The SolarWinds TFTP server can be shut down by sending a netascii read request with a specially crafted file name.
69c27b1c69a18ca35b7954dd6c97a33b8fd13b788600c5fa06bbee54eb66be43
This Metasploit module exploits a buffer overflow in Gekko Manager ftp client, triggered when processing the response received after sending a LIST request. If this response contains a long filename, a buffer overflow occurs, overwriting a structured exception handler.
1e7f04091422e546c4e127b6c53345bff8d018725ad5fe1491c13b5f22f5072d
This Metasploit module exploits a buffer overflow in the LeapFTP 3.0.1 client. This issue is triggered when a file with a long name is downloaded/opened.
f8abfdd204f0ed82b2f476dc9dc0ef13d8d0f1fd66773b87636bd55e7ccf5da4
This Metasploit module exploits a buffer overflow in the FileWrangler client that is triggered when the client connects to a FTP server and lists the directory contents, containing an overly long directory name.
95851d121dac72f5b67123647939012f5eb8f8288e71b4bf2e3aba8b78359ec8
This Metasploit module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes.
d01b8d0eccb2aec11afecf3d49371c3c926e2d006a81facbb808d6626fec7fa3
This Metasploit module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes.
39c01041cd7a953eb8e64486e1f5865273ee4d2db2d0b6b1cfb86aad1711e782
This is a Metasploit module that exploits a remote buffer overflow in Integard Home and Pro version 2.
d4089119cb05d1fbda649606b655fb13dc6b8bd56736cee01e8bbc3e9d7072ab
Solarwinds TFTP version 10.4.0.13 remote denial of service exploit.
17b4cee44db4f487f60f319a9277e525c1e65dc901469beb37ca900113b1f8f5
Solarwinds TFTP version 10.4.0.10 remote denial of service exploit.
e31adba5b54f3dfad01a1ac9a1af298e171ddd271b43b6a5d9edc1ea215f417d
Wireshark version 1.2.5 LWRES getaddrbyname stack buffer overflow exploit that spawns calc.exe.suffers from a buffer overflow vulnerability.
8c2dc66b69658bc18247486f4af5756f562eefdfc9bb8c34ec543acd3c1043df