what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files

muts_mailenable_imap_examine.pm.txt
Posted Dec 28, 2005
Authored by Mati Aharoni

Metasploit exploit for a remote buffer overflow that exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.

tags | exploit, remote, overflow, imap
SHA-256 | 32ff7a89101f26206751b513c937584a52058c2d9de29807a446083ec6427bd4

Related Files

Metasploit Sample Webapp Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a webapp.

tags | exploit
SHA-256 | d9287566557239fe81ea0d9ff5e76e38c47a4198c98143517d6bcf331026e3b2
Metasploit Sample Linux Privilege Escalation Exploit
Posted Dec 16, 2019
Authored by h00die | Site metasploit.com

This Metasploit exploit module illustrates how a vulnerability could be exploited in a linux command for privilege escalation.

tags | exploit
systems | linux
SHA-256 | 5895c8d694381770d42d72e5b1a37fafc160bc89dd618ab5781e03a052bb8ddd
Novell ZENworks Configuration Management Arbitrary File Upload
Posted May 4, 2015
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module exploits a file upload vulnerability in Novell ZENworks Configuration Management (ZCM, which is part of the ZENworks Suite). The vulnerability exists in the UploadServlet which accepts unauthenticated file uploads and does not check the "uid" parameter for directory traversal characters. This allows an attacker to write anywhere in the file system, and can be abused to deploy a WAR file in the Tomcat webapps directory. ZCM up to (and including) 11.3.1 is vulnerable to this attack. This Metasploit module has been tested successfully with ZCM 11.3.1 on Windows and Linux. Note that this is a similar vulnerability to ZDI-10-078 / OSVDB-63412 which also has a Metasploit exploit, but it abuses a different parameter of the same servlet.

tags | exploit, file upload
systems | linux, windows
advisories | CVE-2015-0779
SHA-256 | 15f84d28ce1e05b5772eda5c8a707f10298f591215c96328ff2bf9f777e5ccf4
Jira Scriptrunner 2.0.7 CSRF / Code Execution
Posted Nov 13, 2012
Authored by Ben Sheppard

This is a metasploit exploit for Jira Scriptrunner version 2.0.7. This Jira plugin does not use the built in Jira protections (websudo or CSRF tokens) to protect the page from CSRF. This page is supposed to be used by admins to automate tasks, it will accept java code and by default in a windows environment Jira will be run as system.

tags | exploit, java, csrf
systems | windows
SHA-256 | f7e10861901a1d9665e685842d12a026c5ffc0c56dbc38b827eb7b239eef52e1
1 Flash Gallery Shell Upload
Posted Sep 8, 2011
Authored by Ben Schmidt | Site spareclockcycles.org

The WordPress 1 Flash Gallery plugin suffers a remote shell upload vulnerability. Metasploit exploit included.

tags | exploit, remote, shell
systems | linux
SHA-256 | 7c6886b81cc82871636398334c3d892069f858273408a672e8f0001cbcb54b85
Writing Metasploit Exploits
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Writing Metasploit Exploits. Part 4 of a series of tutorials.

tags | paper
SHA-256 | 4f35582e40e8ba81571fb876591f36beb1b8fb8f897d6ad0fd4de688ee8f9bf8
Subversion Date Overflow
Posted Oct 28, 2009
Authored by spoonm

This is a Metasploit exploit for the Subversion date parsing overflow. This exploit is for the svnserve daemon (svn:// protocol) and will not work for Subversion over webdav (http[s]://). This exploit should never crash the daemon, and should be safe to do multi-hits.

tags | exploit, web, overflow, protocol
advisories | CVE-2004-0397
SHA-256 | c81084cf41376c203360dc2c4fd7badff87c3c33602d948682a6905bafe517a2
pumpkin-dos.txt
Posted Oct 27, 2008
Authored by Saint Patrick

PumpKIN TFTP Server version 2.7.2.0 Metasploit exploit module that causes a denial of service.

tags | exploit, denial of service
SHA-256 | 166aa9b84887e5c6442ae0b73775c8735b77073833499e13bd76a3752626e4cc
mswritesmb-dos.txt
Posted Sep 15, 2008
Authored by Javier Vicente Vallejo | Site vallejo.cc

