Section:  .. / 0911-exploits  /

Page 16 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 375 - 400 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: sys-lt-removeworkspaceV2.sql.txt
Description:
Oracle SYS.LT.REMOVEWORKSPACE exploit that grants DBA permissions to an unprivileged user.
Author:Andrea Purificato
Homepage:http://rawlab.mindcreations.com/
File Size:1070
Last Modified:Nov 30 16:57:28 2009
MD5 Checksum:f41c804a13eb1ef70b590681ccea0aec

 ///  File Name: systemrequirementslab_unsafe.rb.txt
Description:
This Metasploit module allows attackers to execute code via an unsafe method in Husdawg, LLC. System Requirements Lab ActiveX Control (sysreqlab2.dll 2.30.0.0)
Author:MC
Homepage:http://www.metasploit.com
File Size:2333
Related OSVDB(s):50122
Related CVE(s):CVE-2008-4385
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:da50dd484ce7081acf26fe3f0883b61a

 ///  File Name: talkative_response.rb.txt
Description:
This Metasploit module exploits a stack overflow in Talkative IRC v0.4.4.16. When a specially crafted response string is sent to a client, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2144
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d93e30391ddb0025da084ef139084cb2

 ///  File Name: tape_engine.rb.txt
Description:
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup r11.1 - r11.5. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC,patrick
Homepage:http://www.metasploit.com
File Size:2535
Related OSVDB(s):30637
Related CVE(s):CVE-2006-6076
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1a186d852a1b5f79ef9ef90277730d47

 ///  File Name: tbirdseamonkey-dos.txt
Description:
Mozilla Thunderbird version 2.0.0.23 and Seamonkey version 2.0 suffer from a null pointer dereference denial of service vulnerability.
Author:Marcin Ressel
File Size:1493
Last Modified:Nov 18 07:59:28 2009
MD5 Checksum:e66ea86dad2389ad129dbfa749a0dc9b

 ///  File Name: technet-xss.txt
Description:
The Microsoft Technet site suffers from a cross site scripting vulnerability.
Author:TEAMELITE
File Size:384
Last Modified:Nov 30 21:17:19 2009
MD5 Checksum:6441127e068e8e9547504603366b23d2

 ///  File Name: telebidauction-sql.txt
Description:
TelebidAuctionScript suffers from a remote blind SQL injection vulnerability.
Author:Hussin X
File Size:841
Last Modified:Nov 18 08:49:34 2009
MD5 Checksum:8a392fc4bb6f4e5349ef67ac10428bdb

 ///  File Name: Telepark-fixes-nov09-2.txt
Description:
Telepark Wiki versions 2.4.23 and below suffer from code execution, delete page, and cross site scripting vulnerabilities.
Author:Abysssec
Homepage:http://abysssec.com/
File Size:6223
Last Modified:Nov 16 22:13:54 2009
MD5 Checksum:865381e7b640e73bd552e43c6d8ce445

 ///  File Name: Telepark-fixes-nov09.txt
Description:
Unavailable.
File Size:3948
Last Modified:Nov 16 22:11:34 2009
MD5 Checksum:16e441e83cb59772d82307ccd69cf4c1

 ///  File Name: tftgallery-traversal.txt
Description:
TFTgallery version 0.13 is susceptible to a directory traversal vulnerability.
Author:Blake
File Size:632
Last Modified:Nov 2 22:59:36 2009
MD5 Checksum:227d4bd9b4632e65b8a085743c22e814

 ///  File Name: tftpd32_long_filename.rb.txt
Description:
This Metasploit module exploits a stack overflow in TFTPD32 version 2.21 and prior. By sending a request for an overly long file name to the tftpd32 server, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Author:MC
Homepage:http://www.metasploit.com
File Size:1956
Related OSVDB(s):45903
Related CVE(s):CVE-2002-2226
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:626f6eb555cc3c3a88a313c88f6384bf

 ///  File Name: tftpdwin_long_filename.rb.txt
Description:
This Metasploit module exploits the ProSysInfo TFTPDWIN threaded TFTP Server. By sending an overly long file name to the tftpd.exe server, the stack can be overwritten.
Author:patrick
Homepage:http://www.metasploit.com
File Size:1801
Related OSVDB(s):29032
Related CVE(s):CVE-2006-4948
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dbd10dea1c951434abcfe51169d898fe

 ///  File Name: threectftpsvc_long_mode.rb.txt
Description:
This Metasploit module exploits a stack overflow in 3CTftpSvc 2.0.1. By sending a specially crafted packet with an overly long mode field, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Author:MC
Homepage:http://www.metasploit.com
File Size:1736
Related OSVDB(s):30758
Related CVE(s):CVE-2006-6183
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:6e711054a02551ae838f2ae6f4801fad

