Ask.com Toolbar askBar.dll ActiveX Control Buffer Overflow
This Metasploit module exploits a stack overflow in Ask.com Toolbar 4.0.2.53. An attacker may be able to execute arbitrary code by sending an overly long string to the "ShortFormat()" method in...
View ArticleApple QuickTime 7.1.3 RTSP URI Buffer Overflow
This Metasploit module exploits a buffer overflow in Apple QuickTime 7.1.3. This Metasploit module was inspired by MOAB-01-01-2007. The Browser target for this module was tested against IE 6 and...
View ArticleApple QuickTime 7.3 RTSP Response Header Buffer Overflow
This Metasploit module exploits a stack overflow in Apple QuickTime 7.3. By sending an overly long RTSP response to a client, an attacker may be able to execute arbitrary code.
View ArticleApple ITunes 4.7 Playlist Buffer Overflow
This Metasploit module exploits a stack overflow in Apple ITunes 4.7 build 4.7.0.42. By creating a URL link to a malicious PLS file, a remote attacker could overflow a buffer and execute arbitrary...
View ArticleApache module mod_rewrite LDAP protocol Buffer Overflow
This Metasploit module exploits the mod_rewrite LDAP protocol scheme handling flaw discovered by Mark Dowd, which produces an off-by-one overflow. Apache versions 1.3.29-36, 2.0.47-58, and 2.2.1-2 are...
View ArticleApache Win32 Chunked Encoding
This Metasploit module exploits the chunked transfer integer wrap vulnerability in Apache version 1.2.x to 1.3.24. This particular module has been tested with all versions of the official Win32 build...
View ArticleAmerica Online ICQ ActiveX Control Arbitrary File Download and Execute.
This Metasploit module allows remote attackers to download and execute arbitrary files on a users system via the DownloadAgent function of the ICQPhone.SipxPhoneManager ActiveX control.
View ArticleAOL Radio AmpX ActiveX Control ConvertFile() Buffer Overflow
This Metasploit module exploits a stack-based buffer overflow in AOL IWinAmpActiveX class (AmpX.dll) version 2.4.0.6 installed via AOL Radio website. By setting an overly long value to 'ConvertFile()',...
View ArticleWindows ANI LoadAniIcon() Chunk Size Stack Overflow (SMTP)
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to...
View ArticleAmaya Browser v11.0 bdo tag overflow
This Metasploit module exploits a stack overflow in the Amaya v11 Browser. By sending an overly long string to the "bdo" tag, an attacker may be able to execute arbitrary code.
View ArticleAlt-N WebAdmin USER Buffer Overflow
Alt-N WebAdmin is prone to a buffer overflow condition. This is due to insufficient bounds checking on the USER parameter. Successful exploitation could result in code execution with SYSTEM level...
View ArticleAltap Salamander 2.5 PE Viewer Buffer Overflow
This Metasploit module exploits a buffer overflow in Altap Salamander
View ArticleEMC AlphaStor Agent Buffer Overflow
This Metasploit module exploits a stack overflow in EMC AlphaStor 3.1. By sending a specially crafted message, an attacker may be able to execute arbitrary code.
View ArticleAIM Triton 1.0.4 CSeq Buffer Overflow
This Metasploit module exploits a buffer overflow in AOL's AIM Triton 1.0.4. By sending an overly long CSeq value, a remote attacker could overflow a buffer and execute arbitrary code on the system...
View ArticleAOL Instant Messenger goaway Overflow
This Metasploit module exploits a flaw in the handling of AOL Instant Messenger's 'goaway' URI handler. An attacker can execute arbitrary code by supplying a overly sized buffer as the 'message'...
View ArticleAdobe util.printf() Buffer Overflow
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional
View ArticleAdobe RoboHelp Server 8 Arbitrary File Upload and Execute.
This Metasploit module exploits a authentication bypass vulnerability which allows remote attackers to upload and execute arbitrary code.
View ArticleAdobe PDF Embedded EXE Social Engineering
This Metasploit module embeds a Metasploit payload into an existing PDF file. The resulting PDF can be sent to a target as part of a social engineering attack.
View ArticleAdobe JBIG2Decode Memory Corruption Exploit
This Metasploit module exploits a heap-based pointer corruption flaw in Adobe Reader 9.0.0 and earlier. This Metasploit module relies upon javascript for the heap spray.
View ArticleAdobe Collab.getIcon() Buffer Overflow
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional
View ArticleAdobe Collab.collectEmailInfo() Buffer Overflow
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional 8.1.1. By creating a specially crafted pdf that a contains malformed Collab.collectEmailInfo() call, an...
View ArticleactivePDF WebGrabber ActiveX Control Buffer Overflow
This Metasploit module exploits a stack overflow in activePDF WebGrabber 3.8. When sending an overly long string to the GetStatus() method of APWebGrb.ocx (3.8.2.0) an attacker may be able to execute...
View ArticleACDSee XPM File Section Buffer Overflow
This Metasploit module exploits a buffer overflow in ACDSee 9.0. When viewing a malicious XPM file with the ACDSee product, a remote attacker could overflow a buffer and execute arbitrary code.
View Article3Com 3CDaemon 2.0 FTP Username Overflow
This Metasploit module exploits a vulnerability in the 3Com 3CDaemon FTP service. This package is being distributed from the 3Com web site and is recommended in numerous support documents. This...
View ArticleGAMSoft TelSrv 1.5 Username Buffer Overflow
This Metasploit module exploits a username sprintf stack overflow in GAMSoft TelSrv 1.5. Other versions may also be affected. The service terminates after exploitation, so you only get one chance!
View Article
More Pages to Explore .....