Section:  .. / 0911-exploits  /

Page 5 of 18
<< 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 >> Files 100 - 125 of 449
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: eshopbuilde-sql.txt
Description:
Eshopbuilde CMS suffers from a remote SQL injection vulnerability.
Author:Isfahan University of Technology
File Size:3127
Last Modified:Nov 30 21:08:30 2009
MD5 Checksum:d4f878caa4b12b9c3b7208512700c881

 ///  File Name: etrust_itm_alert.rb.txt
Description:
This Metasploit module exploits a buffer overflow in Computer Associates Threat Manager for the Enterprise r8.1. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need valid logon credentials to the target.
Author:MC
Homepage:http://www.metasploit.com
File Size:3381
Related OSVDB(s):44040
Related CVE(s):CVE-2007-4620
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b27496afecb4df14edd9d8874d154254

 ///  File Name: etrust_pestscan.rb.txt
Description:
This Metasploit module exploits a stack overflow in CA eTrust PestPatrol. When sending an overly long string to the Initialize() property of ppctl.dll (5.6.7.9) an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3456
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:37b72c5c0cf120c6e9da26804037739f

 ///  File Name: eudora_list.rb.txt
Description:
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0). Using the PAYLOAD of windows/shell_bind_tcp allows or the most reliable results.
Author:MC
Homepage:http://www.metasploit.com
File Size:2209
Related OSVDB(s):22097
Related CVE(s):CVE-2005-4267
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:cd94d4a87e69d2b71112e7f54c3b7f6e

 ///  File Name: eureka-overflow.txt
Description:
Eureka Mail Client remote buffer overflow exploit for XP SP3 English egghunter edition.
Author:k4mr4n
File Size:3403
Last Modified:Nov 30 20:28:53 2009
MD5 Checksum:1bb7d1e2361dad4f11d730bb9663f975

 ///  File Name: facebook_extractiptc.rb.txt
Description:
This Metasploit module exploits a stack overflow in Facebook Photo Uploader 4. By sending an overly long string to the "ExtractIptc()" property located in the ImageUploader4.ocx (4.5.57.0) Control, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:3099
Related OSVDB(s):41073
Related CVE(s):CVE-2008-5711
Last Modified:Oct 30 17:01:18 2009
MD5 Checksum:afb6e832377ff9482a38b2705422a3b6

 ///  File Name: fakehitgen-shell.txt
Description:
Fake Hit Generator suffers from a remote shell upload vulnerability.
Author:DigitALL
File Size:412
Last Modified:Nov 25 16:37:14 2009
MD5 Checksum:d836cd8178aa2a77f20e8e5765f7e237

 ///  File Name: fb_isc_attach_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3578
Related OSVDB(s):38607
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d17ecb0c8825e699cbfc4ab9d9342164

 ///  File Name: fb_isc_create_database.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:3578
Related OSVDB(s):38606
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:9b3d806b79e920c84b6bc3eb29bcf061

 ///  File Name: fb_svc_attach.rb.txt
Description:
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
Author:Adriano Lima,Ramon de Carvalho Valle
Homepage:http://www.metasploit.com
File Size:2845
Related OSVDB(s):38605
Related CVE(s):CVE-2007-5243
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:1ea324be8ea8e7ff7f474978dc9d54e0

 ///  File Name: fbsdrtld-exec.txt
Description:
FreeBSD local root exploit that leverages a bug in the Run-Time Link-Editor (rtld). Versions 7.1 and 8.0 are vulnerable.
Author:Kingcope
File Size:4469
Last Modified:Nov 30 20:35:03 2009
MD5 Checksum:cbcc98addf614846e89865ec7b0e193f

 ///  File Name: fdm_auth_header.rb.txt
Description:
This Metasploit module exploits a stack overflow in Free Download Manager Remote Control 2.5 Build 758. When sending a specially crafted Authorization header, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:1790
Related OSVDB(s):51745
Related CVE(s):CVE-2009-0183
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:ae8b323a86716cebc4868fb26772932a

 ///  File Name: fdm_torrent.rb.txt
Description:
This Metasploit module exploits a stack buffer overflow in Free Download Manager 3.0 Build 844. Arbitrary code execution could occur when parsing a specially crafted torrent file.
Author:jduck
Homepage:http://www.metasploit.com
File Size:2994
Related OSVDB(s):54033
Related CVE(s):CVE-2009-0184
Last Modified:Nov 18 09:05:38 2009
MD5 Checksum:d509053d68044083f957a08904e9f036

