This Metasploit module exploits a buffer overflow in Apple QuickTime 7.6.6. When processing a malformed SMIL uri, a stack-based buffer overflow can occur when logging an error message.
eb6f5cf465624dd5e4de136d92a011d658eff5c54e74834f9b55ac758fdc68b2
Apple Safari version 4.0.5 parent.close() memory corruption code execution exploit.
ec04bbdd890c422fd0bf99cfa6580ba3c2940087c9f7ba1dbbb3e82ee2f42968
FlashGet version 1.9 FTP PWD Response remote proof of concept buffer overflow exploit.
4717be597074ab3666f0b2540eefa529deec56009bc49551b3a090ceed9c8bd3
Download Accelerator Plus (DAP) version 8.x local buffer overflow exploit that creates a malicious .m3u file. Spawns calc.exe.
6f546dc00e082a471c7ae2f75f1191a548b07ff1fb9cb103ca056da71d1971e6
CA BrightStor ARCserve Backup version r11.5 ActiveX remote buffer overflow exploit.
686426ea3916584ba4cadfae8aaf21ecc6342864c5ae1657f6404f85c6eaeb16
Yahoo! Music Jukebox version 2.2 AddImage() ActiveX buffer overflow exploit.
6947ffae23313b8e716a14e1e54d557674e4e5851ab0b5fd48aae788c8abe89e
Yahoo! Music Jukebox version 2.2 AddImage() ActiveX buffer overflow exploit.
df37882abb85f6ce73587340034ce330e71fcebeb93beb8807a3f219f98866ff
Comodo AntiVirus version 2.0 ExecuteStr() remote command execution exploit.
860eaa5b7ca93f42fedbecfe93bbdec266a10c29dab3d1d52b87859defc21004
Apple QuickTime versions 7.2 and 7.3 RTSP response remote SEH overwrite proof of concept exploit.
1abb1003c68a86a94d9fd143e56f2c034b7307792175cfce74fc912a96b3ba15
jetAudio version 7.x local SEH overwrite exploit that uses a malformed .m3u file.
9cbbf505e4562de3e43a9ccb55cfb1cecdd917e362c69a59686131211ab1b251
Xitami Web Server version 2.5 remote buffer overflow exploit that spawns calc.exe.
60660998d133283bc88a1ec5a304f2ebfe9239ed5de4ef86b8b7f70b2f86b6e5
jetAudio version 7.x ActiveX code execution exploit that makes use of DownloadFromMusicStore().
5625d7033969e6c0c3e5ba1813662b2381af214cef565714cce7e8a9033a88cd
Micrsoft DXMedia SDK6 "SourceUrl" ActiveX remote code execution exploit.
8440922a3a5e7b87aaf529b1f60ac8a8c3362ddc802ba0be6e2692afabf1b754
ViRC version 2.0 JOIN response remote SEH overwrite exploit. Tested on Visual IRC 2.0 / 2k SP4 Polish. Executes calc.exe.
c6782288f12a3ccf5a191e0a8e8953d94108243ace96aad60878b3fe1aadaddc
Eudora version 7.1.0.9 (IMAP FLAGS) remote SEH overwrite exploit that executes calc.exe.
c484749017d563fcc11f7881719d8778f52e3cf736979fc61598546693928422
Eudora version 7.1 SMTP ResponseRemote remote buffer overflow exploit that spawns calc.exe.
dee4298443c6b9d9f415fc207a19503a11daee971e419b00b9f6a8fd6f8c4484
WFTPD server version 3.23 (SIZE) remote buffer overflow exploit.
7914ac75638a3567f909d4690b5f4cdaefdeaf62139121344bbc3778b0a2c588
Easy File Sharing ftp server version 2.0 remote proof of concept exploit.
600f9e36332033b9a64f2b63f27cdda2ed523db9b876baee3ee689a3652e8f64
CesarFTP 0.99g (MKD) remote buffer overflow exploit written in Python.
7d60c0f56642df3ce5a9064c2b901c45ffd58da4a1221862f3b9e8cda35ff116