This Metasploit module exploits a stack overflow in the MKD verb in CesarFTP 0.99g.
2d6102e099fafb6459a2f1da5e44183cbd557647943a7428efe867ada870c42a
This Metasploit module exploits a stack overflow in Creative Software AutoUpdate Engine. When sending an overly long string to the cachefolder() property of CTSUEng.ocx an attacker may be able to execute arbitrary code.
6de8da7c88867f76df180a19f591f98582860ea0b989765c93448df4c2b3b18e
This Metasploit module exploits a stack-based buffer overflow in the Destiny Media Player 1.61. An attacker must send the file to victim and the victim must open the file. File-->Open Playlist
868dcc3efcdca401445588d0a42bc621b29c77a244203e78aa5f0670aaeb92dc
This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a specific type of request is sent to the TCP listener on port 41523. This vulnerability was discovered by cybertronic@gmx.net and affects all known versions of the BrightStor product. This Metasploit module is based on the 'cabrightstor_disco' exploit by Thor Doomen.
532219f28d50db309980d4c39dfa18dcf976499ccb5c9736a81297f410a80362
This Metasploit module exploits a vulnerability in the CA BrightStor Discovery Service. This vulnerability occurs when a large request is sent to UDP port 41524, triggering a stack overflow.
cc02dcad9531e32e7473a4a7fa98929736e506792b9a193707c55a2b424bc463
This Metasploit module exploits a stack overflow in DjVu ActiveX Component. When sending an overly long string to the ImageURL() property of DjVu_ActiveX_MSOffice.dll (3.0) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
81553625fd56a8a603a1213e5449928c6a7c73baa8e26671b9fecc422df68e12
This Metasploit module exploits a stack overflow in D-Link TFTP 1.0. By sending a request for an overly long file name, an attacker could overflow a buffer and execute arbitrary code.
bfbc05b4b87a6ce005b9bc1dcbf88ea34695a1c611595f570b33a38b8fe5c755
This Metasploit module exploits a stack overflow in IBM Lotus Domino Web Server prior to version 7.0.3FP1 and 8.0.1. This flaw is triggered by any HTTP request with an Accept-Language header greater than 114 bytes.
83f6fb7d5ae69011a3539778a65b7fe423e17e94cf8166d8ba3f39790245f70b
This Metasploit module exploits a stack overflow in Lotus Domino's Sametime Server. By sending an overly long POST request to the Multiplexer STMux.exe service we are able to overwrite SEH. Based on the exploit by Manuel Santamarina Suarez.
dbb922034950b5d503d3b1d3a1d7c5b5c97e423e24541e11f69c20a9ef2b6eba
This Metasploit module exploits a stack overflow in the authentication mechanism of NSI Doubletake which is also rebranded as HP Storage Works. This vulnerability was found by Titon of Bastard Labs.
fd419d18e7ddad1764df7c3842e788f57b8a627cc913486d6cc14272d43dfab1
This Metasploit module exploits a stack overflow in Electronic Arts SnoopyCtrl ActiveX Control (NPSnpy.dll 1.1.0.36). When sending a overly long string to the CheckRequirements() method, an attacker may be able to execute arbitrary code.
9649404755c6438c63debc23c7b4cdca4c99e26b893b33866314e401c8c296fa
This Metasploit module exploits a stack overflow in the Easy File Sharing 2.0 service. By sending an overly long password, an attacker can execute arbitrary code.
c77ed5da5e319fd22bf6141e86768101766cfbcee443a9aae58a9c0824a9c48b
This Metasploit module exploits a stack overflow in E-BOOK Systems FlipViewer 4.0. The vulnerability is caused due to a boundary error in the FViewerLoading (FlipViewerX.dll) ActiveX control when handling the "LoadOpf()" method.
284d02aea916119db4ee74e022d35179fd6afb86db1fcf4582ad9f037b3a86c8
This Metasploit module exploits a stack overflow in Novell eDirectory 8.8.1. The web interface does not validate the length of the HTTP Host header prior to using the value of that header in an HTTP redirect.
1aad03e036a78cb6b80748cae8a3a6dce768fafcd723ad98766a6e5a9da79b02
This Metasploit module exploits a stack overflow in eDirectory 8.7.3 iMonitor service. This vulnerability was discovered by Peter Winter-Smith of NGSSoftware.
4e791e501a09eb7698018606ca07a32fef29347f8989cf4e0bcce74ebadb9246
This Metasploit module exploits a stack overflow in EFS Software Easy Chat Server. By sending a overly long authentication request, an attacker may be able to execute arbitrary code.
b25a657300165a05fe6bb28cb77d8a093f461159615cd10f038a9d2f3bf0cbf9
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the DELETEDEVICE command in the Topology server, a stacked based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
40c7d0b0ef0fe774728c6c830363e3909504fb26df945ca04dbed618dc111ba2
This Metasploit module exploits a stack overflow in eIQnetworks Enterprise Security Analyzer. During the processing of long arguments to the LICMGR_ADDLICENSE command, a stack-based buffer overflow occurs. This Metasploit module has only been tested against ESA v2.1.13.
d27891217d71ec56e0dc1758d7a3b745fe6d0c68abc89ee617e45609ec8b18c3
This Metasploit module exploits a stack overflow in the KeyWorks KeyHelp Activex Control (KeyHelp.ocx 1.2.3120.0). This Activex Control comes bundled with EMC's Documentation ApplicationXtender 5.4.
8f929c21e6a8d34f7df2ba7aa14820ee0ed606852cf0680d9a171ca1d6ce36fa
This Metasploit module exploits a stack overflow in SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41) provided by EnjoySAP GUI. By sending an overly long string to the "PrepareToPostHTML()" method, an attacker may be able to execute arbitrary code.
98fd94828cce50970069d9f68f28bdaa0e02e59e5d08bd820ec10abedb34c3d7
This Metasploit module exploits a buffer overflow in Computer Associates Threat Manager for the Enterprise r8.1. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need valid logon credentials to the target.
776879bc32b72eec2c3e11ef19cb8be8c4690fdbfddde6a48862e2511318c831
This Metasploit module exploits a stack overflow in CA eTrust PestPatrol. When sending an overly long string to the Initialize() property of ppctl.dll (5.6.7.9) an attacker may be able to execute arbitrary code.
9992f02f43c2fc4d272a20e0d5ecf303b254f9079c7e476c9feb3c54622af26a
This Metasploit module exploits a stack overflow in the Qualcomm WorldMail IMAP Server version 3.0 (build version 6.1.22.0). Using the PAYLOAD of windows/shell_bind_tcp allows or the most reliable results.
2e4d189387ba98a5cfc55e1b2069672f8e124842d9a76dd7e47cd00b025cf6ad
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
75ccae32e6a681ca52041605578b4c74db2c5a1c796211d8a46bddd7f3d1665b
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
7ad400608089f7047729b20b5b39242d6c9b2aa7f9014358c786fa3d52c6c287