This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
b80f3f01d5b09ec0df01689c15ecee32ca53ffad4905d8a3f3f94aeef0db9afb
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
f3b72345c222e40c6aaf748b6c4f32d67304fddd295a20f57eef48e39ed8ec37
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
6064154184357638969d135075df6a18b1fdd12c7031a8c3a01b541a382b4d19
This Metasploit module exploits a stack overflow in the Salim Gasmi GLD versions 1.4 and below greylisting daemon for Postfix. By sending an overly long string the stack can be overwritten.
ea6d90f755fe4ab12b60f16218193025e81969e9398ec2a4ad48e9c30e700753
This Metasploit module exploits a stack-based buffer overflow in the Madwifi driver.
0754c28ffae1c6acf4d1bb93d5f0ef0b22f7d54c1e399116520b529c45ac5417
This Metasploit module exploits a buffer overflow in the 'LSUB' command of the University of Washington IMAP service. This vulnerability can only be exploited with a valid username and password.
ed074262b944617dd05f31cfbad7fdb4bc44dbc72e181c6afa6bc59ed9e6d14a
This Metasploit module exploits a stack overflow in the Back Orifice pre-processor module included with Snort versions 2.4.0, 2.4.1, 2.4.2, and 2.4.3. This vulnerability could be used to completely compromise a Snort sensor, and would typically gain an attacker full root or administrative privileges.
585cf3c1e094b61417107aeaed623a55b27056aae30c96f310965fd2fc23c460
This Metasploit module exploits a stack overflow in PeerCast versions 0.1216 and below. The vulnerability is caused due to a boundary error within the handling of URL parameters.
a97d8094e69f356b824cec0293b2687edc10f2b3b75350b8dde86a8f0530ef97
This Metasploit module exploits a stack overflow in apply.cgi on the Linksys WRT54G and WRT54GS routers. According to iDefense who discovered this vulnerability, all WRT54G versions prior to 4.20.7 and all WRT54GS version prior to 1.05.2 may be be affected.
05f730badb59943ab48414e62810156de18000b427d38198a0facb7c98a34364
This Metasploit module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre.
d2e1483aa159570fa1971db2ccf1f50ba9cfec3932e23d478dc9ec3b53de36a1
This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management server of wireless gateways running DD-WRT. This flaw allows an unauthenticated attacker to execute arbitrary commands as the root user account.
f7af9223b5eec8e1b261fdcf742cf64095bfc863450d469577f5a680d3312887
This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management interface of the Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 and earlier. The Unified Maintenance Tool contains a 'masterCGI' binary which allows an unauthenticated attacker to execute arbitrary commands by specifying shell metacharacters as the 'user' within the 'ping' action to obtain 'httpd' user access. This module only supports command line payloads, as the httpd process kills the reverse/bind shell spawn after the HTTP 200 OK response.
5f729c464589be1bd553b1af7b924cba42e213fffa0fc22238f2714175028981
Multiple Rising products suffers from a local privilege escalation vulnerability. These include, but are not limited to, Rising Antivirus 2009, Rising Internet Security 2009, and Rising Personal Firewall 2009.
39c918aba278593ad4defd575cb088df7895aa20e2c5728c83d254c558ecdea8
Rising Firewall 2009 suffers from a local privilege escalation vulnerability.
7ed1123ab5799083677729f1d7215d2caec6faad2ce9690b8b9d6cd8850e38eb
Rising Antivirus 2009 suffers from a local privilege escalation vulnerability.
d96f58d6d5475678fc528db34b67fc3f36b99bebe82c9b326cc24a0dc32d2fd4
Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to disclose system and potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges, and by malicious people to cause a DoS (Denial of Service).
cafc0ccc5c3607002f7ca5449290efaec38ab8c906d1aadb96ccdd807f3581b7
Secunia Security Advisory - Some vulnerabilities have been reported in Basic Analysis and Security Engine, which can be exploited to disclose potentially sensitive information or conduct cross-site scripting and SQL injection attacks.
358d25831458f4ee792215413dc762b98e45c2bd412b701a82efd96aeb5b1ce1
Secunia Security Advisory - A vulnerability has been reported in IBM Lotus Connections, which can be exploited by malicious people to conduct cross-site scripting attacks.
695454aa95c13b0db2c9a17e102b26134bae1f3c47e326ae7e522c8307062f7a
Secunia Security Advisory - A vulnerability has been reported in Aruba Mobility Controller, which can be exploited by malicious people to cause a DoS (Denial of Service).
60c6e06df36c3f0d6a718a6ed40f8c8cd0c5258064883906a8574378fde353ea
Secunia Security Advisory - Fedora has issued an update for jasper. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library
b475f913154b53cd89bacff840c8247453afa124436b5b87bfa57ede23691e02
Secunia Security Advisory - Fedora has issued an update for BackupPc. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.
4f7b6779eacb7933183aae42821c98c56ef40d76ff8a59a19a87e813896a162b
This is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times.
f450b169feb194e0e65157d07815ac70dd9253a75e0d229c069ff6dce045c81d
This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.
e9b94c7b39094f786cf93481c5471c76f60e78b4c1f1ebf64aff58eaed537f5d
This exploit abuses an unpublished vulnerability in the HP-UX LPD service. This flaw allows an unauthenticated attacker to execute arbitrary commands with the privileges of the root user. The LPD service is only exploitable when the address of the attacking system can be resolved by the target. This vulnerability was silently patched with the buffer overflow flaws addressed in HP Security Bulletin HPSBUX0208-213.
f9d5ef66fb19775cafad693801df558f4d03366c4666e3742e525d43fecae14b
This Metasploit module exploits a stack overflow in XTACACSD versions 4.1.2 and below. By sending a specially crafted XTACACS packet with an overly long username, an attacker may be able to execute arbitrary code.
068edc782b5026fe47e5d9c5618ccb7a64b50639d9ee2451f72c1757139fddc5