what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 218 RSS Feed

Files from MC

First Active2009-10-27
Last Active2016-02-03
Hummingbird Connectivity 10 SP5 LPD Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.

tags | exploit, overflow
advisories | CVE-2005-1815
SHA-256 | defa7313336e83b65e87c5e8f0502489a614709ada6f27a33e38b1f851bc4167
IBM Tivoli Storage Manager Express CAD Service Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-4880
SHA-256 | aa4c80c5e7fe58a924c7a1e241d145c06f6536a8898c31288bed7b74f5dc8b23
IBM Access Support ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in IBM Access Support. When sending an overly long string to the GetXMLValue() method of IbmEgath.dll (3.20.284.0) an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2009-0215
SHA-256 | ae89bc47ce4a110b625d4804e0b474e1977905e651b187e5f6987d00e50e120f
Ipswitch IMail IMAP SEARCH Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Ipswitch IMail Server 2006.1 IMAP SEARCH verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. In order for this module to be successful, the IMAP user must have at least one message.

tags | exploit, overflow, imap
advisories | CVE-2007-3925
SHA-256 | 0757ecb74978f93cacdc4418ef7c38cab531545bd9b32a8f39f8239a920240bf
Ipswitch WhatsUp Gold 8.03 Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a buffer overflow in IPswitch WhatsUp Gold 8.03. By posting a long string for the value of 'instancename' in the _maincfgret.cgi script an attacker can overflow a buffer and execute arbitrary code on the system.

tags | exploit, overflow, arbitrary, cgi
advisories | CVE-2004-0798
SHA-256 | 62eb863206132195a6a057fb1d894ec0ce16b0816953299778e3c89dca60d6d1
Kazaa Altnet Download Manager ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the Altnet Download Manager ActiveX Control (amd4.dll) bundled with Kazaa Media Desktop 3.2.7. By sending a overly long string to the "Install()" method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-5217
SHA-256 | 5d1758e4f31cc274877c0af7ccfe4530b03057a15b64b22f74060f5ae4a1291e
Kerio Firewall 2.1.4 Authentication Packet Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Kerio Personal Firewall administration authentication process. This Metasploit module has only been tested against Kerio Personal Firewall 2 (2.1.4).

tags | exploit, overflow
advisories | CVE-2003-0220
SHA-256 | edc1d978131e3581f43ad5e622fc1cab8073e286badc41b326604e4b3171fa04
LANDesk Management Suite 8.7 Alert Service Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in LANDesk Management Suite 8.7. By sending an overly long string to the Alert Service, a buffer is overwritten and arbitrary code can be executed.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-1674
SHA-256 | 712f990a9059b1a0f0767c92cadba2f532dad000c6b43637db954fb565ef2f99
CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-5003
SHA-256 | 89dcdea6ef96bdeef448d96e7edf4c62c82b7760d1e36f0672ecbef437a5a680
CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request (rxsUseLicenseIni), an attacker could overflow the buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-3216
SHA-256 | 04d3e370cc91737108c6e8d608ebb3fcf78bcf946260e33678031f2bc2131d3d
CA BrightStor ARCserve for Laptops & Desktops LGServer Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup for Laptops & Desktops 11.1. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-0449
SHA-256 | 486a807e0edd6cfc7d817fc0b03a32b214d7c2d2f90cbffcbcf4d44c6e14eb11
CA BrightStor ARCserve License Service GCR NETWORK Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Computer Associates BrightStor ARCserve Backup 11.0. By sending a specially crafted request to the lic98rmtd.exe service, an attacker could overflow the buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2005-0581
SHA-256 | f898147c81fee57073362e43dcc4cf5fc962db6fc16bd1958616572dabebacf6
Logitech VideoCall ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the Logitech VideoCall ActiveX Control (wcamxmp.dll 2.0.3470.448). By sending a overly long string to the "Start()" method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-2918
SHA-256 | 0c7b04e1f849ddc4850c9536ff8dd998900875f3fa62c18765a1cd7361e9fabc
iseemedia / Roxio / MGI Software LPViewer ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in LPViewer ActiveX control (LPControll.dll 3.2.0.2). When sending an overly long string to the URL() property an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2008-4384
SHA-256 | 8b73bbe7717a92850dc76ef0bd0d73c8f530e698a6786eb3f40fa58199fc8aec
Macrovision InstallShield Update Service Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Macrovision InstallShield Update Service(Isusweb.dll 6.0.100.54472). By passing an overly long ProductCode string to the DownloadAndExecute method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-5660
SHA-256 | 8fd766a299855ccac71b4bf2d08520f11d24d38e7c51849c1037d889c15caf21
Macrovision InstallShield Update Service ActiveX Unsafe Method
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module allows attackers to execute code via an unsafe methods in Macrovision InstallShield 2008.

