Section:  .. / 0911-exploits  /

Page 5 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 100 - 125 of 449
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: etrust_itm_alert.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Computer Associates Threat Manager for the Enterprise r8.1. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need valid logon credentials to the target.
Author:MC
Homepage:http://www.metasploit.com
File Size:3381
Related OSVDB(s):44040
Related CVE(s):CVE-2007-4620
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b27496afecb4df14edd9d8874d154254

 ///  File Name: etrust_pestscan.rb.txt
Description:
This Metasploit module exploits a stack overflow in CA eTrust PestPatrol. When sending an overly long string to the Initialize() property of ppctl.dll (5.6.7.9) an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3456
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:37b72c5c0cf120c6e9da26804037739f

 ///  File Name: eudora_list.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0). Using the PAYLOAD of windows/shell_bind_tcp allows or the most reliable results.
Author:MC
Homepage:http://www.metasploit.com
File Size:2209
Related OSVDB(s):22097
Related CVE(s):CVE-2005-4267
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:cd94d4a87e69d2b71112e7f54c3b7f6e

 ///  File Name: fb_isc_attach_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3578
Related OSVDB(s):38607
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d17ecb0c8825e699cbfc4ab9d9342164

 ///  File Name: fb_isc_create_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3578
Related OSVDB(s):38606
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9b3d806b79e920c84b6bc3eb29bcf061

 ///  File Name: fb_svc_attach.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:2845
Related OSVDB(s):38605
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1ea324be8ea8e7ff7f474978dc9d54e0

 ///  File Name: fdm_auth_header.rb.txt
Description:
This Metasploit module exploits a stack overflow in Free Download Manager Remote Control 2.5 Build 758. When sending a specially crafted Authorization header, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1790
Related OSVDB(s):51745
Related CVE(s):CVE-2009-0183
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ae8b323a86716cebc4868fb26772932a

 ///  File Name: filecopa_list_overflow.rb.txt
Description:
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch
Author:Jacopo Cervini
Homepage:http://www.metasploit.com
File Size:1541
Related OSVDB(s):27389
Related CVE(s):CVE-2006-3726
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d1e198f77ef9317b58c77df55c5ac7fa

 ///  File Name: fp30reg_chunked.rb.txt
Description:
This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3275
Related OSVDB(s):2952
Related CVE(s):CVE-2003-0822
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d211f8dd86f04c39bcce6c3a6e31208a

 ///  File Name: freeftpd_key_exchange.rb.txt
Description:
This Metasploit module exploits a simple stack overflow in FreeFTPd 1.0.10. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client. This Metasploit module is based on MC's freesshd_key_exchange exploit.
Author:Fairuzan Roslan
Homepage:http://www.metasploit.com
File Size:2389
Related OSVDB(s):25569
Related CVE(s):CVE-2006-2407
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b21befe419d2b7f922115f425bfdc2eb

 ///  File Name: freeftpd_user.rb.txt
Description:
This Metasploit module exploits a stack overflow in the freeFTPd multi-protocol file transfer service. This flaw can only be exploited when logging has been enabled (non-default).
Author:MC
Homepage:http://www.metasploit.com
File Size:2245
Related OSVDB(s):20909
Related CVE(s):CVE-2005-3683
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:4030cb4d708ab6b90e821c65021502ee

 ///  File Name: freesshd_key_exchange.rb.txt
Description:
This Metasploit module exploits a simple stack overflow in FreeSSHd 1.0.9. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client.
Author:MC
Homepage:http://www.metasploit.com
File Size:2209
Related OSVDB(s):25463
Related CVE(s):CVE-2006-2407
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7b87db3c9cc73626c299769c54740e7d

 ///  File Name: futuresoft_transfermode.rb.txt
Description:
This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all).
Author:MC
Homepage:http://www.metasploit.com
File Size:2417
Related OSVDB(s):16954
Related CVE(s):CVE-2005-1812
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f9f7d6925a7ab16a58f9f0f0a9a894f5

