Section:  .. / 0911-exploits  /

Page 4 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 75 - 100 of 449
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: ca_cab.rb.txt
Description:
This Metasploit module exploits a stack overflow in CA eTrust Antivirus 8.1.637. By creating a specially crafted CAB file, an an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2810
Related CVE(s):CVE-2007-2864
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:487bf159b57f26a38ad1fffaedebfde7

 ///  File Name: ca_igateway_debug.rb.txt
Description:
This Metasploit module exploits a vulnerability in the Computer Associates iTechnology iGateway component. When True is enabled in igateway.conf (non-default), it is possible to overwrite the stack and execute code remotely.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2417
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8978f67ab92426d063102e129c0c84af

 ///  File Name: cain_abel_4918_rdp.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.
Author:Trancek
Homepage:http://www.metasploit.com
File Size:2075
Related OSVDB(s):50342
Related CVE(s):CVE-2008-5405
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f850832390113f08d7022838d50e886d

 ///  File Name: cam_log_security.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA CAM service by passing a long parameter to the log_security() function. The CAM service is part of TNG Unicenter. This Metasploit module has been tested on Unicenter v3.1.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2288
Related OSVDB(s):18916
Related CVE(s):CVE-2005-2668
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d4527ecf49de18832a8a7e75c620b9d4

 ///  File Name: ccproxy_telnet_ping.rb.txt
Description:
This Metasploit module exploits the YoungZSoft CCProxy <= v6.2 suite Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command.
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:2344
Related OSVDB(s):11593
Related CVE(s):CVE-2004-2416
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3e097f89c82a14bf523c336c5d45d5ac

 ///  File Name: cesarftp_mkd.rb.txt
Description:
This Metasploit module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.
Author:MC
Homepage:http://www.metasploit.com
File Size:1958
Related OSVDB(s):26364
Related CVE(s):CVE-2006-2961
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0b5769e2692d2b14fb668f894409bb96

 ///  File Name: creative_software_cachefolder.rb.tx..>
Description:
This Metasploit module exploits a stack overflow in Creative Software AutoUpdate Engine. When sending an overly long string to the cachefolder() property of CTSUEng.ocx an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3509
Related OSVDB(s):45655
Related CVE(s):CVE-2008-0955
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:10d75b9d3dc9e4dcd59f10bb71395070

 ///  File Name: destinymediaplayer16.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist
Author:Trancek
Homepage:http://www.metasploit.com
File Size:1927
Related OSVDB(s):53249
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3581cd695a23ad3d7a48380e5a9aaa5c

 ///  File Name: discovery_tcp.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a specific type of request is sent to the TCP listener on port 41523. This vulnerability was discovered by cybertronic[at]gmx.net and affects all known versions of the BrightStor product. This Metasploit module is based on the 'cabrightstor_disco' exploit by Thor Doomen.
Author:H D Moore,patrick
Homepage:http://www.metasploit.com
File Size:3714
Related OSVDB(s):13814
Related CVE(s):CVE-2005-2535
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f08975a1d4fd37bf025c830b2145d54d

 ///  File Name: discovery_udp.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a large request is sent to UDP port 41524, triggering a stack overflow.
Author:H D Moore,patrick
Homepage:http://www.metasploit.com
File Size:2885
Related OSVDB(s):13613
Related CVE(s):CVE-2005-0260
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:73a5a5752dc68b5bbac67ec85dcbb0c6

 ///  File Name: djvu_imageurl.rb.txt
Description:
This Metasploit module exploits a stack overflow in DjVu ActiveX Component. When sending an overly long string to the ImageURL() property of DjVu_ActiveX_MSOffice.dll (3.0) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
Author:dean
Homepage:http://www.metasploit.com
File Size:3405
Related OSVDB(s):49592
Related CVE(s):CVE-2008-4922
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7d0edadf006976a6400b472c88bc355e

 ///  File Name: dlink_long_filename.rb.txt
Description:
This Metasploit module exploits a stack overflow in D-Link TFTP 1.0. By sending a request for an overly long file name, an attacker could overflow a buffer and execute arbitrary code.
Author:LSO,patrick
Homepage:http://www.metasploit.com
File Size:2169
Related OSVDB(s):33977
Related CVE(s):CVE-2007-1435
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c5a2e6d1d64f08aeb8a87741001d8a01

 ///  File Name: domino_http_accept_language.rb.txt
Description:
This Metasploit module exploits a stack overflow in IBM Lotus Domino Web Server prior to version 7.0.3FP1 and 8.0.1. This flaw is triggered by any HTTP request with an Accept-Language header greater than 114 bytes.
Author:Earl Marcus,Fairuzan Roslan
Homepage:http://www.metasploit.com
File Size:5661
Related OSVDB(s):45415
Related CVE(s):CVE-2008-2240
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:434938f54dbe3e0b8433554d770893d8

