Section:  .. / 0910-exploits  /

Page 2 of 9
<< 1 2 3 4 5 6 7 8 9 >> Files 25 - 50 of 210
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: awstats_configdir_exec.rb.txt
Description:
This Metasploit module exploits an arbitrary command execution vulnerability in the AWStats CGI script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2 are vulnerable.
Author:Matteo Cantoni
File Size:2657
Related OSVDB(s):13002
Related CVE(s):CVE-2005-0116
Last Modified:Oct 30 13:56:51 2009
MD5 Checksum:02483e787ea513ae301a4e1cbd1ad9b4

 ///  File Name: ONSEC-09-019.txt
Description:
Mura CMS versions 5.1 and below suffer from a cross site scripting vulnerability.
Author:Vladimir Vorontsov
File Size:2745
Last Modified:Oct 29 19:10:24 2009
MD5 Checksum:c704de36c333d5d41d1a7322de40af60

 ///  File Name: ONSEC-09-020.txt
Description:
Mura CMS versions 5.1 and below suffer from a remote root folder disclosure vulnerability.
Author:Vladimir Vorontsov
File Size:2745
Last Modified:Oct 29 19:10:05 2009
MD5 Checksum:c704de36c333d5d41d1a7322de40af60

 ///  File Name: clamav_milter_blackhole.rb.txt
Description:
This Metasploit module exploits a flaw in the Clam AntiVirus suite 'clamav-milter' (Sendmail mail filter). Versions prior to 0.92.2 are vulnerable. When implemented with black hole mode enabled, it is possible to execute commands remotely due to an insecure popen call.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2771
Related OSVDB(s):36909
Related CVE(s):CVE-2007-4560
Last Modified:Oct 28 19:40:46 2009
MD5 Checksum:82c785f79a6f63dee51ba000a284f213

 ///  File Name: spamassassin_exec.rb.txt
Description:
This Metasploit module exploits a flaw in the SpamAssassin spamd service by specifying a malicious vpopmail User header, when running with vpopmail and paranoid modes enabled (non-default). Versions prior to 3.1.3 are vulnerable.
Author:patrick
Homepage:http://www.metasploit.com
File Size:1878
Related OSVDB(s):26177
Related CVE(s):CVE-2006-2447
Last Modified:Oct 28 19:38:45 2009
MD5 Checksum:bf09f798b36904890a7967b9288a6b07

 ///  File Name: distcc_exec.rb.txt
Description:
This Metasploit module uses a documented security weakness to execute arbitrary commands on any system running distccd.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2643
Related OSVDB(s):13378
Related CVE(s):CVE-2004-2687
Last Modified:Oct 28 19:37:04 2009
MD5 Checksum:07af102ab61b4945263c0c9f76b12255

 ///  File Name: contentkeeperweb_mimencode.rb.txt
Description:
This Metasploit module exploits the ContentKeeper Web Appliance. Versions prior to 125.10 are affected. This module exploits a combination of weaknesses to enable remote command execution as the Apache user. Following exploitation it is possible to abuse an insecure PATH call to 'ps' etc in setuid 'benetool' to escalate to root.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2578
Related OSVDB(s):54551,54552
Last Modified:Oct 28 19:35:16 2009
MD5 Checksum:d9d583b51da3ea97779cd2b73646e602

 ///  File Name: ttyprompt.rb.txt
Description:
This Metasploit module uses a buffer overflow in the Solaris 'login' application to bypass authentication in the telnet daemon.
Author:MC,cazz
File Size:2167
Related OSVDB(s):690
Related CVE(s):CVE-2001-0797
Last Modified:Oct 28 19:32:02 2009
MD5 Checksum:f5056b503daf505f4150aa873c19a321

 ///  File Name: fuser.rb.txt
Description:
This Metasploit module exploits the argument injection vulnerability in the telnet daemon (in.telnetd) of Solaris 10 and 11.
Author:MC
File Size:2368
Related OSVDB(s):31881
Related CVE(s):CVE-2007-0882
Last Modified:Oct 28 19:30:37 2009
MD5 Checksum:5c9d0310bed692855ab74a2227508cc0

 ///  File Name: ypupdated_exec.rb.txt
Description:
This exploit targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request.
Author:I)ruid
File Size:2268
Related OSVDB(s):11517
Related CVE(s):CVE-1999-0209
Last Modified:Oct 28 19:28:41 2009
MD5 Checksum:cc2a467ac393cc38f358d8b11bed9cc8

 ///  File Name: sadmind_exec.rb.txt
Description:
This exploit targets a weakness in the default security settings of the sadmind RPC application. This server is installed and enabled by default on most versions of the Solaris operating system. Vulnerable systems include solaris 2.7, 8, and 9.
Author:H D Moore,cazz,vlad902
Homepage:http://www.metasploit.com
File Size:3795
Related OSVDB(s):4585
Related CVE(s):CVE-2003-0722
Last Modified:Oct 28 19:24:09 2009
MD5 Checksum:b35c5bfeebb1e521bdad45053c664ca2

 ///  File Name: sadmind_adm_build_path.rb.txt
Description:
This Metasploit module exploits a buffer overflow vulnerability in adm_build_path() function of sadmind daemon.
Author:Adriano Lima
Homepage:http://www.risesecurity.org/
File Size:4446
Related OSVDB(s):49111
Related CVE(s):CVE-2008-4556
Last Modified:Oct 28 19:21:21 2009
MD5 Checksum:445586327b6a99350a42708bd196facb

 ///  File Name: cherokee-traversal.txt
Description:
Cherokee versions 0.5.4 and below suffer from a directory traversal vulnerability.
Author:Dr_IDE
File Size:940
Last Modified:Oct 28 18:07:43 2009
MD5 Checksum:403962f079e8d92ce379c49951d70cda

