Remote denial of service exploit for GoodTech Telnet server versions below 5.0.7.
50541d61ec0d111e523e600f46f1c0dd7b440d15b9b035a45d2f1b96478ac85e
GoodTech Telnet server versions prior to 5.0.7 are susceptible to a denial of service attack due to an oversized query.
5d162577f8f5bf0531044819ab92f816c3145c2628492490b99926244e8f7839
CoffeeCup Direct FTP 6.2.0.62 and CoffeeCup Free FTP 3.0.0.10 both suffer from an overflow that allows for arbitrary code execution. Exploit included that spawns a shell on port 5555.
c9c0e8b484d3a06402a6c82a42672cbd98ac77e8c0eda4fe6e231b78eb1cc7da
WodFtpDLX versions below 2.3.2.97 are susceptible to a classic buffer overflow attack. Denial of service exploit included.
195769a65ca00316eed591f6fcee2829057831d8d052f6c924409e82b66d029c
A buffer overflow vulnerability in the Trillian basic edition version 0.74i occurs in the MSN module when receiving a string of around 4096 bytes ending with a newline character from an MSN messenger server. This vulnerability is remotely exploitable but requires the use of a man-in-the-middle attack. Full exploit included.
045f8b6357fcbfcb5e4a9b20c60a3c2a36c5c1fdbf410125e1aea34ddaf40e1a
A buffer overflow in Whisper FTP Surfer 1.0.7 occurs when the client tries to delete a temporary file with an excessively long filename.
3b3913524789d35c5e21520048a207b0cfef8054b143741b863697319ae8af91