exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 68 RSS Feed

Files Date: 2009-10-27 to 2009-10-28

Borland InterBase open_marker_file() Buffer Overflow
Posted Oct 27, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.

tags | exploit, overflow
advisories | CVE-2007-5244
SHA-256 | b80f3f01d5b09ec0df01689c15ecee32ca53ffad4905d8a3f3f94aeef0db9afb
Borland InterBase jrd8_create_database() Buffer Overflow
Posted Oct 27, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.

tags | exploit, overflow
advisories | CVE-2007-5243
SHA-256 | f3b72345c222e40c6aaf748b6c4f32d67304fddd295a20f57eef48e39ed8ec37
Borland InterBase INET_connect() Buffer Overflow
Posted Oct 27, 2009
Authored by Adriano Lima | Site risesecurity.org

This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.

tags | exploit, overflow
advisories | CVE-2009-5243
SHA-256 | 6064154184357638969d135075df6a18b1fdd12c7031a8c3a01b541a382b4d19
GLD (Greylisting Daemon) Postfix Buffer Overflow
Posted Oct 27, 2009
Authored by patrick

This Metasploit module exploits a stack overflow in the Salim Gasmi GLD versions 1.4 and below greylisting daemon for Postfix. By sending an overly long string the stack can be overwritten.

tags | exploit, overflow
advisories | CVE-2005-1099
SHA-256 | ea6d90f755fe4ab12b60f16218193025e81969e9398ec2a4ad48e9c30e700753
Madwifi SIOCGIWSCAN Buffer Overflow
Posted Oct 27, 2009
Authored by Laurent Butti, Julien Tinnes

This Metasploit module exploits a stack-based buffer overflow in the Madwifi driver.

tags | exploit, overflow
advisories | CVE-2006-6332
SHA-256 | 0754c28ffae1c6acf4d1bb93d5f0ef0b22f7d54c1e399116520b529c45ac5417
UoW IMAP Server LSUB Buffer Overflow
Posted Oct 27, 2009
Authored by patrick

This Metasploit module exploits a buffer overflow in the 'LSUB' command of the University of Washington IMAP service. This vulnerability can only be exploited with a valid username and password.

tags | exploit, overflow, imap
advisories | CVE-2000-0284
SHA-256 | ed074262b944617dd05f31cfbad7fdb4bc44dbc72e181c6afa6bc59ed9e6d14a
Snort Back Orifice Stack Overflow
Posted Oct 27, 2009
Authored by Lau KaiJern

This Metasploit module exploits a stack overflow in the Back Orifice pre-processor module included with Snort versions 2.4.0, 2.4.1, 2.4.2, and 2.4.3. This vulnerability could be used to completely compromise a Snort sensor, and would typically gain an attacker full root or administrative privileges.

tags | exploit, overflow, root
advisories | CVE-2005-3252
SHA-256 | 585cf3c1e094b61417107aeaed623a55b27056aae30c96f310965fd2fc23c460
PeerCast 0.1216 Buffer Overflow
Posted Oct 27, 2009
Authored by MC

This Metasploit module exploits a stack overflow in PeerCast versions 0.1216 and below. The vulnerability is caused due to a boundary error within the handling of URL parameters.

tags | exploit, overflow
advisories | CVE-2006-1148
SHA-256 | a97d8094e69f356b824cec0293b2687edc10f2b3b75350b8dde86a8f0530ef97
Linksys apply.cgi Buffer Overflow
Posted Oct 27, 2009
Authored by Raphael Rigo, Julien Tinnes

This Metasploit module exploits a stack overflow in apply.cgi on the Linksys WRT54G and WRT54GS routers. According to iDefense who discovered this vulnerability, all WRT54G versions prior to 4.20.7 and all WRT54GS version prior to 1.05.2 may be be affected.

tags | exploit, overflow, cgi
advisories | CVE-2005-2799
SHA-256 | 05f730badb59943ab48414e62810156de18000b427d38198a0facb7c98a34364
Berlios GPSD Format String Vulnerability
Posted Oct 27, 2009
Authored by Yann Senotier

This Metasploit module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre.

tags | exploit
advisories | CVE-2004-1388
SHA-256 | d2e1483aa159570fa1971db2ccf1f50ba9cfec3932e23d478dc9ec3b53de36a1
DD-WRT HTTP Daemon Arbitrary Command Execution
Posted Oct 27, 2009
Authored by H D Moore, gat3way

This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management server of wireless gateways running DD-WRT. This flaw allows an unauthenticated attacker to execute arbitrary commands as the root user account.

tags | exploit, web, arbitrary, root
advisories | CVE-2009-2765
SHA-256 | f7af9223b5eec8e1b261fdcf742cf64095bfc863450d469577f5a680d3312887
Alcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution
Posted Oct 27, 2009
Authored by patrick

