This Metasploit module exploits a stack overflow in D-Link TFTP 1.0. By sending a request for an overly long file name, an attacker could overflow a buffer and execute arbitrary code.
bfbc05b4b87a6ce005b9bc1dcbf88ea34695a1c611595f570b33a38b8fe5c755
This Metasploit module exploits a stack overflow in E-BOOK Systems FlipViewer 4.0. The vulnerability is caused due to a boundary error in the FViewerLoading (FlipViewerX.dll) ActiveX control when handling the "LoadOpf()" method.
284d02aea916119db4ee74e022d35179fd6afb86db1fcf4582ad9f037b3a86c8
This Metasploit module exploits a stack overflow in EFS Software Easy Chat Server. By sending a overly long authentication request, an attacker may be able to execute arbitrary code.
b25a657300165a05fe6bb28cb77d8a093f461159615cd10f038a9d2f3bf0cbf9
This Metasploit module exploits a stack overflow in Streamcast <= 0.9.75. By sending an overly long User-Agent in a HTTP GET request, an attacker may be able to execute arbitrary code.
2a6e2acdf72d7702591b55ccd9cb88d4be96aea9c1b711ab5049e7484efb25e9
This Metasploit module exploits a previously unpublished vulnerability in the Dogfood CRM mail function which is vulnerable to command injection in the spell check feature. Because of character restrictions, this exploit works best with the double-reverse telnet payload. This vulnerability was discovered by LSO and affects version 2.0.10.
d47d25f175832f723f8a69b2a5df882d82ea6fc211e6829459cf8e694f589f04
This Metasploit module is for OpenHelpDesk version 1.0.100 that is vulnerability to php code execution to an improper use of eval().
790a572fa2eaf8a14620e19f2985d1b25f1ddb1857ea163771dbd4fb5f3c3ffe