Section:  .. / 0911-exploits  /

Page 4 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 75 - 100 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: discovery_tcp.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a specific type of request is sent to the TCP listener on port 41523. This vulnerability was discovered by cybertronic[at]gmx.net and affects all known versions of the BrightStor product. This Metasploit module is based on the 'cabrightstor_disco' exploit by Thor Doomen.
Author:H D Moore,patrick
Homepage:http://www.metasploit.com
File Size:3714
Related OSVDB(s):13814
Related CVE(s):CVE-2005-2535
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f08975a1d4fd37bf025c830b2145d54d

 ///  File Name: discovery_udp.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a large request is sent to UDP port 41524, triggering a stack overflow.
Author:H D Moore,patrick
Homepage:http://www.metasploit.com
File Size:2885
Related OSVDB(s):13613
Related CVE(s):CVE-2005-0260
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:73a5a5752dc68b5bbac67ec85dcbb0c6

 ///  File Name: djvu_imageurl.rb.txt
Description:
This Metasploit module exploits a stack overflow in DjVu ActiveX Component. When sending an overly long string to the ImageURL() property of DjVu_ActiveX_MSOffice.dll (3.0) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
Author:dean
Homepage:http://www.metasploit.com
File Size:3405
Related OSVDB(s):49592
Related CVE(s):CVE-2008-4922
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7d0edadf006976a6400b472c88bc355e

 ///  File Name: dlink_long_filename.rb.txt
Description:
This Metasploit module exploits a stack overflow in D-Link TFTP 1.0. By sending a request for an overly long file name, an attacker could overflow a buffer and execute arbitrary code.
Author:LSO,patrick
Homepage:http://www.metasploit.com
File Size:2169
Related OSVDB(s):33977
Related CVE(s):CVE-2007-1435
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c5a2e6d1d64f08aeb8a87741001d8a01

 ///  File Name: domino_http_accept_language.rb.txt
Description:
This Metasploit module exploits a stack overflow in IBM Lotus Domino Web Server prior to version 7.0.3FP1 and 8.0.1. This flaw is triggered by any HTTP request with an Accept-Language header greater than 114 bytes.
Author:Earl Marcus,Fairuzan Roslan
Homepage:http://www.metasploit.com
File Size:5661
Related OSVDB(s):45415
Related CVE(s):CVE-2008-2240
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:434938f54dbe3e0b8433554d770893d8

 ///  File Name: domino_sametime_stmux.rb.txt
Description:
This Metasploit module exploits a stack overflow in Lotus Domino's Sametime Server. By sending an overly long POST request to the Multiplexer STMux.exe service we are able to overwrite SEH. Based on the exploit by Manuel Santamarina Suarez.
Author:patrick,riaf
Homepage:http://www.metasploit.com
File Size:3823
Related OSVDB(s):45610
Related CVE(s):CVE-2008-2499
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0da82cb9511b278950e655bb1740a66e

 ///  File Name: dotdefender-exec.txt
Description:
dotDefender version 3.8-5 suffers from a remote command execution vulnerability.
Author:John Dos
File Size:5139
Last Modified:Nov 30 21:06:38 2009
MD5 Checksum:160328ae5b04babb001d86821bd62007

 ///  File Name: doubletake.rb.txt
Description:
This Metasploit module exploits a stack overflow in the authentication mechanism of NSI Doubletake which is also rebranded as HP Storage Works. This vulnerability was found by Titon of Bastard Labs.
Author:ri0t
Homepage:http://www.metasploit.com
File Size:2266
Related OSVDB(s):45924
Related CVE(s):CVE-2008-1661
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7d1994c9feedfab5a0761d62e9a79ef9

 ///  File Name: dowgroup-sql.txt
Description:
Dow Group suffers from a remote SQL injection vulnerability.
Author:ProF.Code
File Size:640
Last Modified:Nov 18 08:53:35 2009
MD5 Checksum:270669821e86f2d253202a4eeb1ef9f1

 ///  File Name: dreamftp_format.rb.txt
Description:
This Metasploit module exploits a format string overflow in the BolinTech Dream FTP Server version 1.02. Based on the exploit by SkyLined.
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:2017
Related OSVDB(s):4986
Related CVE(s):CVE-2004-2074
Last Modified:Nov 27 14:44:51 2009
MD5 Checksum:55e93a8c4908c4d63480497ce0fc8a2a

 ///  File Name: DSECRG-09-062.txt
Description:
Alteon OS BBI versions 21.0.8.3 and below suffer from cross site scripting and cross site request forgery vulnerabilities.
Author:Sintsov Alexey
Homepage:http://www.dsec.ru/
File Size:5067
Last Modified:Nov 18 10:15:37 2009
MD5 Checksum:c4785e783f7c41dce6a3a265a00d2e07

 ///  File Name: ea_checkrequirements.rb.txt
Description:
This Metasploit module exploits a stack overflow in Electronic Arts SnoopyCtrl ActiveX Control (NPSnpy.dll 1.1.0.36). When sending a overly long string to the CheckRequirements() method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2862
Related CVE(s):CVE-2007-4466
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8623cbf18a6812ebea296ffd3ec2611f

