Section:  .. / 0911-exploits  /

Page 18 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 425 - 449 of 449
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: Portili-V1.14.txt
Description:
The Portili Personal and Team Wiki versions 1.14 and below suffer from cross site scripting, shell upload, and information and password disclosure vulnerabilities.
Author:Abysssec
Homepage:http://abysssec.com/
File Size:4790
Last Modified:Nov 4 20:10:31 2009
MD5 Checksum:8aacc0b06d30b5342ac36f1290e124a0

 ///  File Name: ecourier-xss.txt
Description:
The e-Courier CMS tracking site suffers from a cross site scripting vulnerability.
Author:BugsNotHugs
File Size:605
Last Modified:Nov 3 19:58:54 2009
MD5 Checksum:96d8d692eb8dd9bfe1bab5813aff7875

 ///  File Name: punbbea-sql.txt
Description:
PunBB Extension Attachment versions 1.0.2 and below remote SQL injection exploit.
Author:puret_t
File Size:2610
Last Modified:Nov 3 17:50:06 2009
MD5 Checksum:3136893c3e21b9386a98aee65020cddb

 ///  File Name: corelanc0d3r_xion_xpsp3.pl.txt
Description:
Xion Audio Player version 1.0 build 121 local buffer overflow exploit.
Author:corelanc0d3r
Related Exploit:xionap-overflow.txt
File Size:3076
Last Modified:Nov 3 17:35:21 2009
MD5 Checksum:23e8837a0bd388f45a51407c82508d0f

 ///  File Name: symantec_consoleutilities_browseand..>
Description:
This Metasploit module exploits a stack overflow in Symantec ConsoleUtilities. By sending an overly long string to the "BrowseAndSaveFile()" method located in the AeXNSConsoleUtilities.dll (6.0.0.1846) Control, an attacker may be able to execute arbitrary code.
Author:Nikolas Sotiriu
Homepage:http://sotiriu.de/
Related File:NSOADV-2009-001.txt
File Size:4562
Related CVE(s):CVE-2009-3031
Last Modified:Nov 2 23:55:45 2009
MD5 Checksum:af9c77caa7285c2b431af6ba1a6c948d

 ///  File Name: whois20-xss.txt
Description:
Whois Server version 2.0 suffers from a cross site scripting vulnerability.
Author:ViRuS_HiMa
File Size:2584
Last Modified:Nov 2 23:49:41 2009
MD5 Checksum:9f65ac534da1e6ae1755d1f9813b3467

 ///  File Name: servu-overflow.txt
Description:
Rhinosoft.com Serv-U web client version 9.0.0.5 suffers from a remote buffer overflow vulnerability. Proof of concept code included.
Author:Nikolaos Rangos
File Size:2224
Last Modified:Nov 2 23:47:04 2009
MD5 Checksum:3be5afefa6fef4916df79eb5c41a0972

 ///  File Name: joomlatinymce-exec.txt
Description:
Remote code execution exploit for Joomla 1.5.12 using a file upload vulnerability in TinyMCE.
Author:Luca De Fulgentis
File Size:5674
Last Modified:Nov 2 23:21:43 2009
MD5 Checksum:703dc2699c920bd5ccf7a8f7e74ceef3

 ///  File Name: tftgallery-traversal.txt
Description:
TFTgallery version 0.13 is susceptible to a directory traversal vulnerability.
Author:Blake
File Size:632
Last Modified:Nov 2 22:59:36 2009
MD5 Checksum:227d4bd9b4632e65b8a085743c22e814

 ///  File Name: sipxphone_cseq.rb.txt
Description:
This Metasploit module exploits a buffer overflow in SIPfoundry's sipXphone 2.6.0.27. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the affected application.
Author:MC
Homepage:http://www.metasploit.com
File Size:2366
Related OSVDB(s):27122
Related CVE(s):CVE-2006-3524
Last Modified:Oct 30 17:02:30 2009
MD5 Checksum:e12837715461982da0378b11fb7ab725

 ///  File Name: proxypro_http_get.rb.txt
Description:
This Metasploit module exploits a stack overflow in Proxy-Pro Professional GateKeeper 4.7. By sending a long HTTP GET to the default port of 3128, a remote attacker could overflow a buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1869
Related OSVDB(s):4027
Related CVE(s):CVE-2004-0326
Last Modified:Oct 30 17:02:28 2009
MD5 Checksum:236e4cbd21b904c274d433570efd4292

 ///  File Name: ms02_039_slammer.rb.txt
Description:
This is an exploit for the SQL Server 2000 resolution service buffer overflow. This overflow is triggered by sending a udp packet to port 1434 which starts with 0x04 and is followed by long string terminating with a colon and a number. This Metasploit module should work against any vulnerable SQL Server 2000 or MSDE install (pre-SP3).
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2659
Related OSVDB(s):4578
Related CVE(s):CVE-2002-0649
Last Modified:Oct 30 17:02:23 2009
MD5 Checksum:aefc402bff82ed6effa9174fe4f05a77

 ///  File Name: novell_netmail_subscribe.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's NetMail 3.52 IMAP SUBSCRIBE verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1938
Related OSVDB(s):31360
Related CVE(s):CVE-2006-6761
Last Modified:Oct 30 17:02:08 2009
MD5 Checksum:530890e764a5916a4016d1246e7c9a07

