This Metasploit module triggers Denial of Service condition in the Microsoft Internet Information Services (IIS) FTP Server 5.0 through 7.0 via a list (ls) -R command containing a wildcard. For this exploit to work in most cases, you need 1) a valid ftp account: either read-only or write-access account 2) the "FTP Publishing" must be configured as "manual" mode in startup type 3) there must be at least one directory under FTP root directory. If your provided an FTP account has write-access privilege and there is no single directory, a new directory with random name will be created prior to sending exploit payload.
67404248bb76198423211333f1d01b1d47d12b762daf1e199c5e9619ec7c4de7
KNet Web Server remote buffer overflow structure exception handler (SEH) exploit that binds a shell to port 4444.
47691f149ab5a7936c21a7a8e27d067ba1468489b8a9fa89e9fe67cf5e7c24df
The Huawei Mobile Partner application suffers from having extremely loose access permissions allowing for anyone to replace the files with malicious binaries. Version 23.007.09.00.203 is affected.
293dca6309dc7013be9f809e31e314d539fdfa96c54c16f41c22d76ba79ed4d6
The zFTP server suffers from a remote denial of service condition when handling multiple STAT and CWD command requests.
8407a8948f7a9148808d25756720686181651afab0fbe2eb264d023cb76c64bb
This Metasploit module acts as an HP printer PJL (Printer Job Language) query tool that allows you to submit your own PJL commands. Valid PJL commands are required to get successful response.
fcda3d020c75024a5907015efdfe12d0bddba5fa59bfee319f2edb06f40cee30
This Metasploit module exploits a path traversal issue in possibly the entire HP network-enabled printer series, especially those which enable the Printer Job Language (aka PJL) command interface through the default JetDirect port 9100. With the decade-old dot-dot-slash payloads, the entire printer file system can be accessed or modified.
ef5c1f98b187a962caa38431fef07a7ec3c1bc693663ee37dcf2551518b58920
This Metasploit module triggers a denial of service condition in the Microsoft Internet Information Services (IIS) FTP Server versions 5.0 through 7.0 via a list (ls) -R command containing a wildcard. This exploit is especially meant for the service which is configured as "manual" mode in startup type.
575fed5c9101b9e2345bf64ca7b5f2b1ca4205c300ba8af0446db71f25d0eed2
SmallFTPd versions 1.0.3-fix and below suffer from a denial of service vulnerability.
357d42dc0e210b67dc4190a596afff45fb42d94b2bb60535a42f73a07134267c
This Metasploit module triggers an unauthenticated denial of service condition in Smallftpd server versions 1.0.3-fix and earlier with a few dozen connection requests.
4cafbd9967c27dd7e3374f189dbe20b767a84f155ab18c6d219c6d2a95f5aba6