 ///  File Name: domino_sametime_stmux.rb.txt
Description:
This Metasploit module exploits a stack overflow in Lotus Domino's Sametime Server. By sending an overly long POST request to the Multiplexer STMux.exe service we are able to overwrite SEH. Based on the exploit by Manuel Santamarina Suarez.
Author:patrick,riaf
Homepage:http://www.metasploit.com
File Size:3823
Related OSVDB(s):45610
Related CVE(s):CVE-2008-2499
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0da82cb9511b278950e655bb1740a66e

 ///  File Name: doubletake.rb.txt
Description:
This Metasploit module exploits a stack overflow in the authentication mechanism of NSI Doubletake which is also rebranded as HP Storage Works. This vulnerability was found by Titon of Bastard Labs.
Author:ri0t
Homepage:http://www.metasploit.com
File Size:2266
Related OSVDB(s):45924
Related CVE(s):CVE-2008-1661
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7d1994c9feedfab5a0761d62e9a79ef9

 ///  File Name: ea_checkrequirements.rb.txt
Description:
This Metasploit module exploits a stack overflow in Electronic Arts SnoopyCtrl ActiveX Control (NPSnpy.dll 1.1.0.36). When sending a overly long string to the CheckRequirements() method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2862
Related CVE(s):CVE-2007-4466
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8623cbf18a6812ebea296ffd3ec2611f

 ///  File Name: easyfilesharing_pass.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Easy File Sharing 2.0 service. By sending an overly long password, an attacker can execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2027
Related OSVDB(s):27646
Related CVE(s):CVE-2006-3952
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a3a652f37f2ab6afcdd7ca598c5f976a

 ///  File Name: ebook_flipviewer_fviewerloading.rb...>
Description:
This Metasploit module exploits a stack overflow in E-BOOK Systems FlipViewer 4.0. The vulnerability is caused due to a boundary error in the FViewerLoading (FlipViewerX.dll) ActiveX control when handling the "LoadOpf()" method.
Author:LSO
Homepage:http://www.metasploit.com
File Size:3627
Related OSVDB(s):37042
Related CVE(s):CVE-2007-2919
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:8ca3254e57542d2cd74a097c535794e7

 ///  File Name: edirectory_host.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell eDirectory 8.8.1. The web interface does not validate the length of the HTTP Host header prior to using the value of that header in an HTTP redirect.
Author:MC
Homepage:http://www.metasploit.com
File Size:1949
Related OSVDB(s):29993
Related CVE(s):CVE-2006-5478
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f3977f3b3508c028e8f92788e512fcef

 ///  File Name: edirectory_imonitor.rb.txt
Description:
This Metasploit module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware.
Author:Matt Olney,anonymous
Homepage:http://www.metasploit.com
File Size:1928
Related OSVDB(s):18703
Related CVE(s):CVE-2005-2551
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3647ad263efbff68ea649c52101eca7a

 ///  File Name: efs_easychatserver_username.rb.txt
Description:
This Metasploit module exploits a stack overflow in EFS Software Easy Chat Server. By sending a overly long authentication request, an attacker may be able to execute arbitrary code.
Author:LSO
Homepage:http://www.metasploit.com
File Size:2263
Related OSVDB(s):7416
Related CVE(s):CVE-2004-2466
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:46c75eaef161d264b34211e1d004c0ae

 ///  File Name: eiqnetworks_esa.rb.txt
Description:
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the LICMGR_ADDLICENSE command, a stack-based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
Author:kf,MC,ri0t
Homepage:http://www.metasploit.com
File Size:4842
Related OSVDB(s):27526
Related CVE(s):CVE-2006-3838
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:40cb738692b3e50b1cf414e1127a5156

 ///  File Name: eiqnetworks_esa_topology.rb.txt
Description:
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the DELETEDEVICE command in the Topology server, a stacked based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
Author:MC
Homepage:http://www.metasploit.com
File Size:1912
Related OSVDB(s):27528
Related CVE(s):CVE-2006-3838
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7ec7e831bad3db9439a439c7ce52bcd7

 ///  File Name: emc_appextender_keyworks.rb.txt
Description:
This Metasploit module exploits a stack overflow in the KeyWorks KeyHelp Activex Control (KeyHelp.ocx 1.2.3120.0). This Activex Control comes bundled with EMC's Documentation ApplicationXtender 5.4.
Author:MC
Homepage:http://www.metasploit.com
File Size:3253
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b5daa45fbbac1cf562cee6b0c7ed309a

 ///  File Name: enjoysapgui_preparetoposthtml.rb.tx..>
Description:
This Metasploit module exploits a stack overflow in SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41) provided by EnjoySAP GUI. By sending an overly long string to the "PrepareToPostHTML()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2576
Related OSVDB(s):37690
Related CVE(s):CVE-2007-3605
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7978a58a00e2234e8a0e6c0a253167fd