NA

CVE-2014-2973

Published: 15/12/2014 Updated: 07/11/2023

Vulnerability Summary

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-5753. Reason: This candidate is a duplicate of CVE-2008-5753. Notes: All CVE users should reference CVE-2008-5753 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

Exploits

#!/usr/bin/env ruby # Exploit Title: BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit # Date: Dec 03 2014 # Vulnerability Discovery: Gabor Seljan # Exploit Author: Muhamad Fadzil Ramli <mind1355[at]gmailcom> # Software Link: wwwbpftpcom/ # Version: 201075076 # Tested on: Microsoft Windows XP SP3 EN [Version 512600] # ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::Seh include Msf::Exploit::Remote::Egghunter def init ...
# !/usr/bin/python #-----------------------------------------------------------------------------# # Exploit Title: BulletProof FTP Client 2010 - Buffer Overflow (SEH) Exploit # # Date: Sep 05 2014 # # Vulnerability Discovery: Gabor Seljan # # Exploit Author: Robert Kugler ...
#-----------------------------------------------------------------------------# # Exploit Title: BulletProof FTP Client 2010 - Buffer Overflow (SEH) # # Date: Jul 24 2014 # # Exploit Author: Gabor Seljan # # Software Link: wwwbp ...
BulletProof FTP Client 2010 SEH buffer overflow exploit that affects version 201075076 ...
BulletProof FTP Client 2010 suffers from a buffer overflow vulnerability ...
BulletProof FTP Client 2010 version 201075076 SEH buffer overflow exploit ...