Section:  .. / 0911-exploits  /

Page 14 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 325 - 350 of 449
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: mercur_login.rb.txt
Description:
This Metasploit module exploits a stack overflow in Atrium Mercur IMAP 5.0 SP3. Since the room for shellcode is small, using the reverse ordinal payloads yields the best results.
Author:MC
Homepage:http://www.metasploit.com
File Size:1990
Related OSVDB(s):23950
Related CVE(s):CVE-2006-1255
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:5858320035bfa07ff27a3a50baad9087

 ///  File Name: navicopa_get_overflow.rb.txt
Description:
This Metasploit module exploits a stack overflow in NaviCOPA 2.0.1. The vulnerability is caused due to a boundary error within the handling of URL parameters.
Author:MC
Homepage:http://www.metasploit.com
File Size:1989
Related OSVDB(s):29257
Related CVE(s):CVE-2006-5112
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c1a626de774259771ca4d5d7b4c04f29

 ///  File Name: mailenable_status.rb.txt
Description:
MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1980
Related OSVDB(s):17844
Related CVE(s):CVE-2005-2278
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:71f5fcc54613b0417a35b32296e4b05f

 ///  File Name: vuplayer_cue.rb.txt
Description:
This Metasploit module exploits a stack over flow in VUPlayer <= 2.49. When the application is used to open a specially crafted cue file, an buffer is overwritten allowing for the execution of arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1974
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:2ee13abaf3a0468a85f10cc3d6af9b0f

 ///  File Name: windows_rsh.rb.txt
Description:
This Metasploit module exploits a vulnerability in Windows RSH daemon 1.8. The vulnerability is due to a failure to check for the length of input sent to the RSH server. A CPORT of 512 -> 1023 must be configured for the exploit to be successful.
Author:MC
Homepage:http://www.metasploit.com
File Size:1970
Related OSVDB(s):38572
Related CVE(s):CVE-2007-4006
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1603713e8e042c6cb1ac7c650a3ead01

 ///  File Name: milleniummp3-overflow.txt
Description:
Millenium MP3 Studio version 2.0 buffer overflow exploit that creates a malicious .pls file.
Author:Molotov
File Size:1969
Last Modified:Nov 30 21:00:01 2009
MD5 Checksum:b61b67d539912a1c3f8abe14cceb9f72

 ///  File Name: bluecoat_winproxy_host.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the Blue Coat Systems WinProxy service by sending a long port value for the Host header in a HTTP request.
Author:MC
Homepage:http://www.metasploit.com
File Size:1961
Related OSVDB(s):22238
Related CVE(s):CVE-2005-4085
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:6a872c00eb1961383ba93974bdafb62a

 ///  File Name: globalscapeftp_input.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the GlobalSCAPE Secure FTP Server. All versions prior to 3.0.3 are affected by this flaw. A valid user account ( or anonymous access) is required for this exploit to work.
Author:Fairuzan Roslan,Mati Aharoni
Homepage:http://www.metasploit.com
File Size:1961
Related OSVDB(s):16049
Related CVE(s):CVE-2005-1415
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dc53634a1c7a57495c390bb77eec0c57

 ///  File Name: cesarftp_mkd.rb.txt
Description:
This Metasploit module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.
Author:MC
Homepage:http://www.metasploit.com
File Size:1958
Related OSVDB(s):26364
Related CVE(s):CVE-2006-2961
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0b5769e2692d2b14fb668f894409bb96

 ///  File Name: novell_netmail_append.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's Netmail 3.52 IMAP APPEND verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1958
Related OSVDB(s):31362
Related CVE(s):CVE-2006-6425
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:fd5c7de42beeacbca445b99c768cf27a

 ///  File Name: tftpd32_long_filename.rb.txt
Description:
This Metasploit module exploits a stack overflow in TFTPD32 version 2.21 and prior. By sending a request for an overly long file name to the tftpd32 server, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Author:MC
Homepage:http://www.metasploit.com
File Size:1956
Related OSVDB(s):45903
Related CVE(s):CVE-2002-2226
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:626f6eb555cc3c3a88a313c88f6384bf

 ///  File Name: warftpd_165_pass.rb.txt
Description:
This exploits the buffer overflow found in the PASS command in War-FTPD 1.65. This particular module will only work reliably against Windows 2000 targets. The server must be configured to allow anonymous logins for this exploit to succeed. A failed attempt will bring down the service completely.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1956
Related OSVDB(s):875
Related CVE(s):CVE-1999-0256
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a92c43e0326e0758b54de91798efc69f

