Jay Turla

27 exploits Active since May 1999
CVE-2016-10073 METASPLOIT HIGH ruby SCANNER
Vanilla Forums <2.3.1 - Info Disclosure
The from method in library/core/class.email.php in Vanilla Forums before 2.3.1 allows remote attackers to spoof the email domain in sent messages and potentially obtain sensitive information via a crafted HTTP Host header, as demonstrated by a password reset request.
CVSS 7.5
CVE-2005-3398 METASPLOIT ruby SCANNER
SUN Solaris - Information Disclosure
The default configuration of the web server for the Solaris Management Console (SMC) in Solaris 8, 9, and 10 enables the HTTP TRACE method, which could allow remote attackers to obtain sensitive information such as cookies and authentication data from HTTP headers.
CVE-2015-7602 METASPLOIT ruby WORKING POC
BisonWare BisonFTP <3.5 - Path Traversal
Directory traversal vulnerability in BisonWare BisonFTP 3.5 allows remote attackers to read arbitrary files via a ../ (dot dot slash) in a RETR command.
CVE-2015-7601 METASPLOIT ruby WORKING POC
PCMan's FTP Server <2.0.7 - Path Traversal
Directory traversal vulnerability in PCMan's FTP Server 2.0.7 allows remote attackers to read arbitrary files via a ..// (dot dot double slash) in a RETR command.
CVE-2015-7603 METASPLOIT ruby WORKING POC
Konica Minolta FTP Utility 1.0 - Path Traversal
Directory traversal vulnerability in Konica Minolta FTP Utility 1.0 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in a RETR command.
CVE-2015-5958 METASPLOIT HIGH ruby WORKING POC
phpFileManager 0.9.8 - Command Injection
phpFileManager 0.9.8 allows remote attackers to execute arbitrary commands via a crafted URL.
CVSS 8.8
CVE-1999-1510 METASPLOIT ruby WORKING POC
Bisonware FTP Server < 4.1 - Buffer Overflow
Buffer overflows in Bisonware FTP server prior to 4.1 allow remote attackers to cause a denial of service, and possibly execute arbitrary commands, via long (1) USER, (2) LIST, or (3) CWD commands.
CVE-2013-4730 METASPLOIT ruby WORKING POC
PCMan's FTP Server 2.0.7 - RCE
Buffer overflow in PCMan's FTP Server 2.0.7 allows remote attackers to execute arbitrary code via a long string in a USER command.
EIP-2026-119027 EXPLOITDB python WORKING POC
PCMan FTP Server 2.0.7 - 'PUT' Remote Buffer Overflow
CVE-2015-7601 EXPLOITDB python WORKING POC
PCMan's FTP Server <2.0.7 - Path Traversal
Directory traversal vulnerability in PCMan's FTP Server 2.0.7 allows remote attackers to read arbitrary files via a ..// (dot dot double slash) in a RETR command.
EIP-2026-119020 EXPLOITDB ruby WORKING POC
PCMan FTP Server - 'PUT' Buffer Overflow (Metasploit)
CVE-2015-7602 EXPLOITDB python WORKING POC
BisonWare BisonFTP <3.5 - Path Traversal
Directory traversal vulnerability in BisonWare BisonFTP 3.5 allows remote attackers to read arbitrary files via a ../ (dot dot slash) in a RETR command.
EIP-2026-104761 EXPLOITDB ruby WORKING POC
phpFileManager 0.9.8 - Remote Code Execution (Metasploit)
EIP-2026-104750 EXPLOITDB ruby WORKING POC
Phoenix Exploit Kit - Remote Code Execution (Metasploit)
EIP-2026-104751 EXPLOITDB ruby WORKING POC
Phoenix Exploit Kit - Remote Code Execution (Metasploit)
EIP-2026-104757 EXPLOITDB ruby WORKING POC
PHP IRC Bot pbot - 'eval()' Remote Code Execution (Metasploit)
EIP-2026-104759 EXPLOITDB ruby WORKING POC
PHP Utility Belt - Remote Code Execution (Metasploit)
EIP-2026-104782 EXPLOITDB ruby WORKING POC
Th3 MMA - 'mma.php' Backdoor Arbitrary File Upload (Metasploit)
EIP-2026-103964 EXPLOITDB python WORKING POC
Legend Perl IRC Bot - Remote Code Execution
EIP-2026-104139 EXPLOITDB ruby WORKING POC
Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit)
EIP-2026-104138 EXPLOITDB ruby WORKING POC
Zemra Botnet (C2 Web Panel) - Remote Code Execution (Metasploit)
EIP-2026-104135 EXPLOITDB ruby WORKING POC
Xdh / LinuxNet Perlbot / fBot IRC Bot - Remote Code Execution (Metasploit)
EIP-2026-104134 EXPLOITDB ruby WORKING POC
Xdh / LinuxNet Perlbot / fBot IRC Bot - Remote Code Execution (Metasploit)
EIP-2026-104124 EXPLOITDB python WORKING POC
w3tw0rk / Pitbull Perl IRC Bot - Remote Code Execution
EIP-2026-104123 EXPLOITDB ruby WORKING POC
w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit)