Section:  .. / 0911-exploits  /

Page 15 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 350 - 375 of 449
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: badblue_ext_overflow.rb.txt
Description:
This is a stack overflow exploit for BadBlue version 2.5.
Author:acaro
Homepage:http://www.metasploit.com
File Size:1915
Related OSVDB(s):14238
Related CVE(s):CVE-2005-0595
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a443d82c96a4d2cdb6be4d4d82f037f2

 ///  File Name: racer_503beta5.rb.txt
Description:
This Metasploit module exploits the Racer Car and Racing Simulator game versions v0.5.3 beta 5 and earlier. Both the client and server listen on UDP port 26000. By sending an overly long buffer we are able to execute arbitrary code remotely.
Author:Trancek
Homepage:http://www.metasploit.com
File Size:1915
Related OSVDB(s):39601
Related CVE(s):CVE-2007-4370
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1d0731b2eb9aa4f8e9d63e9dcb136e95

 ///  File Name: mailenable_login.rb.txt
Description:
MailEnable's IMAP server contains a buffer overflow vulnerability in the Login command.
Author:MC
Homepage:http://www.metasploit.com
File Size:1914
Related OSVDB(s):32125
Related CVE(s):CVE-2006-6423
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:06e22a16b5a95a62bf3121e135f76630

 ///  File Name: eiqnetworks_esa_topology.rb.txt
Description:
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the DELETEDEVICE command in the Topology server, a stacked based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
Author:MC
Homepage:http://www.metasploit.com
File Size:1912
Related OSVDB(s):27528
Related CVE(s):CVE-2006-3838
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7ec7e831bad3db9439a439c7ce52bcd7

 ///  File Name: nowsms.rb.txt
Description:
This Metasploit module exploits a stack overflow in Now SMS/MMS Gateway v2007.06.27. By sending a specially crafted GET request, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1908
Related OSVDB(s):42953
Related CVE(s):CVE-2008-0871
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:e01726994afd53539513ff818a33c783

 ///  File Name: shixxnote_font.rb.txt
Description:
This Metasploit module exploits a buffer overflow in ShixxNOTE 6.net. The vulnerability is caused due to boundary errors in the handling of font fields.
Author:MC
Homepage:http://www.metasploit.com
File Size:1907
Related OSVDB(s):10721
Related CVE(s):CVE-2004-1595
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:892334061ff66af3ed77a6a6cb4620b5

 ///  File Name: wincomlpd_admin.rb.txt
Description:
This Metasploit module exploits a stack overflow in WinComLPD <= 3.0.2. By sending an overly long authentication packet to the remote administration service, an attacker may be able to execute arbitrary code.
Author:MC0911-exploits/wincomlpd_admin.rb.txt 9d188c96959cfee2212f6e47a2629feb This Metasploit module exploits a stack overflow in WinComLPD <= 3.0.2 By sending an overly long authentication packet to the remote administration service,http://www.metasploit.com.
Homepage:http://www.metasploit.com
File Size:1907
Related OSVDB(s):42861
Related CVE(s):CVE-2008-5159
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9d188c96959cfee2212f6e47a2629feb

 ///  File Name: oscommerce-exec.txt
Description:
OS Commerce version 2.2RC2 suffers from an administrative bypass vulnerability allowing for command execution.
Author:Stuart Udall
File Size:1905
Last Modified:Nov 18 08:14:35 2009
MD5 Checksum:ad06e2bf86e2ce3a4a85fb83786e9d9c

 ///  File Name: mercury_cram_md5.rb.txt
Description:
This Metasploit module exploits a stack overflow in Mercury Mail Transport System 4.51. By sending a specially crafted argument to the AUTH CRAM-MD5 command, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1902
Related OSVDB(s):39669
Related CVE(s):CVE-2007-4440
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:4aabd9f0bdad3a5fdb56b4f1950cb4a0

 ///  File Name: bigant_server.rb.txt
Description:
This Metasploit module exploits a stack overflow in BigAnt Server 2.2. By sending a specially crafted packet, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1900
Related OSVDB(s):44454
Related CVE(s):CVE-2008-1914
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:bdff331e09e3dcb3175415f2197439e8

 ///  File Name: winvnc_http_get.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the AT&T WinVNC version <= v3.3.3r7 web server. When debugging mode with logging is enabled (non-default), an overly long GET request can overwrite the stack. This exploit does not work well with VNC payloads!
Author:patrick
Homepage:http://www.metasploit.com
File Size:1900
Related OSVDB(s):6280
Related CVE(s):CVE-2001-0168
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1e2bbe98c84d7157907bc18478f14418

 ///  File Name: netcat110_nt.rb.txt
Description:
This Metasploit module exploits a stack overflow in Netcat v1.10 NT. By sending an overly long string we are able to overwrite SEH. The vulnerability exists when netcat is used to bind (-e) an executable to a port in doexec.c. This Metasploit module tested successfully using "c:\\>nc -L -p 31337 -e ftp".
Author:patrick
Homepage:http://www.metasploit.com
File Size:1889
Related OSVDB(s):12612
Related CVE(s):CVE-2004-1317
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:21c003ef4e86ce46f27c10cc6824efe5

