exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 301 RSS Feed

Files Date: 2009-11-26 to 2009-11-27

Asus Dpcproxy Buffer Overflow
Posted Nov 26, 2009
Authored by Jacopo Cervini | Site metasploit.com

This Metasploit module exploits a stack overflow in Asus Dpcroxy version 2.0.0.19. It should be vulnerable until version 2.0.0.24.

tags | exploit, overflow
advisories | CVE-2008-1491
SHA-256 | 2fe9f48d3f15c7789afc7a9cb89d4e8460d9728364df7e30ee77cc43757e5323
AtHocGov IWSAlerts ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in AtHocGov IWSAlerts. When sending an overly long string to the CompleteInstallation() method of AtHocGovTBr.dll (6.1.4.36) an attacker may be able to execute arbitrary code. This vulnerability was silently patched by the vendor.

tags | exploit, overflow, arbitrary
SHA-256 | 3be437f260772dff9eaa53d584553434d04c820e8403f838ccbefca9b4d9967c
Allied Telesyn TFTP Server 1.9 Long Filename Overflow
Posted Nov 26, 2009
Authored by Patrick Webster | Site metasploit.com

This Metasploit module exploits a stack overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.

tags | exploit, overflow
advisories | CVE-2006-6184
SHA-256 | c485cdfe9f1d2432b1537fb84ec5ea7062f793592929aba3668b651348caba32
Autodesk IDrop ActiveX Control Heap Memory Corruption
Posted Nov 26, 2009
Authored by Elazar Broad, Trancer | Site metasploit.com

This Metasploit module exploits a heap-based memory corruption vulnerability in Autodesk IDrop ActiveX control (IDrop.ocx) version 17.1.51.160. An attacker can execute arbitrary code by triggering a heap use after free condition using the Src, Background, PackageXml properties.

tags | exploit, arbitrary, activex
SHA-256 | ed9e481ead1489a1daf2b9cee8648d7e139f01c0d32d6ba6537f09d38141d0c1
BadBlue 2.5 EXT.dll Buffer Overflow
Posted Nov 26, 2009
Authored by acaro | Site metasploit.com

This is a stack overflow exploit for BadBlue version 2.5.

tags | exploit, overflow
advisories | CVE-2005-0595
SHA-256 | 0d475fde99075c9ad6bf634410f200dc2f13e92c479178bd8bcfe8964c45e884
BadBlue 2.72b PassThru Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the PassThru functionality in ext.dll in BadBlue 2.72b and earlier.

tags | exploit, overflow
advisories | CVE-2007-6377
SHA-256 | 3eddde82736d0b0ecfca5d1b0b9308d95d9ce454cf159801e881a87590afdd43
BakBone NetVault Remote Heap Overflow
Posted Nov 26, 2009
Authored by H D Moore, nolimit | Site metasploit.com

This Metasploit module exploits a heap overflow in the BakBone NetVault Process Manager service. This code is a direct port of the netvault.c code written by nolimit and BuzzDee.

tags | exploit, overflow
advisories | CVE-2005-1009
SHA-256 | abb3356d348f4bf759c98838cbffce838b11685877ba40eb30c6f1e41e563425
BEA Weblogic JSESSIONID Cookie Value Overflow
Posted Nov 26, 2009
Authored by Pusscat | Site metasploit.com

This Metasploit module exploits a 0day in the JSESSION cookie value when clustering is configured.

tags | exploit
advisories | CVE-2008-5457
SHA-256 | 86c77b3be0f72a80cfacf3a893a4763093c6a54c14bc80ae50b93d61caa6c5a5
BEA Weblogic Transfer-Encoding Buffer Overflow
Posted Nov 26, 2009
Authored by Pusscat | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. This vulnerability exists in the error reporting for unknown Transfer-Encoding headers. You may have to run this twice due to timing issues with handlers.

tags | exploit, overflow
advisories | CVE-2008-4008
SHA-256 | ba8f35f7d7e08834aa8e9aaa62c2d259a6ba632f79794a0647b915f1830dfd5c
BearShare 6 ActiveX Control Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in the NCTAudioFile2.Audio ActiveX Control provided by BearShare 6.0.2.26789. By sending a overly long string to the "SetFormatLikeSample()" method, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2007-0018
SHA-256 | 391ea9701aa5c2824c8c010a33a3a53acf2d8878b0d3537d082c8d39edb32328
Belkin Bulldog Plus Web Service Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Belkin Bulldog Plus 4.0.2 build 1219. When sending a specially crafted http request, an attacker may be able to execute arbitrary code.

tags | exploit, web, overflow, arbitrary
SHA-256 | 45aad35b5ab2c8331fdf0a21c06b843600a233e78d2d32e79556240e5698d21e
BigAnt Server 2.50 SP1 Buffer Overflow
Posted Nov 26, 2009
Authored by Dr_IDE | Site metasploit.com

This exploits a stack overflow in the BigAnt Messaging Service, part of the BigAnt Server product suite. This Metasploit module was tested successfully against version 2.50 SP1.

tags | exploit, overflow
SHA-256 | a6efaa655fbca2207d1e6a66a1c5c9d6fb68fe09f3765724c03c9f340169fcf3
BigAnt Server 2.2 Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in BigAnt Server 2.2. By sending a specially crafted packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-1914
SHA-256 | b28a87380ea46061fdb7f0aba074ed8113eaa87be493b1d7c807546ef8032c68
ISS PAM.dll ICQ Parser Buffer Overflow
Posted Nov 26, 2009
Authored by spoonm | Site metasploit.com

