Section:  .. / 0911-exploits  /

Page 16 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 375 - 400 of 449
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: hp_nnm_toolbar.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1806
Related OSVDB(s):53222
Related CVE(s):CVE-2008-0067
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:eebc7a8eae79fdcba76863cb51497d09

 ///  File Name: wsftp_server_505_xmd5.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the XMD5 verb in IPSWITCH WS_FTP Server 5.05.
Author:MC
Homepage:http://www.metasploit.com
File Size:1806
Related OSVDB(s):28939
Related CVE(s):CVE-2006-4847
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ac8ba4d739caa328fa997973974577d5

 ///  File Name: tftpdwin_long_filename.rb.txt
Description:
This Metasploit module exploits the ProSysInfo TFTPDWIN threaded TFTP Server. By sending an overly long file name to the tftpd.exe server, the stack can be overwritten.
Author:patrick
Homepage:http://www.metasploit.com
File Size:1801
Related OSVDB(s):29032
Related CVE(s):CVE-2006-4948
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dbd10dea1c951434abcfe51169d898fe

 ///  File Name: sasser_ftpd_port.rb.txt
Description:
This Metasploit module exploits the FTP server component of the Sasser worm. By sending an overly long PORT command the stack can be overwritten.
Author:Val Smith,chamuco,patrick
Homepage:http://www.metasploit.com
File Size:1797
Related OSVDB(s):6197
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d43c04ad521b75f49917fecff05e6333

 ///  File Name: fdm_auth_header.rb.txt
Description:
This Metasploit module exploits a stack overflow in Free Download Manager Remote Control 2.5 Build 758. When sending a specially crafted Authorization header, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1790
Related OSVDB(s):51745
Related CVE(s):CVE-2009-0183
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ae8b323a86716cebc4868fb26772932a

 ///  File Name: hummingbird_exceed.rb.txt
Description:
This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.
Author:MC
Homepage:http://www.metasploit.com
File Size:1786
Related OSVDB(s):16957
Related CVE(s):CVE-2005-1815
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9f94cfb1c4e895dea6a1ae77a129d77d

 ///  File Name: mercury_rename.rb.txt
Description:
This Metasploit module exploits a stack overflow vulnerability in the Mercury/32 v.4.01a IMAP service.
Author:MC
Homepage:http://www.metasploit.com
File Size:1782
Related OSVDB(s):12508
Related CVE(s):CVE-2004-1211
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:27411691d56dde9d1fcd280a203598ce

 ///  File Name: saplpd.rb.txt
Description:
This Metasploit module exploits a stack overflow in SAPlpd 6.28 (SAP Release 6.40). By sending an overly long argument, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1778
Related OSVDB(s):41127
Related CVE(s):CVE-2008-0621
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:68b773c28b5671d16f23589113be97d7

 ///  File Name: hp_ovtrace.rb.txt
Description:
This Metasploit module exploits a stack overflow in HP OpenView Operations version A.07.50. By sending a specially crafted packet, a remote attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1772
Related OSVDB(s):39527
Related CVE(s):CVE-2007-3872
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b12357fef68f74c168e826e0025b51ab

 ///  File Name: proftp_banner.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the ProFTP 2.9 client that is triggered through an excessively long welcome message.
Author:His0k4
Homepage:http://www.metasploit.com
File Size:1756
Related OSVDB(s):57394
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:13e3daf2400ee66187ef628a2253ea83

 ///  File Name: kaspersky2010-dos.txt
Description:
Kaspersky Anti-Virus 2010 version 9.0.0.463 suffers from a denial of service vulnerability.
Author:Heurs
File Size:1750
Last Modified:Nov 18 11:04:11 2009
MD5 Checksum:1203aa877261b2f38f0567349b90c982

 ///  File Name: mssql_payload.rb.txt
Description:
This Metasploit module will execute an arbitrary payload on a Microsoft SQL Server, using the Windows debug.com method for writing an executable to disk and the xp_cmdshell stored procedure. File size restrictions are avoided by incorporating the debug bypass method presented at Defcon 17 by SecureState. Note that this module will leave a metasploit payload in the Windows System32 directory which must be manually deleted once the attack is completed.
Author:David Kennedy "ReL1K"
Homepage:http://www.metasploit.com
File Size:1749
Related OSVDB(s):557
Related CVE(s):CVE-2000-0402
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9fcdfb3e45947625be60d062c78ae1af

