This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
d3ca8564e0dac6b73da45fac60f76f4deb98eb63f6147abc4897595c43465773
This Metasploit module exploits a stack overflow in Free Download Manager Remote Control 2.5 Build 758. When sending a specially crafted Authorization header, an attacker may be able to execute arbitrary code.
dd951e3b76f1cceb5b28d6432c1052bdca89b18ba6a09ce966da47b148c9daa8
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch
bd2d64d445f77d2da614725e460ab8bdf6d2f25fe712cde24a23f59ddb80b74d
This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.
87fab5b32fdb6232a2161630eb76486145af6d237e5b23d3b403788baa5d0747
This Metasploit module exploits a simple stack overflow in FreeFTPd 1.0.10. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client. This Metasploit module is based on MC's freesshd_key_exchange exploit.
7edeab39559b786875c2e25515c39c1c952e00229cbdac9c0aa83bf02ea93c48
This Metasploit module exploits a stack overflow in the freeFTPd multi-protocol file transfer service. This flaw can only be exploited when logging has been enabled (non-default).
a90fef1d9933bd62bd7e69f739528cf5b790e9aedf6aaf27faf0c5d504272d14
This Metasploit module exploits a simple stack overflow in FreeSSHd 1.0.9. This flaw is due to a buffer overflow error when handling a specially crafted key exchange algorithm string received from an SSH client.
586554c2aff684d1bb2c115e152b2a38d8a92310b721874c97cdaed2a0f97abd
This Metasploit module exploits a stack overflow in the FutureSoft TFTP Server 2000 product. By sending an overly long transfer-mode string, we were able to overwrite both the SEH and the saved EIP. A subsequent write-exception that will occur allows the transferring of execution to our shellcode via the overwritten SEH. This Metasploit module has been tested against Windows 2000 Professional and for some reason does not seem to work against Windows 2000 Server (could not trigger the overflow at all).
b3740606218ef70c4152c08e687e586930b8b8c424d8d6d9427d9f3c6f9fb666
This Metasploit module exploits a buffer overflow in the GlobalSCAPE Secure FTP Server. All versions prior to 3.0.3 are affected by this flaw. A valid user account ( or anonymous access) is required for this exploit to work.
f92b038b30321d1e394a2a78f7f7a4672a2b84c28b02a128fdaf5a46600f586c
This Metasploit module exploits a stack overflow in GOM Player 2.1.6.3499. By sending an overly long string to the "OpenUrl()" method located in the GomWeb3.dll Control, an attacker may be able to execute arbitrary code.
e52ce249c3a1c0f68a77083caf340c36d133e256677fdee9b7cf8c3389ec5026
This Metasploit module exploits a stack overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution.
9f3734e89194456c676c69c92e135e87c3feb64a676a4e371902a962180e9a3b
This Metasploit module exploits a stack overflow in Novell's GroupWise Messenger Client. By sending a specially crafted HTTP response, an attacker may be able to execute arbitrary code.
9fa6d815b78aa9f6ad894a1eeaffa7d96558d1aa381086f40211a616c781d2dc
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request to Toolbar.exe, an attacker may be able to execute arbitrary code.
2ffb518768a832808cc0954640eb3e8712f15e447fda501795b67b53c1cebd94
This Metasploit module exploits a stack overflow in HP OpenView Network Node Manager 7.50. By sending a specially crafted CGI request, an attacker may be able to execute arbitrary code.
b4689c38e3d87c7a12a78c691f992acbfe300a075e3b6d9d4d74c5b9340d426f
This Metasploit module exploits a stack overflow in HP OpenView Operations version A.07.50. By sending a specially crafted packet, a remote attacker may be able to execute arbitrary code.
f376d7d350eb4a2d02ede2c388c8dbc91265a3b9c098a8b8fa3a6179b72b6b58
This Metasploit module exploits a stack overflow in Persists Software Inc's XUpload ActiveX control(version 2.1.0.1) thats included in HP LoadRunner 9.0. By passing an overly long string to the AddFolder method, an attacker may be able to execute arbitrary code.
c15b9df4df85c5e180e350d51c48c227ea6bc9c7505c21bc269edefd25f65a5d
This Metasploit module exploits a stack-based buffer overflow in SPIDERLib.Loader ActiveX control (Spider90.ocx) 9.1.0.4353 installed by TestDirector (TD) for Hewlett-Packard Mercury Quality Center 9.0 before Patch 12.1, and 8.2 SP1 before Patch 32. By setting an overly long value to 'ProgColor', an attacker can overrun a buffer and execute arbitrary code.
c08b27a7fc069442f0b520a51db82b21f23f666431455fa3b054f21472e8a9ed
This Metasploit module exploits one of the multiple stack overflows in Computer Associates BrightStor HSM. By sending a specially crafted request, an attacker could overflow the buffer and execute arbitrary code.
9a58580be50ae83d8abe4291da2f01e0926f2a74a9a75141d8cddacb4902b2b7
This Metasploit module exploits a stack overflow in Hummingbird Connectivity 10 LPD Daemon. This Metasploit module has only been tested against Hummingbird Exceed v10 with SP5.
defa7313336e83b65e87c5e8f0502489a614709ada6f27a33e38b1f851bc4167
This exploits a stack overflow in the IA WebMail server. This exploit has not been tested against a live system at this time.
1de7b76da90e3919943547d5532332cd36c98258b6de77f1e7d308ad54951310
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted attach request.
63172546e969a58b1eeddfce0613c163b394447938646b9e5707ca94544913fb
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted create request.
6ec0d0b72e02a0c65f646f14cf76eedeab3d9199a07449c8c949412207c2f8d7
This Metasploit module exploits a stack overflow in Borland InterBase by sending a specially crafted service attach request.
ab2756fdbe75cf2876139fa363d8263a33fa8d44c707093e27d9ad321e6174db
This is a stack overflow exploit for IBM Tivoli Provisioning Manager for OS Deployment version 5.1.0.X.
88f016caec5977a932582aadef5b82fb9c608e313fa19c58e8a88c9396d74815
This Metasploit module exploits a stack overflow in the IBM Tivoli Storage Manager Express CAD Service (5.3.3). By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code.
aa4c80c5e7fe58a924c7a1e241d145c06f6536a8898c31288bed7b74f5dc8b23