zombiefx

10 exploits Active since Apr 2010
CVE-2010-20122 EXPLOITDB CRITICAL ruby WORKING POC
Xftp FTP Client <3.0 (build 0238) - Buffer Overflow
Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
CVE-2010-20122 EXPLOITDB CRITICAL perl WORKING POC
Xftp FTP Client <3.0 (build 0238) - Buffer Overflow
Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
CVE-2010-20122 METASPLOIT CRITICAL ruby WORKING POC
Xftp FTP Client <3.0 (build 0238) - Buffer Overflow
Xftp FTP Client version up to and including 3.0 (build 0238) contain a stack-based buffer overflow vulnerability triggered by a maliciously crafted PWD response from an FTP server. When the client connects to a server and receives an overly long directory string in response to the PWD command, the client fails to properly validate the length of the input before copying it into a fixed-size buffer. This results in memory corruption and allows remote attackers to execute arbitrary code on the client system.
CVE-2010-1465 METASPLOIT ruby WORKING POC
Trellian FTP Client <3.1.3.1789 - Buffer Overflow
Stack-based buffer overflow in Trellian FTP client 3.01, including 3.1.3.1789, allows remote attackers to execute arbitrary code via a long PASV response.
CVE-2010-1465 EXPLOITDB ruby WORKING POC
Trellian FTP Client <3.1.3.1789 - Buffer Overflow
Stack-based buffer overflow in Trellian FTP client 3.01, including 3.1.3.1789, allows remote attackers to execute arbitrary code via a long PASV response.
EIP-2026-119096 EXPLOITDB perl WORKING POC
Rumba FTP Client 4.2 - PASV Buffer Overflow (SEH)
CVE-2010-1465 EXPLOITDB perl WORKING POC
Trellian FTP Client <3.1.3.1789 - Buffer Overflow
Stack-based buffer overflow in Trellian FTP client 3.01, including 3.1.3.1789, allows remote attackers to execute arbitrary code via a long PASV response.
EIP-2026-118383 EXPLOITDB text WORKING POC
CompleteFTP Server - Directory Traversal
EIP-2026-116670 EXPLOITDB perl WORKING POC
μTorrent (uTorrent) WebUI 0.370 - Authorisation Header Denial of Service
EIP-2026-100915 EXPLOITDB perl WORKING POC
Trouble Ticket Express 3.01 - Remote Code Execution / Directory Traversal