 ///  File Name: edirectory_host.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell eDirectory 8.8.1. The web interface does not validate the length of the HTTP Host header prior to using the value of that header in an HTTP redirect.
Author:MC
Homepage:http://www.metasploit.com
File Size:1949
Related OSVDB(s):29993
Related CVE(s):CVE-2006-5478
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f3977f3b3508c028e8f92788e512fcef

 ///  File Name: securecrt_ssh1.rb.txt
Description:
This Metasploit module exploits a buffer overflow in SecureCRT <= 4.0 Beta 2. By sending a vulnerable client an overly long SSH1 protocol identifier string, it is possible to execute arbitrary code. This Metasploit module has only been tested on SecureCRT 3.4.4.
Author:MC
Homepage:http://www.metasploit.com
File Size:1946
Related OSVDB(s):4991
Related CVE(s):CVE-2002-1059
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:75a7ffeea7fe910cfa88ec1979cbec61

 ///  File Name: belkin_bulldog.rb.txt
Description:
This Metasploit module exploits a stack overflow in Belkin Bulldog Plus 4.0.2 build 1219. When sending a specially crafted http request, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1945
Related OSVDB(s):54395
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0e6cc12f1405f1054d70415ee14b0c92

 ///  File Name: realwin.rb.txt
Description:
This Metasploit module exploits a stack overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.0.10.37). By sending a specially crafted FC_INFOTAG/SET_CONTROL packet, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1945
Related OSVDB(s):48606
Related CVE(s):CVE-2008-4322
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7f59e4c978df5b696017cc5bc744f09e

 ///  File Name: imail_thc.rb.txt
Description:
This exploits a buffer overflow in the LDAP service that is part of the IMail product. This Metasploit module was tested against version 7.10 and 8.5, both running on Windows 2000.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1938
Related OSVDB(s):3984
Related CVE(s):CVE-2004-0297
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f4c724d701ff53ac69c754ff214e83f9

 ///  File Name: novell_netmail_subscribe.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's NetMail 3.52 IMAP SUBSCRIBE verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1938
Related OSVDB(s):31360
Related CVE(s):CVE-2006-6761
Last Modified:Oct 30 17:02:08 2009
MD5 Checksum:530890e764a5916a4016d1246e7c9a07

 ///  File Name: kerio_auth.rb.txt
Description:
This Metasploit module exploits a stack overflow in Kerio Personal Firewall administration authentication process. This Metasploit module has only been tested against Kerio Personal Firewall 2 (2.1.4).
Author:MC
Homepage:http://www.metasploit.com
File Size:1935
Related OSVDB(s):6294
Related CVE(s):CVE-2003-0220
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:00495fc471e2149515e5289716ad2ec5

 ///  File Name: borland_starteam.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland CaliberRM 2006. By sending a specially crafted GET request to the STMulticastService, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1933
Related OSVDB(s):44039
Related CVE(s):CVE-2008-0311
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9c5ce50f5e4af43e3d4622c1e9b2df1a

 ///  File Name: edirectory_imonitor.rb.txt
Description:
This Metasploit module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware.
Author:Matt Olney,anonymous
Homepage:http://www.metasploit.com
File Size:1928
Related OSVDB(s):18703
Related CVE(s):CVE-2005-2551
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3647ad263efbff68ea649c52101eca7a

 ///  File Name: destinymediaplayer16.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist
Author:Trancek
Homepage:http://www.metasploit.com
File Size:1927
Related OSVDB(s):53249
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:3581cd695a23ad3d7a48380e5a9aaa5c

 ///  File Name: asus_dpcproxy_overflow.rb.txt
Description:
This Metasploit module exploits a stack overflow in Asus Dpcroxy version 2.0.0.19. It should be vulnerable until version 2.0.0.24.
Author:Jacopo Cervini
Homepage:http://www.metasploit.com
File Size:1920
Related OSVDB(s):43638
Related CVE(s):CVE-2008-1491
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ee9690acdd567d76a763e07626bad2d4

 ///  File Name: badblue_passthru.rb.txt
Description:
This Metasploit module exploits a stack overflow in the PassThru functionality in ext.dll in BadBlue 2.72b and earlier.
Author:MC
Homepage:http://www.metasploit.com
File Size:1920
Related OSVDB(s):42416
Related CVE(s):CVE-2007-6377
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0e1ee4241d028ab720144a5a3bc8d711

 ///  File Name: goodtech_telnet.rb.txt
Description:
This Metasploit module exploits a stack overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1917
Related OSVDB(s):14806
Related CVE(s):CVE-2005-0768
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:eea62be8b7cc6e05b4368f342e2149ee