what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 448 RSS Feed

Files

CA Antivirus Engine CAB Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in CA eTrust Antivirus 8.1.637. By creating a specially crafted CAB file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-2864
SHA-256 | ce9e53a203173e1b26a0d246de3e4e1cbd8cb2617e22eab3b6e5f6f8866f4942
CA iTechnology iGateway Debug Mode Buffer Overflow
Posted Nov 26, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits a vulnerability in the Computer Associates iTechnology iGateway component. When True is enabled in igateway.conf (non-default), it is possible to overwrite the stack and execute code remotely.

tags | exploit
SHA-256 | 89d7912b65f1179a027b6b09dbe1d096244c228ce9a646375fd5feff7816a959
Cain & Abel <= v4.9.24 RDP Buffer Overflow.
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.

tags | exploit, remote, overflow
advisories | CVE-2008-5405
SHA-256 | 47967a6fce5366f37b0a5c09173209b74b0a55645903ae023725ee62e0883c49
CA CAM log_security() Stack Overflow (Win32)
Posted Nov 26, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a vulnerability in the CA CAM service by passing a long parameter to the log_security() function. The CAM service is part of TNG Unicenter. This Metasploit module has been tested on Unicenter v3.1.

tags | exploit
advisories | CVE-2005-2668
SHA-256 | 2e71c608702d8dee76a55a8cab4aa0945443a1bd14f03c3136a80c533883e398
CCProxy <= v6.2 Telnet Proxy Ping Overflow
Posted Nov 26, 2009
Authored by Patrick Webster | Site metasploit.com

This Metasploit module exploits the YoungZSoft CCProxy <= v6.2 suite Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command.

tags | exploit
advisories | CVE-2004-2416
SHA-256 | 7455e352f49dbbe4d2b5d04873599a32a9fb5fd9d939ae9a66d3af527947f5c9
Cesar FTP 0.99g MKD Command Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.

tags | exploit, overflow
advisories | CVE-2006-2961
SHA-256 | 2d6102e099fafb6459a2f1da5e44183cbd557647943a7428efe867ada870c42a
Creative Software AutoUpdate Engine ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Creative Software AutoUpdate Engine. When sending an overly long string to the cachefolder() property of CTSUEng.ocx an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-0955
SHA-256 | 6de8da7c88867f76df180a19f591f98582860ea0b989765c93448df4c2b3b18e
Destiny Media Player 1.61 PLS M3U Buffer Overflow
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist

tags | exploit, overflow
SHA-256 | 868dcc3efcdca401445588d0a42bc621b29c77a244203e78aa5f0670aaeb92dc
CA BrightStor Discovery Service TCP Overflow
Posted Nov 26, 2009
Authored by H D Moore, patrick | Site metasploit.com

This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a specific type of request is sent to the TCP listener on port 41523. This vulnerability was discovered by cybertronic@gmx.net and affects all known versions of the BrightStor product. This Metasploit module is based on the 'cabrightstor_disco' exploit by Thor Doomen.

tags | exploit, tcp
advisories | CVE-2005-2535
SHA-256 | 532219f28d50db309980d4c39dfa18dcf976499ccb5c9736a81297f410a80362
CA BrightStor Discovery Service Overflow
Posted Nov 26, 2009
Authored by H D Moore, patrick | Site metasploit.com

This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a large request is sent to UDP port 41524, triggering a stack overflow.

tags | exploit, overflow, udp
advisories | CVE-2005-0260
SHA-256 | cc02dcad9531e32e7473a4a7fa98929736e506792b9a193707c55a2b424bc463
DjVu DjVu_ActiveX_MSOffice.dll ActiveX ComponentBuffer Overflow
Posted Nov 26, 2009
Authored by dean | Site metasploit.com

This Metasploit module exploits a stack overflow in DjVu ActiveX Component. When sending an overly long string to the ImageURL() property of DjVu_ActiveX_MSOffice.dll (3.0) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2008-4922
SHA-256 | 81553625fd56a8a603a1213e5449928c6a7c73baa8e26671b9fecc422df68e12
D-Link TFTP 1.0 Long Filename Buffer Overflow
Posted Nov 26, 2009
Authored by patrick, LSO | Site metasploit.com

This Metasploit module exploits a stack overflow in D-Link TFTP 1.0. By sending a request for an overly long file name, an attacker could overflow a buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-1435
SHA-256 | bfbc05b4b87a6ce005b9bc1dcbf88ea34695a1c611595f570b33a38b8fe5c755
IBM Lotus Domino Web Server Accept-Language Stack Overflow
Posted Nov 26, 2009
Authored by riaf, Earl Marcus | Site metasploit.com

This Metasploit module exploits a stack overflow in IBM Lotus Domino Web Server prior to version 7.0.3FP1 and 8.0.1. This flaw is triggered by any HTTP request with an Accept-Language header greater than 114 bytes.