This Metasploit module abuses a metacharacter injection vulnerability in the HTTP management interface of the Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 and earlier. The Unified Maintenance Tool contains a 'masterCGI' binary which allows an unauthenticated attacker to execute arbitrary commands by specifying shell metacharacters as the 'user' within the 'ping' action to obtain 'httpd' user access. This module only supports command line payloads, as the httpd process kills the reverse/bind shell spawn after the HTTP 200 OK response.

tags | exploit, web, arbitrary, shell
advisories | CVE-2007-3010
SHA-256 | 5f729c464589be1bd553b1af7b924cba42e213fffa0fc22238f2714175028981
Rising Products Local Privilege Escalation
Posted Oct 27, 2009
Authored by ShineShadow

Multiple Rising products suffers from a local privilege escalation vulnerability. These include, but are not limited to, Rising Antivirus 2009, Rising Internet Security 2009, and Rising Personal Firewall 2009.

tags | advisory, local
SHA-256 | 39c918aba278593ad4defd575cb088df7895aa20e2c5728c83d254c558ecdea8
Rising Firewall 2009 Privilege Escalation
Posted Oct 27, 2009
Authored by Francis Provencher

Rising Firewall 2009 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | 7ed1123ab5799083677729f1d7215d2caec6faad2ce9690b8b9d6cd8850e38eb
Rising Antivirus 2009 Privilege Escalation
Posted Oct 27, 2009
Authored by Francis Provencher

Rising Antivirus 2009 suffers from a local privilege escalation vulnerability.

tags | advisory, local
SHA-256 | d96f58d6d5475678fc528db34b67fc3f36b99bebe82c9b326cc24a0dc32d2fd4
Secunia Security Advisory 37163
Posted Oct 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to disclose system and potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges, and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, fedora
SHA-256 | cafc0ccc5c3607002f7ca5449290efaec38ab8c906d1aadb96ccdd807f3581b7
Secunia Security Advisory 37147
Posted Oct 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Basic Analysis and Security Engine, which can be exploited to disclose potentially sensitive information or conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 358d25831458f4ee792215413dc762b98e45c2bd412b701a82efd96aeb5b1ce1
Secunia Security Advisory 37106
Posted Oct 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Lotus Connections, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 695454aa95c13b0db2c9a17e102b26134bae1f3c47e326ae7e522c8307062f7a
Secunia Security Advisory 37085
Posted Oct 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Aruba Mobility Controller, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 60c6e06df36c3f0d6a718a6ed40f8c8cd0c5258064883906a8574378fde353ea
Secunia Security Advisory 37164
Posted Oct 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for jasper. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | b475f913154b53cd89bacff840c8247453afa124436b5b87bfa57ede23691e02
Secunia Security Advisory 37161
Posted Oct 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for BackupPc. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 4f7b6779eacb7933183aae42821c98c56ef40d76ff8a59a19a87e813896a162b
Unreal Tournament 2004 Overflow
Posted Oct 27, 2009
Authored by onetwo

This is an exploit for the GameSpy secure query in the Unreal Engine. This exploit only requires one UDP packet, which can be both spoofed and sent to a broadcast address. Usually, the GameSpy query server listens on port 7787, but you can manually specify the port as well. The RunServer.sh script will automatically restart the server upon a crash, giving us the ability to bruteforce the service and exploit it multiple times.

tags | exploit, udp, spoof
advisories | CVE-2004-0608
SHA-256 | f450b169feb194e0e65157d07815ac70dd9253a75e0d229c069ff6dce045c81d
Irix LPD tagprinter Command Execution
Posted Oct 27, 2009
Authored by H D Moore

This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.

tags | exploit, arbitrary
systems | irix
advisories | CVE-2001-0800
SHA-256 | e9b94c7b39094f786cf93481c5471c76f60e78b4c1f1ebf64aff58eaed537f5d
HP-UX LPD Command Execution
Posted Oct 27, 2009
Authored by H D Moore

This exploit abuses an unpublished vulnerability in the HP-UX LPD service. This flaw allows an unauthenticated attacker to execute arbitrary commands with the privileges of the root user. The LPD service is only exploitable when the address of the attacking system can be resolved by the target. This vulnerability was silently patched with the buffer overflow flaws addressed in HP Security Bulletin HPSBUX0208-213.

tags | exploit, overflow, arbitrary, root
systems | hpux
advisories | CVE-2002-1472
SHA-256 | f9d5ef66fb19775cafad693801df558f4d03366c4666e3742e525d43fecae14b
XTACACSD 4.1.2 Buffer Overflow
Posted Oct 27, 2009
Authored by MC

This Metasploit module exploits a stack overflow in XTACACSD versions 4.1.2 and below. By sending a specially crafted XTACACS packet with an overly long username, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-7232
SHA-256 | 068edc782b5026fe47e5d9c5618ccb7a64b50639d9ee2451f72c1757139fddc5
Page 2 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close