exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Myo Soe

First Active2011-06-28
Last Active2024-08-31
Microsoft IIS FTP Server LIST Stack Exhaustion
Posted Aug 31, 2024
Authored by Kingcope, Myo Soe | Site metasploit.com

This Metasploit module triggers Denial of Service condition in the Microsoft Internet Information Services (IIS) FTP Server 5.0 through 7.0 via a list (ls) -R command containing a wildcard. For this exploit to work in most cases, you need 1) a valid ftp account: either read-only or write-access account 2) the "FTP Publishing" must be configured as "manual" mode in startup type 3) there must be at least one directory under FTP root directory. If your provided an FTP account has write-access privilege and there is no single directory, a new directory with random name will be created prior to sending exploit payload.

tags | exploit, denial of service, root
advisories | CVE-2009-2521
SHA-256 | 67404248bb76198423211333f1d01b1d47d12b762daf1e199c5e9619ec7c4de7
KNet Web Server Buffer Overflow
Posted Mar 27, 2013
Authored by Myo Soe | Site yehg.net

KNet Web Server remote buffer overflow structure exception handler (SEH) exploit that binds a shell to port 4444.

tags | exploit, remote, web, overflow, shell
SHA-256 | 47691f149ab5a7936c21a7a8e27d067ba1468489b8a9fa89e9fe67cf5e7c24df
Huawei Mobile Partner Poor Permissions
Posted Feb 12, 2013
Authored by Myo Soe

The Huawei Mobile Partner application suffers from having extremely loose access permissions allowing for anyone to replace the files with malicious binaries. Version 23.007.09.00.203 is affected.

tags | exploit
SHA-256 | 293dca6309dc7013be9f809e31e314d539fdfa96c54c16f41c22d76ba79ed4d6
zFTP Server Remote Denial Of Service
Posted Oct 25, 2011
Authored by Myo Soe

The zFTP server suffers from a remote denial of service condition when handling multiple STAT and CWD command requests.

tags | exploit, remote, denial of service
systems | linux
SHA-256 | 8407a8948f7a9148808d25756720686181651afab0fbe2eb264d023cb76c64bb
HP JetDirect Printer PJL Query Execution
Posted Aug 7, 2011
Authored by Myo Soe | Site metasploit.com

This Metasploit module acts as an HP printer PJL (Printer Job Language) query tool that allows you to submit your own PJL commands. Valid PJL commands are required to get successful response.

tags | exploit
SHA-256 | fcda3d020c75024a5907015efdfe12d0bddba5fa59bfee319f2edb06f40cee30
HP JetDirect PJL Interface Universal Path Traversal
Posted Aug 7, 2011
Authored by Myo Soe | Site metasploit.com

This Metasploit module exploits a path traversal issue in possibly the entire HP network-enabled printer series, especially those which enable the Printer Job Language (aka PJL) command interface through the default JetDirect port 9100. With the decade-old dot-dot-slash payloads, the entire printer file system can be accessed or modified.

tags | exploit, file inclusion
advisories | CVE-2010-4107
SHA-256 | ef5c1f98b187a962caa38431fef07a7ec3c1bc693663ee37dcf2551518b58920
Microsoft IIS FTP Server 7.0 Stack Exhaustion
Posted Jul 3, 2011
Authored by Kingcope, Myo Soe | Site metasploit.com

This Metasploit module triggers a denial of service condition in the Microsoft Internet Information Services (IIS) FTP Server versions 5.0 through 7.0 via a list (ls) -R command containing a wildcard. This exploit is especially meant for the service which is configured as "manual" mode in startup type.

tags | exploit, denial of service
advisories | CVE-2009-2521, OSVDB-57753
SHA-256 | 575fed5c9101b9e2345bf64ca7b5f2b1ca4205c300ba8af0446db71f25d0eed2
SmallFTPd 1.0.3-fix Denial Of Service
Posted Jun 30, 2011
Authored by Myo Soe

SmallFTPd versions 1.0.3-fix and below suffer from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 357d42dc0e210b67dc4190a596afff45fb42d94b2bb60535a42f73a07134267c
Smallftpd 1.0.3 Denial Of Service
Posted Jun 28, 2011
Authored by Myo Soe | Site metasploit.com

This Metasploit module triggers an unauthenticated denial of service condition in Smallftpd server versions 1.0.3-fix and earlier with a few dozen connection requests.

tags | exploit, denial of service
SHA-256 | 4cafbd9967c27dd7e3374f189dbe20b767a84f155ab18c6d219c6d2a95f5aba6
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close