This Metasploit module exploits a stack buffer overflow in Dup Scout Enterprise version 10.0.18. The buffer overflow exists via the web interface during login. This gives NT AUTHORITY\SYSTEM access.
67efc4aaa88613a74e677907f3bedd53194705d0e358c6a390abcbecf955e8fd
This Metasploit module will setup an SMTP server expecting a connection from SysGauge 1.5.18 via its SMTP server validation. The module sends a malicious response along in the 220 service ready response and exploits the client, resulting in an unprivileged shell.
4baa08befe8f7e2bbccdcae8c675d729f0222bafa9e6eadc97b5a044bd54592c
This Metasploit module exploits a buffer overflow in the WinaXe 7.7 FTP client. This issue is triggered when a client connects to the server and is expecting the Server Ready response.
85d7535ae65c59c347e6f08373d814850760c27acc6b296cd04efd4c9b986b81
This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. Due to size constraints, this module uses the Egghunter technique.
f5d3f6dc506476540894b621416c7db2b2aacb69a1d4a3c010a96e3d28c89e09
This Metasploit module exploits a buffer overflow vulnerability found in the PUT command of the PCMAN FTP server version 2.0.7. This requires authentication but by default anonymous credentials are enabled.
860df3259810620f34c556a18da76a197f8c3e0724e8476d20abc5f9f70ce870