what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 209 RSS Feed

Files

Borland InterBase open_marker_file() Buffer Overflow
Posted Oct 27, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.

tags | exploit, overflow
advisories | CVE-2007-5244
SHA-256 | b80f3f01d5b09ec0df01689c15ecee32ca53ffad4905d8a3f3f94aeef0db9afb
Borland InterBase jrd8_create_database() Buffer Overflow
Posted Oct 27, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.

tags | exploit, overflow
advisories | CVE-2007-5243
SHA-256 | f3b72345c222e40c6aaf748b6c4f32d67304fddd295a20f57eef48e39ed8ec37
Borland InterBase INET_connect() Buffer Overflow
Posted Oct 27, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.

tags | exploit, overflow
advisories | CVE-2009-5243
SHA-256 | 6064154184357638969d135075df6a18b1fdd12c7031a8c3a01b541a382b4d19
GLD (Greylisting Daemon) Postfix Buffer Overflow
Posted Oct 27, 2009
Authored by patrick

This Metasploit module exploits a stack overflow in the Salim Gasmi GLD versions 1.4 and below greylisting daemon for Postfix. By sending an overly long string the stack can be overwritten.

tags | exploit, overflow
advisories | CVE-2005-1099
SHA-256 | ea6d90f755fe4ab12b60f16218193025e81969e9398ec2a4ad48e9c30e700753
Madwifi SIOCGIWSCAN Buffer Overflow
Posted Oct 27, 2009
Authored by Laurent Butti, Julien Tinnes

This Metasploit module exploits a stack-based buffer overflow in the Madwifi driver.

tags | exploit, overflow
advisories | CVE-2006-6332
SHA-256 | 0754c28ffae1c6acf4d1bb93d5f0ef0b22f7d54c1e399116520b529c45ac5417
UoW IMAP Server LSUB Buffer Overflow
Posted Oct 27, 2009
Authored by patrick

This Metasploit module exploits a buffer overflow in the 'LSUB' command of the University of Washington IMAP service. This vulnerability can only be exploited with a valid username and password.

tags | exploit, overflow, imap
advisories | CVE-2000-0284
SHA-256 | ed074262b944617dd05f31cfbad7fdb4bc44dbc72e181c6afa6bc59ed9e6d14a
Snort Back Orifice Stack Overflow
Posted Oct 27, 2009
Authored by Lau KaiJern

This Metasploit module exploits a stack overflow in the Back Orifice pre-processor module included with Snort versions 2.4.0, 2.4.1, 2.4.2, and 2.4.3. This vulnerability could be used to completely compromise a Snort sensor, and would typically gain an attacker full root or administrative privileges.

tags | exploit, overflow, root
advisories | CVE-2005-3252
SHA-256 | 585cf3c1e094b61417107aeaed623a55b27056aae30c96f310965fd2fc23c460
PeerCast 0.1216 Buffer Overflow
Posted Oct 27, 2009
Authored by MC

This Metasploit module exploits a stack overflow in PeerCast versions 0.1216 and below. The vulnerability is caused due to a boundary error within the handling of URL parameters.

tags | exploit, overflow
advisories | CVE-2006-1148
SHA-256 | a97d8094e69f356b824cec0293b2687edc10f2b3b75350b8dde86a8f0530ef97
Linksys apply.cgi Buffer Overflow
Posted Oct 27, 2009
Authored by Raphael Rigo, Julien Tinnes

This Metasploit module exploits a stack overflow in apply.cgi on the Linksys WRT54G and WRT54GS routers. According to iDefense who discovered this vulnerability, all WRT54G versions prior to 4.20.7 and all WRT54GS version prior to 1.05.2 may be be affected.

tags | exploit, overflow, cgi
advisories | CVE-2005-2799
SHA-256 | 05f730badb59943ab48414e62810156de18000b427d38198a0facb7c98a34364
Berlios GPSD Format String Vulnerability
Posted Oct 27, 2009
Authored by Yann Senotier

This Metasploit module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre.

tags | exploit
advisories | CVE-2004-1388
SHA-256 | d2e1483aa159570fa1971db2ccf1f50ba9cfec3932e23d478dc9ec3b53de36a1
DD-WRT HTTP Daemon Arbitrary Command Execution
Posted Oct 27, 2009
Authored by H D Moore, gat3way

This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management server of wireless gateways running DD-WRT. This flaw allows an unauthenticated attacker to execute arbitrary commands as the root user account.

tags | exploit, web, arbitrary, root
advisories | CVE-2009-2765
SHA-256 | f7af9223b5eec8e1b261fdcf742cf64095bfc863450d469577f5a680d3312887
Alcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution
Posted Oct 27, 2009
Authored by patrick

This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management interface of the Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 and earlier. The Unified Maintenance Tool contains a 'masterCGI' binary which allows an unauthenticated attacker to execute arbitrary commands by specifying shell metacharacters as the 'user' within the 'ping' action to obtain 'httpd' user access. This module only supports command line payloads, as the httpd process kills the reverse/bind shell spawn after the HTTP 200 OK response.

tags | exploit, web, arbitrary, shell
advisories | CVE-2007-3010
SHA-256 | 5f729c464589be1bd553b1af7b924cba42e213fffa0fc22238f2714175028981
Unreal Tournament 2004 Overflow
Posted Oct 27, 2009
Authored by onetwo

