Section:  .. / 0911-exploits  /

Page 6 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 125 - 150 of 449
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: ms06_067_keyframe.rb.txt
Description:
This Metasploit module exploits a heap overflow vulnerability in the KeyFrame method of the direct animation ActiveX control. This is a port of the exploit implemented by Alexander Sotirov.
Author:Alexander Sotirov,skape
Homepage:http://www.metasploit.com
File Size:3533
Related OSVDB(s):28842
Related CVE(s):CVE-2006-4777
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f311c947bb718b5b83a20f17370dd051

 ///  File Name: softartisans_getdrivename.rb.txt
Description:
This Metasploit module exploits a stack overflow in SoftArtisans XFile FileManager ActiveX control (SAFmgPwd.dll 2.0.5.3). When sending an overly long string to the GetDriveName() method an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3523
Related OSVDB(s):47794
Related CVE(s):CVE-2007-1682
Last Modified:Oct 30 17:01:29 2009
MD5 Checksum:931e920ee423b3ac8d2458c849da3eef

 ///  File Name: mdaemon_worldclient_form2raw.rb.txt
Description:
This Metasploit module exploits a stack overflow in Alt-N MDaemon SMTP server for versions 6.8.5 and earlier. When WorldClient HTTP server is installed (default), a CGI script is provided to accept html FORM based emails and deliver via MDaemon.exe, by writing the CGI output to the Raw Queue. When X-FromCheck is enabled (also default), the temporary form2raw.cgi data is copied by MDaemon.exe and a stack based overflow occurs when an excessively long From field is specified. The RawQueue is processed every 1 minute by default, to a maximum of 60 minutes. Keep this in mind when choosing payloads or setting WfsDelay... You'll need to wait. Furthermore, this exploit uses a direct memory jump into a nopsled (which isn't very reliable). Once the payload is written into the Raw Queue by Form2Raw, MDaemon will continue to crash/execute the payload until the CGI output is manually deleted from the queue in C:\\MDaemon\\RawFiles\\*.raw.
Author:patrick
Homepage:http://www.metasploit.com
File Size:3520
Related OSVDB(s):3255
Related CVE(s):CVE-2003-1200
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:c2530c0269bdafb7df3d701fa01955bf

 ///  File Name: ms06_066_nwwks.rb.txt
Description:
This Metasploit module exploits a stack overflow in the svchost service, when the netware client service is running.
Author:Pusscat
Homepage:http://www.metasploit.com
File Size:3519
Related OSVDB(s):30260
Related CVE(s):CVE-2006-4688
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:845947a57fc90dc8289d163427c11077

 ///  File Name: roxio_cineplayer.rb.txt
Description:
This Metasploit module exploits a stack-based buffer overflow in SonicPlayer ActiveX control (SonicMediaPlayer.dll) 3.0.0.1 installed by Roxio CinePlayer 3.2. By setting an overly long value to 'DiskType', an attacker can overrun a buffer and execute arbitrary code.
Author:Trancer
Homepage:http://www.metasploit.com
File Size:3510
Related OSVDB(s):34779
Related CVE(s):CVE-2007-1559
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d702dd32e39d1ef28a59dd49e3fb415b

 ///  File Name: creative_software_cachefolder.rb.tx..>
Description:
This Metasploit module exploits a stack overflow in Creative Software AutoUpdate Engine. When sending an overly long string to the cachefolder() property of CTSUEng.ocx an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3509
Related OSVDB(s):45655
Related CVE(s):CVE-2008-0955
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:10d75b9d3dc9e4dcd59f10bb71395070

 ///  File Name: lpviewer_url.rb.txt
Description:
This Metasploit module exploits a stack overflow in LPViewer ActiveX control (LPControll.dll 3.2.0.2). When sending an overly long string to the URL() property an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3485
Related OSVDB(s):48946
Related CVE(s):CVE-2008-4384
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:efcffbe4b20269596e2d4ce175089440

 ///  File Name: kazaa_altnet_heap.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Altnet Download Manager ActiveX Control (amd4.dll) bundled with Kazaa Media Desktop 3.2.7. By sending a overly long string to the "Install()" method, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3468
Related OSVDB(s):37785
Related CVE(s):CVE-2007-5217
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:85fca6b31f7d348ba05fccedcbd1280a

 ///  File Name: etrust_pestscan.rb.txt
Description:
This Metasploit module exploits a stack overflow in CA eTrust PestPatrol. When sending an overly long string to the Initialize() property of ppctl.dll (5.6.7.9) an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3456
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:37b72c5c0cf120c6e9da26804037739f

 ///  File Name: owc_spreadsheet_msdso.rb.txt
Description:
This Metasploit module exploits a memory corruption vulnerability within the Office Web Component Spreadsheet ActiveX control. This module was based on an exploit found in the wild.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3440
Related OSVDB(s):55806
Related CVE(s):CVE-2009-1136
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:bee50eb7ea8616846ffa5017d862a768

 ///  File Name: sascam_get.rb.txt
Description:
The SasCam Webcam Server ActiveX control is vulnerable to a buffer overflow. By passing an overly long argument via the Get method, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the user. This control is not marked safe for scripting, please choose your attack vector carefully.
Author:dean
Homepage:http://www.metasploit.com
File Size:3429
Related OSVDB(s):55945
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:520a186c72bdfda7485ac2d0b0ec7c01

