Easy File Management Web Server versions 4.0 and 5.3 contain a stack buffer overflow condition that is triggered as user-supplied input is not properly validated when handling the UserID cookie. This may allow a remote attacker to execute arbitrary code.
2039514b66ce596ea64365ef4991d5e6a022c978a82c9ac5be853aebebb0af20
Easy File Sharing FTP Server version 3.5 suffers from a stack buffer overflow vulnerability.
6d4e2b3a8ea09bda8b36163e3010795b7044177b5476f516d56a6748cda9590e
Easy Address Book Web Server version 1.6 suffers from a stack buffer overflow vulnerability.
eb3749421af48dd72ae5531d12a661999239e19e1c8b9971b9aeb7d94178bfa8
Easy File Management Web Server version 5.3 suffers from a stack buffer overflow vulnerability.
01960135cf899303cf1fae8be238f11e79604d56f7f20d97c009897fa7e524b9
Easy File Sharing Web Server version 6.8 suffers from a stack buffer overflow vulnerability.
2b38f752e2f37e486df594774fc746aafc4525d616523a2f4e218fe2e7b1ebd2
Easy Chat Server version 3.1 suffers from a stack buffer overflow vulnerability.
b295bcff7a6f95ee439df3c5e58df65ecf1d07987d149d6d786b72a28f96ea15
This Metasploit module exploits a stack based buffer overflow in Ultra Mini HTTPD 1.21 allowing remote attackers to execute arbitrary code via a long resource name in an HTTP request.
038f10bb10c9227f8c10522b7408feabf6f8db03f7a4f6c92e23b302fab084dd
onehttpd version 0.7 suffers from a denial of service vulnerability.
343b4e9dc058a440e6e7540a36fe630a737e8fac45a599427e1c9b761ff57062
Ultra Mini HTTPd version 1.21 suffers from a stack buffer overflow vulnerability. This exploit binds a shell.
b39d7035823d90ebf298af86caffb2621a6df69d4546157dd8458dfb62f0ac9a
Winamp version 5.12 stack buffer overflow exploit that creates a malicious .m3u file.
152e29fc53afdde4b7677bc4bb48709c58fbd7dc6b144b06f031ae4cb0b5b62f
MinaliC webserver version 2.0.0 suffers from a buffer overflow vulnerability.
0368ebe30258a7e6df0bdfd9d65bf94b7d08b537ae3d922547fa707b52bad52c
This Metasploit module exploits a stack based buffer overflow on Sami FTP Server 2.0.1. The vulnerability exists in the processing of LIST commands. In order to trigger the vulnerability, the "Log" tab must be viewed in the Sami FTP Server managing application, in the target machine. On the other hand, the source IP address used to connect with the FTP Server is needed. If the user can't provide it, the module will try to resolve it. This Metasploit module has been tested successfully on Sami FTP Server 2.0.1 over Windows XP SP3.
f2ce755b550afa23d41b892e96930bfc4c6426f8a8a9869ab6859d2655918b0e
Sami FTP Server version 2.0.1 LIST command buffer overflow exploit.
76c68990c26282f90daa7b08769b610ef36c0b70a461d77e07ce83e387a745c6
FreeFloat FTP version 1.0 raw command buffer overflow exploit.
4f7362ee6be1e79970cb01ac60656901c0993df1ed4c92ead3f4b9a9440a878b