Myo Soe

7 exploits Active since May 2005
CVE-2009-2521 METASPLOIT ruby WORKING POC
Microsoft IIS 5.0-7.0 - DoS
Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
CVE-2005-0575 EXPLOITDB ruby WORKING POC
Stormy Studios Knet - Buffer Overflow
Buffer overflow in Stormy Studios Knet 1.04c and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP GET request.
EIP-2026-116249 EXPLOITDB ruby WORKING POC
SmallFTPd 1.0.3 - Denial of Service
EIP-2026-116643 EXPLOITDB python WORKING POC
zFTPServer - 'cwd/stat' Remote Denial of Service
CVE-2009-2521 EXPLOITDB ruby WORKING POC
Microsoft IIS 5.0-7.0 - DoS
Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
CVE-2010-4107 EXPLOITDB ruby WORKING POC
HP 9000 - Path Traversal
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack.
CVE-2010-4107 EXPLOITDB ruby WORKING POC
HP 9000 - Path Traversal
The default configuration of the PJL Access value in the File System External Access settings on HP LaserJet MFP printers, Color LaserJet MFP printers, and LaserJet 4100, 4200, 4300, 5100, 8150, and 9000 printers enables PJL commands that use the device's filesystem, which allows remote attackers to read arbitrary files via a command inside a print job, as demonstrated by a directory traversal attack.