located in the dwa7w.dll and the inotes6w.dll control, an attacker may be able to execute arbitrary code.
Author:Elazar Broad
Homepage:http://www.metasploit.com
File Size:4356
Related OSVDB(s):40954
Related CVE(s):CVE-2007-4474
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:50aa5ae090a1b2db0a274c256a751cba

 ///  File Name: icecast_header.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array.
Author:Luigi Auriemma,spoonm
Homepage:http://www.metasploit.com
File Size:2858
Related OSVDB(s):10406
Related CVE(s):CVE-2004-1561
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:960f5912bae318348be86d784228f9e1

 ///  File Name: iconsole-overflow.txt
Description:
Novell eDirectory version 8.8 SP5 iConsole buffer overflow exploit. Written in Python.
Author:Matteo Memelli
Homepage:http://offensive-security.com/
File Size:5179
Last Modified:Nov 16 20:12:49 2009
MD5 Checksum:cf22004c1535f5a71c20a730786fb8f9

 ///  File Name: ie_createobject.rb.txt
Description:
This Metasploit module exploits a generic code execution vulnerability in Internet Explorer by abusing vulnerable ActiveX objects.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:7347
Last Modified:Oct 30 17:01:20 2009
MD5 Checksum:a85d55c56e1a1797651aac42aabe0cb8

 ///  File Name: ie_iscomponentinstalled.rb.txt
Description:
This Metasploit module exploits a stack overflow in Internet Explorer. This bug was patched in Windows 2000 SP4 and Windows XP SP1 according to MSRC.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2453
Related OSVDB(s):31647
Related CVE(s):CVE-2006-1016
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:43ed623935dd912a7903f9e3cdd0eac5

 ///  File Name: ie_unsafe_scripting.rb.txt
Description:
This exploit takes advantage of the "Initialize and script ActiveX controls not marked safe for scripting" setting within Internet Explorer.
Author:natron
Homepage:http://www.metasploit.com
File Size:5767
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3bd62efc3766194d68aa73eb6ae5ef50

 ///  File Name: ie_xml_corruption.rb.txt
Description:
This Metasploit module exploits a vulnerability in the data binding feature of Internet Explorer. In order to execute code reliably, this module uses the .NET DLL memory technique pioneered by Alexander Sotirov and Mark Dowd. This method is used to create a fake vtable at a known location with all methods pointing to our payload. Since the .text segment of the .NET DLL is non-writable, a prefixed code stub is used to copy the payload into a new memory segment and continue execution from there.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:8970
Related OSVDB(s):50622
Related CVE(s):CVE-2008-4844
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:4098681f9e0ebbb4013f153e64cb4eea

 ///  File Name: iepdf-leak.txt
Description:
Internet Explorer leaks local host information when printing pages to PDF files.
Author:Inferno from Secure Thoughts
File Size:4624
Last Modified:Nov 23 17:44:38 2009
MD5 Checksum:38c15e28599d264ecef297cb8ccdf65f