what you don't know can hurt you
Showing 1 - 4 of 4 RSS Feed

CVE-2014-2973

Status Candidate

Overview

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-5753. Reason: This candidate is a duplicate of CVE-2008-5753. Notes: All CVE users should reference CVE-2008-5753 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

Related Files

BulletProof FTP Client BPS Buffer Overflow
Posted Jan 6, 2015
Authored by Gabor Seljan | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in BulletProof FTP Client 2010, caused by an overly long hostname. By persuading the victim to open a specially-crafted .BPS file, a remote attacker could execute arbitrary code on the system or cause the application to crash. This Metasploit module has been tested successfully on Windows XP SP3.

tags | exploit, remote, overflow, arbitrary
systems | windows, xp
advisories | CVE-2014-2973
MD5 | 6f00f2af940afc19976a4e84fa4d807c
BulletProof FTP Client 2010 Buffer Overflow
Posted Dec 9, 2014
Authored by Muhamad Fadzil Ramli, Gabor Seljan

BulletProof FTP Client 2010 SEH buffer overflow exploit that affects version 2010.75.0.76.

tags | exploit, overflow
advisories | CVE-2014-2973
MD5 | 8a05406d19b174b7c7eaa1b230f1dae9
BulletProof FTP Client 2010 Buffer Overflow
Posted Sep 6, 2014
Authored by Gabor Seljan, Robert Kugler

BulletProof FTP Client 2010 version 2010.75.0.76 SEH buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2014-2973
MD5 | 23c69eb6755bff3b0f974f2074aa17b8
BulletProof FTP Client 2010 Buffer Overflow
Posted Jul 25, 2014
Authored by Gabor Seljan

BulletProof FTP Client 2010 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
advisories | CVE-2014-2973
MD5 | f2946fa8425534cbef6262f0a98a7f9b
Page 1 of 1
Back1Next

File Archive:

December 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    22 Files
  • 2
    Dec 2nd
    33 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close