 ///  File Name: sendmail_exec.rb.txt
Description:
This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Sun Solaris up to and including 8.0. This module uses a technique discovered by Dino Dai Zovi to exploit the flaw without needing to know the resolved name of the attacking system.
Author:Dino A Dai Zovi,H D Moore
Homepage:http://www.metasploit.com
File Size:4166
Related OSVDB(s):15131
Related CVE(s):CVE-2001-1583
Last Modified:Oct 28 16:43:46 2009
MD5 Checksum:e38a9f11115d68bc3f3a83145bf7542a

 ///  File Name: oscailt33-lfi.txt
Description:
Oscailt CMS version 3.3 suffers from a local file inclusion vulnerability.
Author:s4r4d0
File Size:1231
Last Modified:Oct 28 16:17:47 2009
MD5 Checksum:06121f5b7a550f3fa731f8dbec8a1d13

 ///  File Name: getunique.c
Description:
Mozilla Firefox version 3.5.3 local download manager exploit that demonstrates a temporary file creation vulnerability.
Author:Jeremy Brown
Homepage:http://jbrownsec.blogspot.com/
File Size:9684
Last Modified:Oct 28 16:15:00 2009
MD5 Checksum:ff0a70ec71952b02c7ea238923d542dc

 ///  File Name: heap_noir.rb.txt
Description:
This is a port of noir's dtspcd exploit. This Metasploit module should work against any vulnerable version of Solaris 8 (sparc). The original exploit code was published in the book Shellcoder's Handbook.
Author:noir
Homepage:http://www.metasploit.com
File Size:3806
Related OSVDB(s):4503
Related CVE(s):CVE-2001-0803
Last Modified:Oct 28 16:05:42 2009
MD5 Checksum:b651e2e336445eaafedfc821c5728f93

 ///  File Name: trans2open.rc.txt
Description:
This Metasploit module exploits the buffer overflow found in Samba versions 2.2.0 to 2.2.8. This particular module is capable of exploiting the bug on Mac OS X PowerPC systems.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2660
Related OSVDB(s):4469
Related CVE(s):CVE-2003-0201
Last Modified:Oct 28 16:03:53 2009
MD5 Checksum:106a9258f6f5ff6fa77fc7c7c272ea31

 ///  File Name: quicktime_rtsp_content_type.rb.txt
Description:
This Metasploit module exploits the Mac OS X Quicktime RTSP Content-Type overflow.
Homepage:http://www.metasploit.com
File Size:5278
Last Modified:Oct 28 16:01:22 2009
MD5 Checksum:380966feca11229459ef798d1bee894d

 ///  File Name: upnp_location.rb.txt
Description:
This Metasploit module exploits the Mac OS X mDNSResponder UPnP location overflow.
Homepage:http://www.metasploit.com
File Size:5371
Last Modified:Oct 28 15:58:46 2009
MD5 Checksum:00933391fec89081e5a6100903e69651

 ///  File Name: webstar_ftp_user.rb.txt
Description:
This Metasploit module exploits a stack overflow in the logging routine of the WebSTAR FTP server. Reliable code execution is obtained by a series of hops through the System library.
Author:Dino A Dai Zovi,H D Moore
Homepage:http://www.metasploit.com
File Size:2808
Related OSVDB(s):7794
Related CVE(s):CVE-2004-0695
Last Modified:Oct 28 15:04:04 2009
MD5 Checksum:01773c137607442fb4bdcd6af39f4e16

 ///  File Name: mailapp_image_exec.rb.txt
Description:
This Metasploit module exploits a command execution vulnerability in the Mail.app application shipped with Mac OS X 10.5.0. This flaw was patched in 10.4 in March of 2007, but reintroduced into the final release of 10.5.
Author:H D Moore,Kevin Finisterre
Homepage:http://www.metasploit.com
File Size:6019
Related OSVDB(s):40875
Related CVE(s):CVE-2006-0395, CVE-2007-6165
Last Modified:Oct 28 15:01:17 2009
MD5 Checksum:65efe27dbff4de35ebd1ec592beb222c

 ///  File Name: safari_metadata_archive.rb.txt
Description:
This Metasploit module exploits a vulnerability in Safari's "Safe file" feature, which will automatically open any file with one of the allowed extensions. This can be abused by supplying a zip file, containing a shell script, with a metafile indicating that the file should be opened by Terminal.app. This module depends on the 'zip' command-line utility.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:9516
Related OSVDB(s):23510
Related CVE(s):CVE-2006-0848
Last Modified:Oct 28 14:58:15 2009
MD5 Checksum:c9eff8239967b82607204dfb73547679

 ///  File Name: type77.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Arkeia backup client for the Mac OS X platform. This vulnerability affects all versions up to and including 5.3.3 and has been tested with Arkeia 5.3.1 on Mac OS X 10.3.5.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2928
Related OSVDB(s):14011
Related CVE(s):CVE-2005-0491
Last Modified:Oct 28 14:55:21 2009
MD5 Checksum:9aca80e8f1b4ff06430e71ac93ba6595

 ///  File Name: loginext.rb.txt
Description:
This Metasploit module exploits a stack overflow in the AppleFileServer service on MacOS X. This vulnerability was originally reported by Atstake and was actually one of the few useful advisories ever published by that company. You only have one chance to exploit this bug. This particular exploit uses a stack-based return address that will only work under optimal conditions.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2545
Related OSVDB(s):5762
Related CVE(s):CVE-2004-0430
Last Modified:Oct 28 14:53:39 2009
MD5 Checksum:c5d220500644b606493b5cdc461b5bbd