 ///  File Name: timbuktu_fileupload.rb.txt
Description:
This Metasploit module exploits a directory traversal vulnerability in Motorola's Timbuktu Pro for Windows 8.6.5.
Author:MC
Homepage:http://www.metasploit.com
File Size:3797
Related OSVDB(s):43544
Related CVE(s):CVE-2008-1117
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:60ca33c782ea4e7cae74e1884c09cbd1

 ///  File Name: tiny_identd_overflow.rb.txt
Description:
This Metasploit module exploits a stack based buffer overflow in TinyIdentD version 2.2. If we send a long string to the ident service we can overwrite the return address and execute arbitrary code. Credit to Maarten Boone.
Author:acaro
Homepage:http://www.metasploit.com
File Size:1869
Related OSVDB(s):36053
Related CVE(s):CVE-2007-2711
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a9fa6f3bee57f7cc95de2a48f7c2ba54

 ///  File Name: tns_arguments.rb.txt
Description:
This Metasploit module exploits a stack overflow in Oracle 8i. When sending a specially crafted packet containing a overly long ARGUMENTS string to the TNS service, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2461
Related OSVDB(s):9427
Related CVE(s):CVE-2001-0499
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:77cb2913d578548a5a24f876db393695

 ///  File Name: tns_service_name.rb.txt
Description:
This Metasploit module exploits a stack overflow in Oracle. When sending a specially crafted packet containing a long SERVICE_NAME to the TNS service, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2677
Related OSVDB(s):5041
Related CVE(s):CVE-2002-0965
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:4e9f9b8ec86d6e666d074a278dd0d55e

 ///  File Name: torrent-poisoning.txt
Description:
Paper on poisoning a torrent's peer swarm with large numbers of fake peers, including proof of concept code. Works on most trackers. Could possibly be adapted to perform a reflected denial of service (DRDoS) on a target.
Author:Burningmace
File Size:5396
Last Modified:Nov 18 11:11:59 2009
MD5 Checksum:8afc01728654ca2731acc6e2d0166e9b

 ///  File Name: trackercam_phparg_overflow.rb.txt
Description:
This Metasploit module exploits a simple stack overflow in the TrackerCam web server. All current versions of this software are vulnerable to a large number of security issues. This Metasploit module abuses the directory traversal flaw to gain information about the system and then uses the PHP overflow to execute arbitrary code.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3994
Related OSVDB(s):13953,13955
Related CVE(s):CVE-2005-0478
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c832537867177bce73f7068a5b20ebfd

 ///  File Name: trendmicro_officescan.rb.txt
Description:
This Metasploit module exploits a stack overflow in Trend Micro OfficeScan cgiChkMasterPwd.exe (running with SYSTEM privileges).
Author:toto
Homepage:http://www.metasploit.com
File Size:2616
Related OSVDB(s):42499
Related CVE(s):CVE-2008-1365
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0fa2dd3a389864092f1420e5603eb2b9

 ///  File Name: trendmicro_serverprotect.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2162
Related OSVDB(s):33042
Related CVE(s):CVE-2007-1070
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dcab71de9a9ee9a0799ac905f72acba8

 ///  File Name: trendmicro_serverprotect_createbind..>
Description:
This Metasploit module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2251
Related OSVDB(s):35790
Related CVE(s):CVE-2007-2508
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8c85aa5c144daa0c511d24520eb327c4

 ///  File Name: trendmicro_serverprotect_earthagent..>
Description:
This Metasploit module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060 EarthAgent.EXE. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2209
Related OSVDB(s):35789
Related CVE(s):CVE-2007-2508
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:e79115bffdc54c18a0ff2f273a52b24e

 ///  File Name: tumbleweed_filetransfer.rb.txt
Description:
This Metasploit module exploits a stack overflow in the vcst_eu.dll FileTransfer Module (1.0.0.5) ActiveX control in the Tumbleweed SecureTransport suite. By sending an overly long string to the TransferFile() 'remotefile' function, an attacker may be able to execute arbitrary code.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2868
Related OSVDB(s):44252
Related CVE(s):CVE-2008-1724
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c8cfde564e8077dc5285fa8ec5263ab1

 ///  File Name: typsoftappe-dos.txt
Description:
TYPSoft FTP server remote denial of service exploit that makes use of APPE and DELE.
Author:leinakesi
File Size:2716
Last Modified:Nov 24 16:13:35 2009
MD5 Checksum:8b1d7287f245cbe66efa28c5298747cc