 ///  File Name: globalscapeftp_input.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the GlobalSCAPE Secure FTP Server. All versions prior to 3.0.3 are affected by this flaw. A valid user account ( or anonymous access) is required for this exploit to work.
Author:Fairuzan Roslan,Mati Aharoni
Homepage:http://www.metasploit.com
File Size:1961
Related OSVDB(s):16049
Related CVE(s):CVE-2005-1415
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dc53634a1c7a57495c390bb77eec0c57

 ///  File Name: gom_openurl.rb.txt
Description:
This Metasploit module exploits a stack overflow in GOM Player 2.1.6.3499. By sending an overly long string to the "OpenUrl()" method located in the GomWeb3.dll Control, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2465
Related OSVDB(s):38282
Related CVE(s):CVE-2007-5779
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d865394a9848c820b009608e5c321ef8

 ///  File Name: goodtech_telnet.rb.txt
Description:
This Metasploit module exploits a stack overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1917
Related OSVDB(s):14806
Related CVE(s):CVE-2005-0768
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:eea62be8b7cc6e05b4368f342e2149ee

 ///  File Name: groupwisemessenger_client.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's GroupWise Messenger Client. By sending a specially crafted HTTP response, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:4427
Related OSVDB(s):46041
Related CVE(s):CVE-2008-2703
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0da711ff86ad6eca8d8c35d3c2225df2

 ///  File Name: hp_nnm.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1809
Related OSVDB(s):39530
Related CVE(s):CVE-2007-6204
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7119a0e0e48141c5d7351d429402d4b2

 ///  File Name: hp_nnm_toolbar.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1806
Related OSVDB(s):53222
Related CVE(s):CVE-2008-0067
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:eebc7a8eae79fdcba76863cb51497d09

 ///  File Name: hp_ovtrace.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Operations version A.07.50. By sending a specially crafted packet, a remote attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1772
Related OSVDB(s):39527
Related CVE(s):CVE-2007-3872
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b12357fef68f74c168e826e0025b51ab

 ///  File Name: hploadrunner.rb.txt
Description:
This Metasploit module exploits a stack overflow in Persists Software Inc's XUpload ActiveX control(version 2.1.0.1) thats included in HP LoadRunner 9.0. By passing an overly long string to the AddFolder method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2552
Related OSVDB(s):39901
Related CVE(s):CVE-2007-6530
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:457ae3781adc6fd4411aab52dc3aa8d2

 ///  File Name: hpmqc_progcolor.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in SPIDERLib.Loader ActiveX control (Spider90.ocx) 9.1.0.4353 installed by TestDirector (TD) for Hewlett-Packard Mercury Quality Center 9.0 before Patch 12.1, and 8.2 SP1 before Patch 32. By setting an overly long value to 'ProgColor', an attacker can overrun a buffer and execute arbitrary code.
Author:Trancer
Homepage:http://www.metasploit.com
File Size:4001
Related OSVDB(s):34317
Related CVE(s):CVE-2007-1819
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:236739259c5f6f007c26b83d0392dadc

 ///  File Name: hsmserver.rb.txt
Description:
This Metasploit module exploits one of the multiple stack overflows in Computer Associates BrightStor HSM. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
Author:toto
Homepage:http://www.metasploit.com
File Size:1996
Related OSVDB(s):41363
Related CVE(s):CVE-2007-5082
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:59aa9dbb251f1704e4d16e690632a9f7

 ///  File Name: hummingbird_exceed.rb.txt
Description:
This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.
Author:MC
Homepage:http://www.metasploit.com
File Size:1786
Related OSVDB(s):16957
Related CVE(s):CVE-2005-1815
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9f94cfb1c4e895dea6a1ae77a129d77d

 ///  File Name: ia_webmail.rb.txt
Description:
This exploits a stack overflow in the IA WebMail server. This exploit has not been tested against a live system at this time.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1585
Related OSVDB(s):2757
Related CVE(s):CVE-2003-1192
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b36b10d2eea9582419f82240c737857b