Section:  .. / 0911-exploits  /

Page 6 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 125 - 150 of 449
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: ib_isc_attach_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3849
Related OSVDB(s):38607
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a309e699ae44406d74ac0fa0e8c0da85

 ///  File Name: ib_isc_create_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3849
Related OSVDB(s):38606
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ff7271f28dbab6b339eb80b560771d39

 ///  File Name: ib_svc_attach.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3942
Related OSVDB(s):38605
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:221842da93044ac6124e2e9fcd093224

 ///  File Name: ibm_tpmfosd_overflow.rb.txt
Description:
This is a stack overflow exploit for IBM Tivoli Provisioning Manager for OS Deployment version 5.1.0.X.
Author:toto
Homepage:http://www.metasploit.com
File Size:6773
Related OSVDB(s):34678
Related CVE(s):CVE-2007-1868
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0e651970fd8db1555515d7abc16a76ac

 ///  File Name: ibm_tsm_cad.rb.txt
Description:
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1854
Related OSVDB(s):38161
Related CVE(s):CVE-2007-4880
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:44db477430884ff6275ce3fa63f48591

 ///  File Name: ibmegath_getxmlvalue.rb.txt
Description:
This Metasploit module exploits a stack overflow in IBM Access Support. When sending an overly long string to the GetXMLValue() method of IbmEgath.dll (3.20.284.0) an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3025
Related OSVDB(s):52958
Related CVE(s):CVE-2009-0215
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:2f2301a336dbfdee91f422c3664c854c

 ///  File Name: ibmlotusdomino_dwa_uploadmodule.rb...>
Description:
This Metasploit module exploits a stack overflow in IBM Lotus Domino Web Access Upload Module. By sending an overly long string to the "General_ServerName()" property located in the dwa7w.dll and the inotes6w.dll control, an attacker may be able to execute arbitrary code.
Author:Elazar Broad
Homepage:http://www.metasploit.com
File Size:4356
Related OSVDB(s):40954
Related CVE(s):CVE-2007-4474
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:50aa5ae090a1b2db0a274c256a751cba

 ///  File Name: icecast_header.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array.
Author:Luigi Auriemma,spoonm
Homepage:http://www.metasploit.com
File Size:2858
Related OSVDB(s):10406
Related CVE(s):CVE-2004-1561
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:960f5912bae318348be86d784228f9e1

 ///  File Name: ie_iscomponentinstalled.rb.txt
Description:
This Metasploit module exploits a stack overflow in Internet Explorer. This bug was patched in Windows 2000 SP4 and Windows XP SP1 according to MSRC.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:2453
Related OSVDB(s):31647
Related CVE(s):CVE-2006-1016
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:43ed623935dd912a7903f9e3cdd0eac5

 ///  File Name: ie_unsafe_scripting.rb.txt
Description:
This exploit takes advantage of the "Initialize and script ActiveX controls not marked safe for scripting" setting within Internet Explorer.
Author:natron
Homepage:http://www.metasploit.com
File Size:5767
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3bd62efc3766194d68aa73eb6ae5ef50

 ///  File Name: ie_xml_corruption.rb.txt
Description:
This Metasploit module exploits a vulnerability in the data binding feature of Internet Explorer. In order to execute code reliably, this module uses the .NET DLL memory technique pioneered by Alexander Sotirov and Mark Dowd. This method is used to create a fake vtable at a known location with all methods pointing to our payload. Since the .text segment of the .NET DLL is non-writable, a prefixed code stub is used to copy the payload into a new memory segment and continue execution from there.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:8970
Related OSVDB(s):50622
Related CVE(s):CVE-2008-4844
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:4098681f9e0ebbb4013f153e64cb4eea

 ///  File Name: imail_delete.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the 'DELETE' command of the the IMail IMAP4D service. This vulnerability can only be exploited with a valid username and password. This flaw was patched in version 8.14.
Author:spoonm
Homepage:http://www.metasploit.com
File Size:2480
Related OSVDB(s):11838
Related CVE(s):CVE-2004-1520
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:14e2d5eaa3ea8758abf2c2e30b7e9f99

 ///  File Name: imail_thc.rb.txt
Description:
This exploits a buffer overflow in the LDAP service that is part of the IMail product. This Metasploit module was tested against version 7.10 and 8.5, both running on Windows 2000.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1938
Related OSVDB(s):3984
Related CVE(s):CVE-2004-0297
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f4c724d701ff53ac69c754ff214e83f9