Microsoft Windows is prone to a kernel-related denial of service condition due to the way srv.sys handles malformed WRITE_ANDX SMB packets. Metasploit exploit code included.

tags | exploit, denial of service, kernel
systems | windows
SHA-256 | 78155c1242238f3c779e439c47050b7f13096125447eda1e52928ce1ec4671a2
fileutility.txt
Posted Aug 27, 2008
Authored by Seth Fogle of White Wolf Security | Site whitewolfsecurity.com

This Metasploit exploit attacks multiple file manipulation vulnerabilities in the Kyocera Mita Scanner File Utility version 3.3.0.1.

tags | exploit, vulnerability
SHA-256 | 64e913444258ee22a15a1f0eff7433971d7fb8f894cd50e84ed2e40a90ecc4b9
CAU-EX-2008-0001.txt
Posted Apr 8, 2008
Authored by I)ruid | Site caughq.org

This Metasploit exploit module targets a weakness in the way the ypupdated RPC application uses the command shell when handling a MAP UPDATE request.

tags | exploit, shell
SHA-256 | 9508276a4fbb171eff7a9532f66f01f74e089238bc4b6dbb7429902506c0fd54
apache-mod-rewrite.rb.txt
Posted Jan 7, 2008
Authored by Marcin Kozlowski

Apache mod_rewrite escape_absolute_uri() off-by-one buffer overflow Metasploit exploit module. This affects Apache versions 1.3.28 through 1.3.36, 2.0.46 through 2.0.58, and 2.2.1 through 2.2.2.

tags | exploit, overflow
advisories | CVE-2006-3747
SHA-256 | 503139768b0cda278959c2bc8df18f7cb0aee2077db8a28468990531d48c3000
dproxy.pm.txt
Posted Mar 24, 2007
Authored by Alexander Klink | Site cynops.de

MetaSploit exploit for the remote buffer overflow issue in dproxy versions 0.5 and below.

tags | exploit, remote, overflow
advisories | CVE-2007-1465
SHA-256 | 93a48384d4123533a4cf4d4b95a8e2faf0006039c1860712e18e3f39485121bc
rasman.pm.txt
Posted Jul 2, 2006
Authored by H D Moore, Pusscat | Site metasploit.com

Microsoft RRAS RASMAN Registry stack overflow Metasploit exploit that makes use of the vulnerability discussed in MS06-025.

tags | exploit, overflow, registry
SHA-256 | a7aedb2c3eea8e488a3e772cf3679c7965abbe0c0bce99960ca234e4a621aa33
mozilla_compareto.pm.txt
Posted Jan 3, 2006
Authored by H D Moore, Aviv Raff | Site metasploit.com

Metasploit exploit for the Mozilla Suite/Firefox InstallVersion->compareTo() remote buffer overflow vulnerability.

tags | exploit, remote, overflow
SHA-256 | 9d39d21125a710e9aaf4688f1250e11ae3fbe5cfa4e5a2547c1514e65e43534e
mailenable-imap-examine.py.txt
Posted Dec 28, 2005
Authored by Mati Aharoni

Python exploit for a remote buffer overflow that exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.

tags | exploit, remote, overflow, imap, python
SHA-256 | 2aa22f6b90d94adeab514c49934be2084dd51651d81239a49cd2c99a68e85f55
mailenable11.txt
Posted Dec 28, 2005
Authored by Mati Aharoni

A remote buffer overflow exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command, which allows for post authentication code execution. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.

tags | advisory, remote, overflow, imap, code execution
SHA-256 | 5d7e90c97562012dbbe25f0619abebad7142aa518eb5388cad9554f74af3d76c
snort_bo_overflow_win32.pm.txt
Posted Nov 2, 2005
Authored by Trirat Puttaraksa

Remote Snort Back Orifice preprocessor overflow Metasploit exploit for Win32 targets. Exploits Snort versions 2.4.0 through 2.4.2. Tested against Snort 2.4.2 Binary with Windows XP Professional SP1/SP2, Windows Server 2003 SP1, Windows Server 2000 SP0, and Windows 2000 Professional SP0.

tags | exploit, remote, overflow
systems | windows
SHA-256 | eae99138b91426ab5eb58667181b07b717710bab0115262472624f15edd0aba7
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close