 ///  File Name: ms01_023_printer.rb.txt
Description:
This exploits a buffer overflow in the request processor of the Internet Printing Protocol ISAPI module in IIS. This Metasploit module works against Windows 2000 service pack 0 and 1. If the service stops responding after a successful compromise, run the exploit a couple more times to completely kill the hung process.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2770
Related OSVDB(s):3323
Related CVE(s):CVE-2001-0241
Last Modified:Oct 30 17:02:03 2009
MD5 Checksum:011eb5cfc9ca3a9b443ef09d69cb9770

 ///  File Name: oracle9i_xdb_pass.rb.txt
Description:
This Metasploit module exploits a stack overflow in the authorization code of the Oracle 9i HTTP XDB service. David Litchfield, has illustrated multiple vulnerabilities in the Oracle 9i XML Database (XDB), during a seminar on "Variations in exploit methods between Linux and Windows" presented at the Blackhat conference.
Author:MC
Homepage:http://www.metasploit.com
File Size:2501
Related OSVDB(s):2449
Related CVE(s):CVE-2003-0727
Last Modified:Oct 30 17:01:59 2009
MD5 Checksum:7f6075fb013baace03f43b207dae7782

 ///  File Name: maxdb_webdbm_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in the MaxDB WebDBM service. By sending a specially-crafted HTTP request that contains an overly long database name. A remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the wahttp process. This Metasploit module has been tested against MaxDB 7.6.00.16 and MaxDB 7.6.00.27.
Author:MC
Homepage:http://www.metasploit.com
File Size:2472
Related OSVDB(s):28300
Related CVE(s):CVE-2006-4305
Last Modified:Oct 30 17:01:57 2009
MD5 Checksum:8e06deb4c7b5790bea7c107e694e65bb

 ///  File Name: warftpd_165_user.rb.txt
Description:
This Metasploit module exploits a buffer overflow found in the USER command of War-FTPD 1.65.
Author:Fairuzan Roslan
Homepage:http://www.metasploit.com
File Size:2040
Related OSVDB(s):875
Related CVE(s):CVE-1999-0256
Last Modified:Oct 30 17:01:48 2009
MD5 Checksum:3435c07010f11d33b212804e0c189e2f

 ///  File Name: blazedvd_plf.rb.txt
Description:
This Metasploit module exploits a stack over flow in BlazeDVD 5.1. When the application is used to open a specially crafted plf file, a buffer is overwritten allowing for the execution of arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2568
Last Modified:Oct 30 17:01:38 2009
MD5 Checksum:4b192fd114bdfab3ca86f73ff8eea814

 ///  File Name: softartisans_getdrivename.rb.txt
Description:
This Metasploit module exploits a stack overflow in SoftArtisans XFile FileManager ActiveX control (SAFmgPwd.dll 2.0.5.3). When sending an overly long string to the GetDriveName() method an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3523
Related OSVDB(s):47794
Related CVE(s):CVE-2007-1682
Last Modified:Oct 30 17:01:29 2009
MD5 Checksum:931e920ee423b3ac8d2458c849da3eef

 ///  File Name: nis2004_get.rb.txt
Description:
This Metasploit module exploits a stack overflow in the ISAlertDataCOM ActiveX Control (ISLAert.dll) provided by Symantec Norton Internet Security 2004. By sending a overly long string to the "Get()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2609
Related OSVDB(s):36164
Related CVE(s):CVE-2007-1689
Last Modified:Oct 30 17:01:26 2009
MD5 Checksum:27fa43c7a6bc6ad0adaf06f90417e613

 ///  File Name: ie_createobject.rb.txt
Description:
This Metasploit module exploits a generic code execution vulnerability in Internet Explorer by abusing vulnerable ActiveX objects.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:7347
Last Modified:Oct 30 17:01:20 2009
MD5 Checksum:a85d55c56e1a1797651aac42aabe0cb8

 ///  File Name: facebook_extractiptc.rb.txt
Description:
This Metasploit module exploits a stack overflow in Facebook Photo Uploader 4. By sending an overly long string to the "ExtractIptc()" property located in the ImageUploader4.ocx (4.5.57.0) Control, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3099
Related OSVDB(s):41073
Related CVE(s):CVE-2008-5711
Last Modified:Oct 30 17:01:18 2009
MD5 Checksum:afb6e832377ff9482a38b2705422a3b6

 ///  File Name: message_engine_heap.rb.txt
Description:
This Metasploit module exploits a heap overflow in Computer Associates BrightStor ARCserve Backup 11.5. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2098
Related OSVDB(s):29533
Related CVE(s):CVE-2006-5143
Last Modified:Oct 30 17:01:12 2009
MD5 Checksum:30bae2aad319eca435b874c4335b8515

 ///  File Name: remote_agent.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Veritas BackupExec Windows Agent software. This vulnerability occurs when a client authentication request is received with type '3' and a long password argument. Reliable execution is obtained by abusing the stack overflow to smash a SEH pointer.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3587
Related OSVDB(s):17624
Related CVE(s):CVE-2005-0773
Last Modified:Oct 30 17:01:09 2009
MD5 Checksum:4557d9e2aa7bd8179563c3a1b6a4abaa