 ///  File Name: ipswitch_search.rb.txt
Description:
This Metasploit module exploits a stack overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.
Author:MC
Homepage:http://www.metasploit.com
File Size:2038
Related OSVDB(s):36219
Related CVE(s):CVE-2007-3925
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d23d55b8dfb82395233bc32e20b9f237

 ///  File Name: ipswitch_wug_maincfgret.rb.txt
Description:
This Metasploit module exploits a buffer overflow in IPswitch WhatsUp Gold 8.03. By posting a long string for the value of 'instancename' in the _maincfgret.cgi script an attacker can overflow a buffer and execute arbitrary code on the system.
Author:MC
Homepage:http://www.metasploit.com
File Size:2569
Related OSVDB(s):9177
Related CVE(s):CVE-2004-0798
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:851870ad39f09f0a7e32667d593fb934

 ///  File Name: juniper_sslvpn_ive_setupdll.rb.txt
Description:
This Metasploit module exploits a stack overflow in the JuniperSetupDLL.dll library which is called by the JuniperSetup.ocx ActiveX control, as part of the Juniper SSL-VPN (IVE) appliance. By specifying an overly long string to the ProductName object parameter, the stack is overwritten.
Author:patrick
Homepage:http://www.metasploit.com
File Size:2462
Related OSVDB(s):25001
Related CVE(s):CVE-2006-2086
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d2a55a7759653c192c9deda8b760dabd

 ///  File Name: kazaa_altnet_heap.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Altnet Download Manager ActiveX Control (amd4.dll) bundled with Kazaa Media Desktop 3.2.7. By sending a overly long string to the "Install()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3468
Related OSVDB(s):37785
Related CVE(s):CVE-2007-5217
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:85fca6b31f7d348ba05fccedcbd1280a

 ///  File Name: kerio_auth.rb.txt
Description:
This Metasploit module exploits a stack overflow in Kerio Personal Firewall administration authentication process. This Metasploit module has only been tested against Kerio Personal Firewall 2 (2.1.4).
Author:MC
Homepage:http://www.metasploit.com
File Size:1935
Related OSVDB(s):6294
Related CVE(s):CVE-2003-0220
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:00495fc471e2149515e5289716ad2ec5

 ///  File Name: landesk_aolnsrvr.rb.txt
Description:
This Metasploit module exploits a stack overflow in LANDesk Management Suite 8.7. By sending an overly long string to the Alert Service, a buffer is overwritten and arbitrary code can be executed.
Author:MC
Homepage:http://www.metasploit.com
File Size:3570
Related OSVDB(s):34964
Related CVE(s):CVE-2007-1674
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:979bebbf9ed55c7056aa872337593709

 ///  File Name: leapftp_pasv_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the LeapWare LeapFTP v2.7.3.600 client that is triggered through an excessively long PASV reply command. This Metasploit module was ported from the original exploit by drG4njubas with minor improvements.
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:3413
Related OSVDB(s):4587
Related CVE(s):CVE-2003-0558
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:495b1f160949d056f8a3de5e69dff903

 ///  File Name: lgserver.rb.txt
Description:
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1814
Related OSVDB(s):31593
Related CVE(s):CVE-2007-0449
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:df8461e892a3befd9ff6d9588ef5347d

 ///  File Name: lgserver_rxrlogin.rb.txt
Description:
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2351
Related OSVDB(s):41353
Related CVE(s):CVE-2007-5003
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:47e858e7068b1e322bed8fa831f9ba6c

 ///  File Name: lgserver_rxsuselicenseini.rb.txt
Description:
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request (rxsUseLicenseIni), an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2287
Related OSVDB(s):35329
Related CVE(s):CVE-2007-3216
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1e2622b896ed2dbf40613822c81ab714

 ///  File Name: license_gcr.rb.txt
Description:
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup 11.0. By sending a specially crafted request to the lic98rmtd.exe service, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2051
Related OSVDB(s):14389
Related CVE(s):CVE-2005-0581
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:bd4485391cbe393dd3a1c8d05c29a8a4

 ///  File Name: logitechvideocall_start.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Logitech VideoCall ActiveX Control (wcamxmp.dll 2.0.3470.448). By sending a overly long string to the "Start()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2419
Related OSVDB(s):36820
Related CVE(s):CVE-2007-2918
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1b2d8872da65415d679a3fcc4c9732d8