This Metasploit modules exploits a directory traversal vulnerability in VMWare Update Manager on port 9084. Versions affected by this vulnerability: vCenter Update Manager 4.1 prior to Update 2, vCenter Update Manager 4 Update 4.
141792b0109b73b145e21b04ca6c1e0cd9cb9dfc495904452e3a23caf4459da8
This Metasploit module abuses the SAP NetWeaver EPS_DELETE_FILE function, on the SAP SOAP RFC Service, to delete arbitrary files on the remote file system. The module can also be used to capture SMB hashes by using a fake SMB share as DIRNAME.
dd8fea54335c24c4b123e867b2f7f6799e65ed7f1293added0b5dc7555c7b9a1
IBM Lotus Domino versions 8.5.3 and 8.5.2 FP3 suffer from an authentication bypass vulnerability.
a2ec180c7015b665a8c09c5c87f819d86fe11a21748572b331a213d5403e5704
VMware Update Manager versions 4.1 prior to update 2 suffer from a directory traversal vulnerability.
06ec687238eb262116fe18b7c8d44a43f0193289ae66d84ef77ac981152300c0
SAP NetWeaver ABAP suffers from authorization bypass, directory traversal, and SMBRelay vulnerabilities.
0aabc6d28819f80fb0cdcc88f63dbe1fcd8013c3f12b2c36acb808d75c57fb08
This shellcode downloads and executes a file via a reverse DNS channel.
137d4935c5dba1bc9303b67ee85506910151f930ad28d4a31438dd485aafed4b
The Service account used for the Kaspersky Administration Kit and its functionality allow for attacks on other hosts in the network.
b585dc3095a18907a4e028c2b7199b468998223fdbe4a03c06b60f7ede4310b8
SAP Front End applications (SAPGui.exe) are vulnerable to DLL hijacking attacks allowing for remote code execution.
28ae63b22ea645e5c51c549e98085f2be91b625a787181783ae2e6a8a3c0929e
SAP NetWeaver BSP suffers from a cross site scripting vulnerability via the logon page.
ae27517cf68babdc559c0dd1baca4cdef40af7763de853c7456a1bd2b4304b33
Progress OpenEdge Enterprise RDBMS version 10.2A has some vulnerabilities that make it possible to enumerate UserID and bypass authentication.
94f3ea7ac21edb9e58b5237ff7c2a7826e37b408dbacdbff22fb5468c6bdec38
EasyMail ActiveX Control (emsmtp.dll) that included into Oracle Document Capture distrib can be used to read any file in target system. The vulnerable method is "ImportBodyText()".
e0290533ffa0e0be9cb707947d2fe37461961f3b2e54f7eb0baa68b865261ae8
SAP XRFC version 6.40 and 7.00 suffers from a stack overflow vulnerability.
9b8e7b9a5adb907ede97829d87b64a1087018e9595e7e83781a56c9d2180bf3a
Safari JavaScript JIT shellcode and spray for ASLR / DEP bypass on Win32.
6a5ad5dcf34040adc8cd07830c26ebb5fde16628988909f26bbf382722e4f399
The IBM BladeCenter Management module suffers from cross site scripting and directory traversal vulnerabilities.
221ec396f78060edb0ef769a38cef5b58e18b6f8c6f38d5188b079e148e40370
Safari version 4.0.5 parent.close() memory corruption exploit with ASLR and DEP bypass.
c63fd07a147d305e2a135c199ea0993b367eaf44d7d9208dbc7cf5a64f4e4897
VMware View Portal versions 3.1 and below suffer from a cross site scripting vulnerability.
6ff34d3c4c5414257facf8f8b5cdd2f2fd3e1d2c50b916d0ba65eccf0d979ba0
ProSSHD version 1.2 remote post-authentication exploit with ASLR and DEP bypass.
b3febb48bce1a02fd3be1189d335c4be2aa3bec9e2c4ff5d651b643e66766516
The IBM BladeCenter Management module suffers from a denial of service vulnerability.
2fdefac0d8be7e6b47669981826466ac5d6de34aad57eb161e0f1651ff4e02b5
VMware Remote Console Plug-in can be installed from WEB interface of VMware vSphere. This software contains of ActiveX objects and executable files for remote console of guest OS. VMrc vulnerable to format string attacks. Exploitation of this issue may lead to arbitrary code execution on the system where VMrc is installed.
9b7e2d5d9e6d71cece7b4f8e09a5fa1063bb231718082ebea4980540a99db1c7
JITed egg-hunter stage-0 universal shellcode for XP/Vista/Win7.
2d004f2c91c53dbedcbebed03fa8b080202f0fe9aa9e00a74332fa6c4479dc69
JITed egg-hunter stage-0 shellcode (permanent DEP bypass).
c0457bd37fa64a3dd66bfe32d6241af964f283e3fe7bec27a59d2d87f5a45c82
An insecure method vulnerability was discovered in SAP GUI version 7.1.
fb5ab0d8fa2ba1868b3e8cbfeabe5e49d3c31ce147b9ae7b2cecbb64d443fa95
JITed exec notepad shellcode.
f7f52c6ee5c1adab75dc974e6e122cb739c4d989ca728d781c188a5c2f6343b6
JITed Stage-0 Shellcode. This JIT shellcode finds VirtualProtect, restores the address of the shellcode, makes mem exec and jumps to it.
e071a7ace3c781d63436ad1adf0cb96594c718c351445f8b3b1b2b3f572d530a
Whitepaper called Writing JIT-Spray Shellcode For Fun And Profit.
c63788300beae3066d70ac6a350d32e8cc1e68446bc632aafb68473e7976af03