This is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times.

tags | exploit, udp, spoof
advisories | CVE-2004-0608
SHA-256 | f450b169feb194e0e65157d07815ac70dd9253a75e0d229c069ff6dce045c81d
Irix LPD tagprinter Command Execution
Posted Oct 27, 2009
Authored by H D Moore

This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.

tags | exploit, arbitrary
systems | irix
advisories | CVE-2001-0800
SHA-256 | e9b94c7b39094f786cf93481c5471c76f60e78b4c1f1ebf64aff58eaed537f5d
HP-UX LPD Command Execution
Posted Oct 27, 2009
Authored by H D Moore

This exploit abuses an unpublished vulnerability in the HP-UX LPD service. This flaw allows an unauthenticated attacker to execute arbitrary commands with the privileges of the root user. The LPD service is only exploitable when the address of the attacking system can be resolved by the target. This vulnerability was silently patched with the buffer overflow flaws addressed in HP Security Bulletin HPSBUX0208-213.

tags | exploit, overflow, arbitrary, root
systems | hpux
advisories | CVE-2002-1472
SHA-256 | f9d5ef66fb19775cafad693801df558f4d03366c4666e3742e525d43fecae14b
XTACACSD 4.1.2 Buffer Overflow
Posted Oct 27, 2009
Authored by MC

This Metasploit module exploits a stack overflow in XTACACSD versions 4.1.2 and below. By sending a specially crafted XTACACS packet with an overly long username, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-7232
SHA-256 | 068edc782b5026fe47e5d9c5618ccb7a64b50639d9ee2451f72c1757139fddc5
System V Derived /bin/login Extraneous Arguments Buffer Overflow
Posted Oct 27, 2009
Authored by I)ruid

This exploit connects to a system's modem over dialup and exploits a buffer overflow vulnerability in it's System V derived /bin/login. The vulnerability is triggered by providing a large number of arguments.

tags | exploit, overflow
advisories | CVE-2001-0797
SHA-256 | 879fb76e40bddd82af476396294fcefd3b2cf5ce2ed0dcf7a06b1239ed4be912
Mercantec Softcart CGI Overflow
Posted Oct 27, 2009
Authored by trew, skape

This is an exploit for an undisclosed buffer overflow in the SoftCart.exe CGI as shipped with Mercantec's shopping cart software. It is possible to execute arbitrary code by passing a malformed CGI parameter in an HTTP GET request. This issue is known to affect SoftCart version 4.00b.

tags | exploit, web, overflow, arbitrary, cgi
advisories | CVE-2004-2221
SHA-256 | c9dccfe5b7419f70e2a30a4c2e34c682780607f4dc1a5b5945ab9f5f4cef63b9
Adobe Acrobat Reader Array Overrun
Posted Oct 27, 2009
Authored by Felipe Andres Manzano

This is a detailed analysis regarding the U3D CLODProgressiveMeshDeclaration initialization array overrun that affects Adobe Acrobat Reader versions 7.x, 8.x, and 9.x. Exploit included.

tags | exploit, overflow
advisories | CVE-2009-2994
SHA-256 | c090417dc1342b3cda436100dd5256853c41e6b89eb64b311be1a05620d98e00
SharePoint Source Code Disclosure
Posted Oct 26, 2009
Authored by Daniel Martin

SharePoint Team Services suffers from a remote source code disclosure vulnerability in its download facility.

tags | exploit, remote
SHA-256 | 4e7055eb3038cde6c4ec6d7dddd8f7a0b00a1c88f6274975ea98f42e56ba948e
xp-AntiSpy 3.9.7-4 Local Buffer Overflow
Posted Oct 26, 2009
Authored by Dr_IDE

xp-AntiSpy versions 3.9.7-4 and below local buffer overflow exploit that creates a malicious .xpas file.

tags | exploit, overflow, local
SHA-256 | fb7c0d38c62756cc07427f4f9cc68a113bb21c52a93dcd03c74d4ea5f5190bc2
Cherokee 0.5.4 Denial Of Service
Posted Oct 26, 2009
Authored by Usman Saeed | Site xc0re.net

Cherokee web server version 0.5.4 remote denial of service exploit.

tags | exploit, remote, web, denial of service
SHA-256 | bc5ae7c21bcb8c03242d5ca9efe893b038532ab37ece8f6120f1d93318696b2b
Jetty 6.x / 7.x Information Disclosure / XSS
Posted Oct 26, 2009
Authored by Francesco Ongaro, Antonio Parata, Giovanni Pellerano | Site ush.it

Jetty versions 6.x and 7.x suffer from cross site scripting, injection, and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 5f6bdd64a6596d46cbd0a5ae2448106b4656a8543eb8f07317ef5d4b92ae82d9
RunCMS 2M1 SQL Injection
Posted Oct 26, 2009
Authored by Nine:Situations:Group::bookoo | Site retrogod.altervista.org

RunCMS version 2M1 store() remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 5ec198e21d6cd21d61f5fdc3c6a5ee8d87713cb7314e10d3097198cadcd066a8
TFTgallery 0.13 Cross Site Scripting
Posted Oct 26, 2009
Authored by Blake

TFTgallery version 0.13 is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 63c864ab65c6626cd22619a37272b2397a4e4a8dfda92c12502c770de28ed5ca
Page 4 of 9
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close