This Metasploit module exploits a stack overflow in the ISS products that use the iss-pam1.dll ICQ parser (Blackice/RealSecure). Successful exploitation will result in arbitrary code execution as LocalSystem. This exploit only requires 1 UDP packet, which can be both spoofed and sent to a broadcast address. The ISS exception handler will recover the process after each overflow, giving us the ability to bruteforce the service and exploit it multiple times.

tags | exploit, overflow, arbitrary, udp, spoof, code execution
advisories | CVE-2004-0362
SHA-256 | d67c5051b25bd521627ed2f0b421e431d2c7a7bc79507cd2dd85cb4525447b2a
Blue Coat WinProxy Host Header Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a buffer overflow in the Blue Coat Systems WinProxy service by sending a long port value for the Host header in a HTTP request.

tags | exploit, web, overflow
advisories | CVE-2005-4085
SHA-256 | 82c80e9e59b7ee8805196b11f4141db3c2560f793a7da0edf8e9f6abaa27dc32
Bomberclone 0.11.6 Buffer Overflow
Posted Nov 26, 2009
Authored by acaro | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Bomberclone 0.11.6 for Windows. The return address is overwritten with lstrcpyA memory address, the second and third value are the destination buffer, the fourth value is the source address of our buffer in the stack. This exploit is like a return in libc. ATTENTION The shellcode is exec ONLY when someone try to close bomberclone.

tags | exploit, overflow, shellcode
systems | windows
advisories | CVE-2006-0460
SHA-256 | 1f188f97f389b0404fc041c1871d2fe7bd68b27ac86eb20c50950042743fad29
Bopup Communications Server Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Bopup Communications Server 3.2.26.5460. By sending a specially crafted packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 4ff32d726ad735b55296a2b8480eb5333f6064cacce8f3c7061985db1f52ba1f
Borland Interbase Create-Request Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Borland Interbase 2007. By sending a specially crafted create-request packet, a remote attacker may be able to execute arbitrary code.

tags | exploit, remote, overflow, arbitrary
advisories | CVE-2007-3566
SHA-256 | 4c2a6868ee123f5c6ac4d4af4662087424172ee39e6bfc56d8e204f412e56e81
Borland CaliberRM StarTeam Multicast Service Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Borland CaliberRM 2006. By sending a specially crafted GET request to the STMulticastService, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-0311
SHA-256 | d8bb96eb79adea37a793cf30d816ca54790900b0479cbb38b677856168d4d588
CA BrightStor ARCserve Backup AddColumn() ActiveX Buffer Overflow
Posted Nov 26, 2009
Authored by dean | Site metasploit.com

The CA BrightStor ARCserve Backup ActiveX control (ListCtrl.ocx) is vulnerable to a stack-based buffer overflow. By passing an overly long argument to the AddColumn() method, a remote attacker could overflow a buffer and execute arbitrary code on the system.

tags | exploit, remote, overflow, arbitrary, activex
advisories | CVE-2008-1472
SHA-256 | deda324d5d17fb5a0a5f8b8fcc9d39b55328a2faeca975767d3d6875b67d01d1
CA Antivirus Engine CAB Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in CA eTrust Antivirus 8.1.637. By creating a specially crafted CAB file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-2864
SHA-256 | ce9e53a203173e1b26a0d246de3e4e1cbd8cb2617e22eab3b6e5f6f8866f4942
CA iTechnology iGateway Debug Mode Buffer Overflow
Posted Nov 26, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits a vulnerability in the Computer Associates iTechnology iGateway component. When True is enabled in igateway.conf (non-default), it is possible to overwrite the stack and execute code remotely.

tags | exploit
SHA-256 | 89d7912b65f1179a027b6b09dbe1d096244c228ce9a646375fd5feff7816a959
Cain & Abel <= v4.9.24 RDP Buffer Overflow.
Posted Nov 26, 2009
Authored by Trancek | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in the Cain & Abel v4.9.24 and below. An attacker must send the file to victim, and the victim must open the specially crafted RDP file under Tools -> Remote Desktop Password Decoder.

tags | exploit, remote, overflow
advisories | CVE-2008-5405
SHA-256 | 47967a6fce5366f37b0a5c09173209b74b0a55645903ae023725ee62e0883c49
CA CAM log_security() Stack Overflow (Win32)
Posted Nov 26, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a vulnerability in the CA CAM service by passing a long parameter to the log_security() function. The CAM service is part of TNG Unicenter. This Metasploit module has been tested on Unicenter v3.1.

tags | exploit
advisories | CVE-2005-2668
SHA-256 | 2e71c608702d8dee76a55a8cab4aa0945443a1bd14f03c3136a80c533883e398
CCProxy <= v6.2 Telnet Proxy Ping Overflow
Posted Nov 26, 2009
Authored by Patrick Webster | Site metasploit.com

This Metasploit module exploits the YoungZSoft CCProxy <= v6.2 suite Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command.

tags | exploit
advisories | CVE-2004-2416
SHA-256 | 7455e352f49dbbe4d2b5d04873599a32a9fb5fd9d939ae9a66d3af527947f5c9
Page 2 of 12
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close