 ///  File Name: ms08_053_mediaencoder.rb.txt
Description:
This Metasploit module exploits a stack overflow in Windows Media Encoder 9. When sending an overly long string to the GetDetailsString() method of wmex.dll an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3425
Related OSVDB(s):47962
Related CVE(s):CVE-2008-3008
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:30680e4a59504024930bee6edd40ccc7

 ///  File Name: leapftp_pasv_reply.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the LeapWare LeapFTP v2.7.3.600 client that is triggered through an excessively long PASV reply command. This Metasploit module was ported from the original exploit by drG4njubas with minor improvements.
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:3413
Related OSVDB(s):4587
Related CVE(s):CVE-2003-0558
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:495b1f160949d056f8a3de5e69dff903

 ///  File Name: djvu_imageurl.rb.txt
Description:
This Metasploit module exploits a stack overflow in DjVu ActiveX Component. When sending an overly long string to the ImageURL() property of DjVu_ActiveX_MSOffice.dll (3.0) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
Author:dean
Homepage:http://www.metasploit.com
File Size:3405
Related OSVDB(s):49592
Related CVE(s):CVE-2008-4922
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7d0edadf006976a6400b472c88bc355e

 ///  File Name: eureka-overflow.txt
Description:
Eureka Mail Client remote buffer overflow exploit for XP SP3 English egghunter edition.
Author:k4mr4n
File Size:3403
Last Modified:Nov 30 20:28:53 2009
MD5 Checksum:1bb7d1e2361dad4f11d730bb9663f975

 ///  File Name: ms06_057_webview_setslice.rb.txt
Description:
This Metasploit module exploits a flaw in the WebViewFolderIcon ActiveX control included with Windows 2000, Windows XP, and Windows 2003. This flaw was published during the Month of Browser Bugs project (MoBB #18).
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3386
Related OSVDB(s):27110
Related CVE(s):CVE-2006-3730
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:6fe379a656f13db355bff8418fdf7e3c

 ///  File Name: etrust_itm_alert.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Computer Associates Threat Manager for the Enterprise r8.1. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need valid logon credentials to the target.
Author:MC
Homepage:http://www.metasploit.com
File Size:3381
Related OSVDB(s):44040
Related CVE(s):CVE-2007-4620
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b27496afecb4df14edd9d8874d154254

 ///  File Name: savant_31_overflow.rb.txt
Description:
This Metasploit module exploits a stack overflow in Savant 3.1 Web Server. The service supports a maximum of 10 threads (for a default install). Each exploit attempt generally causes a thread to die whether successful or not. Therefore you only have 10 chances (unless non-default).
Author:patrick
Homepage:http://www.metasploit.com
File Size:3351
Related OSVDB(s):9829
Related CVE(s):CVE-2002-1120
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:14110dcd7eb8eac8e82254d45c0f87fe

 ///  File Name: ca_brightstor_addcolumn.rb.txt
Description:
The CA BrightStor ARCserve Backup ActiveX control (ListCtrl.ocx) is vulnerable to a stack-based buffer overflow. By passing an overly long argument to the AddColumn() method, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Author:dean
Homepage:http://www.metasploit.com
File Size:3348
Related OSVDB(s):43214
Related CVE(s):CVE-2008-1472
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f32567a5b886b9294455755b1bfa7d96

 ///  File Name: gamsoft_telsrv_username.rb.txt
Description:
This Metasploit module exploits a username sprintf stack overflow in GAMSoft TelSrv 1.5. Other versions may also be affected. The service terminates after exploitation, so you only get one chance!
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:3348
Related OSVDB(s):373
Related CVE(s):CVE-2000-0665
Last Modified:Nov 26 14:33:09 2009
MD5 Checksum:81c0ca72a3bf52428d3463f2bd1c3c6f

 ///  File Name: win7-crash.txt
Description:
Proof of concept exploit that demonstrates a remote kernel crash vulnerability in Windows 7.
Author:laurent gaffie
File Size:3294
Last Modified:Nov 16 21:29:18 2009
MD5 Checksum:32c8d4453a50cfdce6475335332288c6

 ///  File Name: sql_agent.rb.txt
Description:
This Metasploit module exploits a vulnerability in the CA BrightStor Agent for Microsoft SQL Server. This vulnerability was discovered by cybertronic[at]gmx.net.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3285
Related OSVDB(s):18501
Related CVE(s):CVE-2005-1272
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:93b1fd3d0e47bc8ce60517ff98dfb31b

 ///  File Name: symantec_altirisdeployment_download..>
Description:
This Metasploit module allows remote attackers to install and execute arbitrary files on a users file system via AeXNSPkgDLLib.dll (6.0.0.1418). This Metasploit module was tested against Symantec Altiris Deployment Solution 6.9 sp3.
Author:MC
Homepage:http://www.metasploit.com
File Size:3282
Related OSVDB(s):57893
Related CVE(s):CVE-2009-3028
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:63b30a7f342329aab1989ff8497d1825

 ///  File Name: fp30reg_chunked.rb.txt
Description:
This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3275
Related OSVDB(s):2952
Related CVE(s):CVE-2003-0822
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d211f8dd86f04c39bcce6c3a6e31208a

 ///  File Name: quickcartcms-xsrf.txt
Description:
Quick.Cart version 3.4 and Quick.CMS version 2.4 both suffer from cross site request forgery vulnerabilities.
Author:Alice Kaerast
File Size:3257
Last Modified:Nov 24 15:56:09 2009
MD5 Checksum:f83c72ffa710cd95ec06f6a4e31bcc3d