 ///  File Name: easyfilesharing_pass.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Easy File Sharing 2.0 service. By sending an overly long password, an attacker can execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2027
Related OSVDB(s):27646
Related CVE(s):CVE-2006-3952
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a3a652f37f2ab6afcdd7ca598c5f976a

 ///  File Name: ebfe.cpp
Description:
Remote buffer overflow exploit for the Serv-U web client version 9.0.0.5.
Author:Megumi Yanagishita
Related Exploit:servu-overflow.txt
File Size:2025
Last Modified:Nov 5 14:11:11 2009
MD5 Checksum:dae72f16966d47bdbb95a1b130a3995b

 ///  File Name: ebook_flipviewer_fviewerloading.rb...>
Description:
This Metasploit module exploits a stack overflow in E-BOOK Systems FlipViewer 4.0. The vulnerability is caused due to a boundary error in the FViewerLoading (FlipViewerX.dll) ActiveX control when handling the "LoadOpf()" method.
Author:LSO
Homepage:http://www.metasploit.com
File Size:3627
Related OSVDB(s):37042
Related CVE(s):CVE-2007-2919
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8ca3254e57542d2cd74a097c535794e7

 ///  File Name: ecourier-xss.txt
Description:
The e-Courier CMS tracking site suffers from a cross site scripting vulnerability.
Author:BugsNotHugs
File Size:605
Last Modified:Nov 3 19:58:54 2009
MD5 Checksum:96d8d692eb8dd9bfe1bab5813aff7875

 ///  File Name: edirectory_host.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell eDirectory 8.8.1. The web interface does not validate the length of the HTTP Host header prior to using the value of that header in an HTTP redirect.
Author:MC
Homepage:http://www.metasploit.com
File Size:1949
Related OSVDB(s):29993
Related CVE(s):CVE-2006-5478
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f3977f3b3508c028e8f92788e512fcef

 ///  File Name: edirectory_imonitor.rb.txt
Description:
This Metasploit module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware.
Author:Matt Olney,anonymous
Homepage:http://www.metasploit.com
File Size:1928
Related OSVDB(s):18703
Related CVE(s):CVE-2005-2551
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3647ad263efbff68ea649c52101eca7a

 ///  File Name: efs_easychatserver_username.rb.txt
Description:
This Metasploit module exploits a stack overflow in EFS Software Easy Chat Server. By sending a overly long authentication request, an attacker may be able to execute arbitrary code.
Author:LSO
Homepage:http://www.metasploit.com
File Size:2263
Related OSVDB(s):7416
Related CVE(s):CVE-2004-2466
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:46c75eaef161d264b34211e1d004c0ae

 ///  File Name: eiqnetworks_esa.rb.txt
Description:
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the LICMGR_ADDLICENSE command, a stack-based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
Author:kf,MC,ri0t
Homepage:http://www.metasploit.com
File Size:4842
Related OSVDB(s):27526
Related CVE(s):CVE-2006-3838
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:40cb738692b3e50b1cf414e1127a5156

 ///  File Name: eiqnetworks_esa_topology.rb.txt
Description:
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the DELETEDEVICE command in the Topology server, a stacked based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
Author:MC
Homepage:http://www.metasploit.com
File Size:1912
Related OSVDB(s):27528
Related CVE(s):CVE-2006-3838
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7ec7e831bad3db9439a439c7ce52bcd7

 ///  File Name: elxiscms-disclose.txt
Description:
Elxis CMS suffers from a local file disclosure vulnerability.
Author:cr4wl3r
File Size:1050
Last Modified:Nov 30 17:06:08 2009
MD5 Checksum:a4fca85e9f77722759dc886fd22e60d4

 ///  File Name: emc_appextender_keyworks.rb.txt
Description:
This Metasploit module exploits a stack overflow in the KeyWorks KeyHelp Activex Control (KeyHelp.ocx 1.2.3120.0). This Activex Control comes bundled with EMC's Documentation ApplicationXtender 5.4.
Author:MC
Homepage:http://www.metasploit.com
File Size:3253
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b5daa45fbbac1cf562cee6b0c7ed309a

 ///  File Name: endonesia-lfi.txt
Description:
Endonesia CMS version 8.4 suffers from a local file inclusion vulnerability.
Author:s4r4d0
File Size:711
Last Modified:Nov 4 20:18:10 2009
MD5 Checksum:8c4de0223243cadb43fafbaea8a57f56

 ///  File Name: enjoysapgui_preparetoposthtml.rb.tx..>
Description:
This Metasploit module exploits a stack overflow in SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41) provided by EnjoySAP GUI. By sending an overly long string to the "PrepareToPostHTML()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2576
Related OSVDB(s):37690
Related CVE(s):CVE-2007-3605
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7978a58a00e2234e8a0e6c0a253167fd