 ///  File Name: ithinkthereforeiexist.pl.txt
Description:
Safari version 4.0.3 (Win32) XSS remote denial of service exploit.
Author:Jeremy Brown
Homepage:http://jbrownsec.blogspot.com/
File Size:1747
Last Modified:Nov 16 20:23:46 2009
MD5 Checksum:589d2ef45a56e84e505052dc55706d87

 ///  File Name: threectftpsvc_long_mode.rb.txt
Description:
This Metasploit module exploits a stack overflow in 3CTftpSvc 2.0.1. By sending a specially crafted packet with an overly long mode field, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Author:MC
Homepage:http://www.metasploit.com
File Size:1736
Related OSVDB(s):30758
Related CVE(s):CVE-2006-6183
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:6e711054a02551ae838f2ae6f4801fad

 ///  File Name: wmailserver.rb.txt
Description:
This Metasploit module exploits a stack overflow in SoftiaCom WMailserver 1.0 (SMTP) via a SEH frame overwrite.
Author:MC
Homepage:http://www.metasploit.com
File Size:1727
Related OSVDB(s):17883
Related CVE(s):CVE-2005-2287
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1c0ce3119d7cd9177bb7b44143d8e42c

 ///  File Name: wftpd_size.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the SIZE verb in Texas Imperial's Software WFTPD 3.23.
Author:MC
Homepage:http://www.metasploit.com
File Size:1710
Related OSVDB(s):28134
Related CVE(s):CVE-2006-4318
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:98c09235cd743056b3ab519af113872b

 ///  File Name: homeftpserver-traversal.txt
Description:
Home FTP Server version 1.10.1.139 suffers from a remote directory traversal vulnerability.
Author:zhangmc
File Size:1697
Last Modified:Nov 18 10:58:25 2009
MD5 Checksum:e6e598ba6e356872520260188444e14e

 ///  File Name: nukehall-rfi.txt
Description:
NukeHall versions 0.3 and below suffer from multiple remote file inclusion vulnerabilities.
Author:cr4wl3r
File Size:1654
Last Modified:Nov 23 18:30:54 2009
MD5 Checksum:f8e2d905ca0abedeea44b78b85a54f66

 ///  File Name: quick_tftp_pro_mode.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Quick TFTP Pro server product. MS Update KB926436 screws up the opcode address being used in oledlg.dll resulting in a DoS. This is a port of a sploit by Mati "muts" Aharoni.
Author:Saint Patrick
Homepage:http://www.metasploit.com
File Size:1648
Related OSVDB(s):43784
Related CVE(s):CVE-2008-1610
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c50b8633f0106eb5634c1b9b610522d0

 ///  File Name: sweetrice-rfilfi.txt
Description:
SweetRice versions 0.5.3 and below suffer from remote and local file inclusion vulnerabilities.
Author:cr4wl3r
File Size:1646
Last Modified:Nov 30 16:49:55 2009
MD5 Checksum:b46cf962896f315d87bf1a6dec158bb7

 ///  File Name: niprint.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Network Instrument NIPrint LPD service.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1624
Related OSVDB(s):2774
Related CVE(s):CVE-2003-1141
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0cf00e0f2ca676c7020effb4d0d516bc

 ///  File Name: nmap_stor.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's Netmail 3.52 NMAP STOR verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1621
Related OSVDB(s):31363
Related CVE(s):CVE-2006-6424
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:929d5bb49a88a714b4a34820d2e39e38

 ///  File Name: ia_webmail.rb.txt
Description:
This exploits a stack overflow in the IA WebMail server. This exploit has not been tested against a live system at this time.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:1585
Related OSVDB(s):2757
Related CVE(s):CVE-2003-1192
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b36b10d2eea9582419f82240c737857b

 ///  File Name: filecopa_list_overflow.rb.txt
Description:
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch
Author:Jacopo Cervini
Homepage:http://www.metasploit.com
File Size:1541
Related OSVDB(s):27389
Related CVE(s):CVE-2006-3726
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d1e198f77ef9317b58c77df55c5ac7fa

 ///  File Name: tbirdseamonkey-dos.txt
Description:
Mozilla Thunderbird version 2.0.0.23 and Seamonkey version 2.0 suffer from a null pointer dereference denial of service vulnerability.
Author:Marcin Ressel
File Size:1493
Last Modified:Nov 18 07:59:28 2009
MD5 Checksum:e66ea86dad2389ad129dbfa749a0dc9b