 ///  File Name: filecopa_list_overflow.rb.txt
Description:
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch
Author:Jacopo Cervini
Homepage:http://www.metasploit.com
File Size:1541
Related OSVDB(s):27389
Related CVE(s):CVE-2006-3726
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d1e198f77ef9317b58c77df55c5ac7fa

 ///  File Name: fp30reg_chunked.rb.txt
Description:
This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
Author:H D Moore
Homepage:http://www.metasploit.com
File Size:3275
Related OSVDB(s):2952
Related CVE(s):CVE-2003-0822
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d211f8dd86f04c39bcce6c3a6e31208a

 ///  File Name: freeftpd_key_exchange.rb.txt
Description:
This Metasploit module exploits a simple stack overflow in FreeFTPd 1.0.10. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client. This Metasploit module is based on MC's freesshd_key_exchange exploit.
Author:Fairuzan Roslan
Homepage:http://www.metasploit.com
File Size:2389
Related OSVDB(s):25569
Related CVE(s):CVE-2006-2407
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:b21befe419d2b7f922115f425bfdc2eb

 ///  File Name: freeftpd_user.rb.txt
Description:
This Metasploit module exploits a stack overflow in the freeFTPd multi-protocol file transfer service. This flaw can only be exploited when logging has been enabled (non-default).
Author:MC
Homepage:http://www.metasploit.com
File Size:2245
Related OSVDB(s):20909
Related CVE(s):CVE-2005-3683
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:4030cb4d708ab6b90e821c65021502ee

 ///  File Name: freesshd_key_exchange.rb.txt
Description:
This Metasploit module exploits a simple stack overflow in FreeSSHd 1.0.9. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client.
Author:MC
Homepage:http://www.metasploit.com
File Size:2209
Related OSVDB(s):25463
Related CVE(s):CVE-2006-2407
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:7b87db3c9cc73626c299769c54740e7d

 ///  File Name: futuresoft_transfermode.rb.txt
Description:
This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all).
Author:MC
Homepage:http://www.metasploit.com
File Size:2417
Related OSVDB(s):16954
Related CVE(s):CVE-2005-1812
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:f9f7d6925a7ab16a58f9f0f0a9a894f5

 ///  File Name: gamsoft_telsrv_username.rb.txt
Description:
This Metasploit module exploits a username sprintf stack overflow in GAMSoft TelSrv 1.5. Other versions may also be affected. The service terminates after exploitation, so you only get one chance!
Author:Patrick Webster
Homepage:http://www.metasploit.com
File Size:3348
Related OSVDB(s):373
Related CVE(s):CVE-2000-0665
Last Modified:Nov 26 14:33:09 2009
MD5 Checksum:81c0ca72a3bf52428d3463f2bd1c3c6f

 ///  File Name: globalscapeftp_input.rb.txt
Description:
This Metasploit module exploits a buffer overflow in the GlobalSCAPE Secure FTP Server. All versions prior to 3.0.3 are affected by this flaw. A valid user account ( or anonymous access) is required for this exploit to work.
Author:Fairuzan Roslan,Mati Aharoni
Homepage:http://www.metasploit.com
File Size:1961
Related OSVDB(s):16049
Related CVE(s):CVE-2005-1415
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:dc53634a1c7a57495c390bb77eec0c57

 ///  File Name: gom_openurl.rb.txt
Description:
This Metasploit module exploits a stack overflow in GOM Player 2.1.6.3499. By sending an overly long string to the "OpenUrl()" method located in the GomWeb3.dll Control, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:2465
Related OSVDB(s):38282
Related CVE(s):CVE-2007-5779
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:d865394a9848c820b009608e5c321ef8

 ///  File Name: goodtech_telnet.rb.txt
Description:
This Metasploit module exploits a stack overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
Author:MC
Homepage:http://www.metasploit.com
File Size:1917
Related OSVDB(s):14806
Related CVE(s):CVE-2005-0768
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:eea62be8b7cc6e05b4368f342e2149ee

 ///  File Name: groupwisemessenger_client.rb.txt
Description:
This Metasploit module exploits a stack overflow in Novell's GroupWise Messenger Client. By sending a specially crafted HTTP response, an attacker may be able to execute arbitrary code.
Author:MC
Homepage:http://www.metasploit.com
File Size:4427
Related OSVDB(s):46041
Related CVE(s):CVE-2008-2703
Last Modified:Nov 25 19:34:53 2009
MD5 Checksum:0da711ff86ad6eca8d8c35d3c2225df2

 ///  File Name: homeftpserver-dos.txt
Description:
Home FTP Server suffers from a remote denial of service vulnerability.
Author:zhangmc
File Size:2070
Last Modified:Nov 18 10:30:18 2009
MD5 Checksum:9e677e8d73659c8ca43a11b52f8b44eb