 ///  File Name: realtek_playlist.rb.txt
Description:
This Metasploit module exploits a stack overflow in Realtek Media Player(RtlRack) A4.06. When a Realtek Media Player client opens a specially crafted playlist, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1889
Related OSVDB(s):50715
Related CVE(s):CVE-2008-5664
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:32d9f6a14796516b4db88691988e1dcc

 ///  File Name: mercury_phonebook.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in Mercury/32 <= v4.01b PH Server Module. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer.
Author:MC
Homepage:http://www.metasploit.com
File Size:1885
Related OSVDB(s):22103
Related CVE(s):CVE-2005-4411
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:91fe4076b66dc23ad7b3bebd909730d5

 ///  File Name: mailenable_auth_header.rb.txt
Description:
This Metasploit module exploits a remote buffer overflow in the MailEnable web service. The vulnerability is triggered when a large value is placed into the Authorization header of the web request. MailEnable Enterprise Edition versions prior to 1.0.5 and MailEnable Professional versions prior to 1.55 are affected.
Author:David Maciejak
Homepage:http://www.metasploit.com
File Size:1871
Related OSVDB(s):15913,15737
Related CVE(s):CVE-2005-1348
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:5f28e22f23a19b0de5470c0882d24451

 ///  File Name: proxypro_http_get.rb.txt
Description:
This Metasploit module exploits a stack overflow in Proxy-Pro Professional GateKeeper 4.7. By sending a long HTTP GET to the default port of 3128, a remote attacker could overflow a buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1869
Related OSVDB(s):4027
Related CVE(s):CVE-2004-0326
Last Modified:Oct 30 17:02:28 2009
MD5 Checksum:236e4cbd21b904c274d433570efd4292

 ///  File Name: tiny_identd_overflow.rb.txt
Description:
This Metasploit module exploits a stack based buffer overflow in TinyIdentD version 2.2. If we send a long string to the ident service we can overwrite the return address and execute arbitrary code. Credit to Maarten Boone.
Author:acaro
Homepage:http://www.metasploit.com
File Size:1869
Related OSVDB(s):36053
Related CVE(s):CVE-2007-2711
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:a9fa6f3bee57f7cc95de2a48f7c2ba54

 ///  File Name: waraxe-2009-sugarcrm.txt
Description:
Sugar CRM versions 5.5.0.RC2 and 5.2.0j suffer from remote SQL injection, unauthorized access, remote file inclusion, and code execution vulnerabilities.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:1867
Last Modified:Nov 30 20:39:47 2009
MD5 Checksum:62d57fc4c68a29e58d623580a2ce9159

 ///  File Name: php5211-bypass.txt
Description:
PHP versions 5.2.11 and 5.3.0 suffer from a symlink() open_basedir bypass vulnerability.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com/
File Size:1856
Last Modified:Nov 16 22:08:57 2009
MD5 Checksum:d0b6b46bd874aefec81054fe7564a7b0

 ///  File Name: ibm_tsm_cad.rb.txt
Description:
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1854
Related OSVDB(s):38161
Related CVE(s):CVE-2007-4880
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:44db477430884ff6275ce3fa63f48591

 ///  File Name: novell_netmail_status.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's Netmail 3.52 IMAP STATUS verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1853
Related OSVDB(s):20956
Related CVE(s):CVE-2005-3314
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d8dbf78e23cb34c721cb3b0508144405

 ///  File Name: slimftpd_list_concat.rb.txt
Description:
This Metasploit module exploits a stack overflow in the SlimFTPd server. The flaw is triggered when a LIST command is received with an overly-long argument. This vulnerability affects all versions of SlimFTPd prior to 3.16 and was discovered by Raphael Rigo.
Author:Fairuzan Roslan
Homepage:http://www.metasploit.com
File Size:1830
Related OSVDB(s):18172
Related CVE(s):CVE-2005-2373
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:6da2313875c54279748142df3eb0ffa8

 ///  File Name: bea_weblogic_jsessionid.rb.txt
Description:
This Metasploit module exploits a 0day in the JSESSION cookie value when clustering is configured.
Author:Pusscat
Homepage:http://www.metasploit.com
File Size:1821
Related OSVDB(s):51311
Related CVE(s):CVE-2008-5457
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ec909b5a52fa949dc001b04b2ae78954

 ///  File Name: lgserver.rb.txt
Description:
This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1814
Related OSVDB(s):31593
Related CVE(s):CVE-2007-0449
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:df8461e892a3befd9ff6d9588ef5347d

 ///  File Name: hp_nnm.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1809
Related OSVDB(s):39530
Related CVE(s):CVE-2007-6204
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7119a0e0e48141c5d7351d429402d4b2