tags | exploit, web, overflow
advisories | CVE-2008-2240
SHA-256 | 83f6fb7d5ae69011a3539778a65b7fe423e17e94cf8166d8ba3f39790245f70b
IBM Lotus Domino Sametime STMux.exe Stack Overflow
Posted Nov 26, 2009
Authored by patrick, riaf | Site metasploit.com

This Metasploit module exploits a stack overflow in Lotus Domino's Sametime Server. By sending an overly long POST request to the Multiplexer STMux.exe service we are able to overwrite SEH. Based on the exploit by Manuel Santamarina Suarez.

tags | exploit, overflow
advisories | CVE-2008-2499
SHA-256 | dbb922034950b5d503d3b1d3a1d7c5b5c97e423e24541e11f69c20a9ef2b6eba
DoubleTake/HP StorageWorks Storage Mirroring Service Authentication Overflow
Posted Nov 26, 2009
Authored by ri0t | Site metasploit.com

This Metasploit module exploits a stack overflow in the authentication mechanism of NSI Doubletake which is also rebranded as HP Storage Works. This vulnerability was found by Titon of Bastard Labs.

tags | exploit, overflow
advisories | CVE-2008-1661
SHA-256 | fd419d18e7ddad1764df7c3842e788f57b8a627cc913486d6cc14272d43dfab1
Electronic Arts SnoopyCtrl ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Electronic Arts SnoopyCtrl ActiveX Control (NPSnpy.dll 1.1.0.36). When sending a overly long string to the CheckRequirements() method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-4466
SHA-256 | 9649404755c6438c63debc23c7b4cdca4c99e26b893b33866314e401c8c296fa
Easy File Sharing FTP Server 2.0 PASS Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the Easy File Sharing 2.0 service. By sending an overly long password, an attacker can execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2006-3952
SHA-256 | c77ed5da5e319fd22bf6141e86768101766cfbcee443a9aae58a9c0824a9c48b
FlipViewer FViewerLoading ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by LSO | Site metasploit.com

This Metasploit module exploits a stack overflow in E-BOOK Systems FlipViewer 4.0. The vulnerability is caused due to a boundary error in the FViewerLoading (FlipViewerX.dll) ActiveX control when handling the "LoadOpf()" method.

tags | exploit, overflow, activex
advisories | CVE-2007-2919
SHA-256 | 284d02aea916119db4ee74e022d35179fd6afb86db1fcf4582ad9f037b3a86c8
Novell eDirectory NDS Server Host Header Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Novell eDirectory 8.8.1. The web interface does not validate the length of the HTTP Host header prior to using the value of that header in an HTTP redirect.

tags | exploit, web, overflow
advisories | CVE-2006-5478
SHA-256 | 1aad03e036a78cb6b80748cae8a3a6dce768fafcd723ad98766a6e5a9da79b02
eDirectory 8.7.3 iMonitor Remote Stack Overflow
Posted Nov 26, 2009
Authored by anonymous, Matt Olney | Site metasploit.com

This Metasploit module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware.

tags | exploit, overflow
advisories | CVE-2005-2551
SHA-256 | 4e791e501a09eb7698018606ca07a32fef29347f8989cf4e0bcce74ebadb9246
EFS Easy Chat Server Authentication Request Handling Buffer Overflow
Posted Nov 26, 2009
Authored by LSO | Site metasploit.com

This Metasploit module exploits a stack overflow in EFS Software Easy Chat Server. By sending a overly long authentication request, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2004-2466
SHA-256 | b25a657300165a05fe6bb28cb77d8a093f461159615cd10f038a9d2f3bf0cbf9
eIQNetworks ESA Topology DELETEDEVICE Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the DELETEDEVICE command in the Topology server, a stacked based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.

tags | exploit, overflow
advisories | CVE-2006-3838
SHA-256 | 40c7d0b0ef0fe774728c6c830363e3909504fb26df945ca04dbed618dc111ba2
eIQNetworks ESA License Manager LICMGR_ADDLICENSE Overflow
Posted Nov 26, 2009
Authored by ri0t, MC, kf | Site metasploit.com

This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the LICMGR_ADDLICENSE command, a stack-based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.

tags | exploit, overflow
advisories | CVE-2006-3838
SHA-256 | d27891217d71ec56e0dc1758d7a3b745fe6d0c68abc89ee617e45609ec8b18c3
EMC ApplicationXtender (KeyWorks) ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the KeyWorks KeyHelp Activex Control (KeyHelp.ocx 1.2.3120.0). This Activex Control comes bundled with EMC's Documentation ApplicationXtender 5.4.

tags | exploit, overflow, activex
SHA-256 | 8f929c21e6a8d34f7df2ba7aa14820ee0ed606852cf0680d9a171ca1d6ce36fa
EnjoySAP SAP GUI ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41) provided by EnjoySAP GUI. By sending an overly long string to the "PrepareToPostHTML()" method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-3605
SHA-256 | 98fd94828cce50970069d9f68f28bdaa0e02e59e5d08bd820ec10abedb34c3d7
Page 4 of 18
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close