Windows SMB client transaction response handling exploit that makes use of the flaw detailed in MS05-011.
0d73d261923b7c90d3028e70fa51daeba2ea05e4b77fb7d0913e15847c1ae886
dSMTP mail server 3.1b remote root format string exploit for Linux.
dd4b912374c3f0fedacd68fc1cea62e25d243f0cd555476433f0c0a635fbfcc0
Snmppd SNMP proxy daemon remote format string exploit.
a59f719d411e2b47c1b0cd94bbac6bf6c051fa296c069a11618bf75cc8b40c53
MySQL MaxDB Webtool versions 7.5.00.23 and below remote stack overflow exploit.
79152d4a215596166a7683269d0c401109535504c0a7cc3d9cad939aa193eea7
Yager versions 5.24 and below remote buffer overflow exploit.
f086943e339503dbdf9f853d84fa577a5100c41b36ba00bd1b9d7d0255f0f576
Remote exploit for GoodTech Telnet server versions below 5.0.7. This exploit can spawn a bindshell or launch a reverse shell.
589775b96701523a09ebbc413fcde21a03c4bcb8b334a15046465788ed9e1f10
BrightStor ARCserve Backup buffer overflow proof of concept exploit.
7d0b4a2e24e12ce44e33a8962a865ecfdab582d552df7e09621a2b9dfe423cca
Newspost socket_getline() remote buffer overflow exploit.
a6081f4aa3eed364766ff408136678d080d915d86e1294344825ed9ec87208cc
Crystal FTP Pro version 2.8 proof of concept exploit that makes use of a flaw in the LIST command.
4a3b769ce8d639a9f78c05375fe98f0d71d16ee20d7c6cbe15b1feec1bbd0ef7