tags | exploit
advisories | CVE-2007-5660
SHA-256 | 4e580a205fec77ecdd48e346ed17a1dde6d1df5f7df8a18eff7102a08400ad01
MailEnable IMAPD (2.35) Login Request Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

MailEnable's IMAP server contains a buffer overflow vulnerability in the Login command.

tags | exploit, overflow, imap
advisories | CVE-2006-6423
SHA-256 | a4eceb36c2639afe9fd1c656c7174c4475cb9596985d2e61b7f06f2ea8f79eea
MailEnable IMAPD (1.54) STATUS Request Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

MailEnable's IMAP server contains a buffer overflow vulnerability in the STATUS command. With proper credentials, this could allow for the execution of arbitrary code.

tags | exploit, overflow, arbitrary, imap
advisories | CVE-2005-2278
SHA-256 | cf73368ca1456ebf0d123b52f99898904ccc211d943abcf2dbfe856cbeb1c9a1
MailEnable IMAPD W3C Logging Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a buffer overflow in the W3C logging functionality of the MailEnable IMAPD service. Logging is not enabled by default and this exploit requires a valid username and password to exploit the flaw. MailEnable Professional version 1.6 and prior and MailEnable Enterprise version 1.1 and prior are affected.

tags | exploit, overflow
advisories | CVE-2005-3155
SHA-256 | f9093da8a1312faacc61443924f7b363bb3f16f4dc7ce7d41e8c1a2f0e1338ae
McAfee Remediation Client ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in McAfee Remediation Agent 4.5.0.41. When sending an overly long string to the DeleteSnapshot() method of enginecom.dll (3.7.0.9) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.

tags | exploit, overflow, arbitrary
SHA-256 | 9abe850f29cf5b51dbe8ec828435c9333767d20de08835bb1df724f8f0fb5d57
McAfee Visual Trace ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the McAfee Visual Trace 3.25 ActiveX Control (NeoTraceExplorer.dll 1.0.0.1). By sending a overly long string to the "TraceTarget()" method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2006-6707
SHA-256 | 1af505d58b6ecf4e14a93c0e01d4ebb141dd799f1e203a25a95e8968f3b52aed
Mercur Messaging 2005 IMAP Login Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Atrium Mercur IMAP 5.0 SP3. Since the room for shellcode is small, using the reverse ordinal payloads yields the best results.

tags | exploit, overflow, imap, shellcode
advisories | CVE-2006-1255
SHA-256 | bcc9986727d1a31fd19c6ec9efeca29335e3bac2e984bdb32e707abede16b9c6
Mercury Mail SMTP AUTH CRAM-MD5 Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Mercury Mail Transport System 4.51. By sending a specially crafted argument to the AUTH CRAM-MD5 command, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-4440
SHA-256 | b37bc5cd6705c8e20790a12b9fc47ac4078f2b49f9d0875bc28a3d33e2238c40
Mercury/32 <= 4.01b LOGIN Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Mercury/32 <= 4.01b IMAPD LOGIN verb. By sending a specially crafted login command, a buffer is corrupted, and code execution is possible. This vulnerability was discovered by (mu-b at digit-labs.org).

tags | exploit, overflow, code execution
advisories | CVE-2007-1373
SHA-256 | a60c2ea6e800b4665a534a6fa0d25415bdd4db2986f35c241060c6a2a5fd36f1
Mercury/32 <= v4.01b PH Server Module Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Mercury/32 <= v4.01b PH Server Module. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed size memory buffer.

tags | exploit, overflow
advisories | CVE-2005-4411
SHA-256 | e589673cea231d56221ebf93f38777c3c571ba6187848d18fb71e7da338a55b1
Page 5 of 9
Back34567Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close