This Metasploit module exploits a stack overflow in the RPCSS service, this vulnerability was originally found by the Last Stage of Delirium research group and has bee widely exploited ever since. This Metasploit module can exploit the English versions of Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 all in one request :)
6b1062b85247570ddb5362e034cb6be3d1be2f14dd236970e3ab1f279909588d
This Metasploit module exploits a stack overflow in the Windows Plug and Play service. This vulnerability can be exploited on Windows 2000 without a valid user account. Since the PnP service runs inside the service.exe process, a failed exploit attempt will cause the system to automatically reboot.
2d54b358ebb862c805c0f268e705e13f7bd6770f841069a133a28f5e460b2a4a
This Metasploit module exploits an arbitrary code execution flaw discovered in many implementations of the PHP XML-RPC module. This flaw is exploitable through a number of PHP web applications, including but not limited to Drupal, Wordpress, Postnuke, and TikiWiki.
74661987981d6b9dcef06ec55c6a9cc16d40945f635c122f6a84bdf7a7d57158
This Metasploit module uses a buffer overflow in the Solaris 'login' application to bypass authentication in the telnet daemon.
1922fca1702919a985e0d03cd6e813a1ab64a1125cad7362097ca409173defa5
This exploit targets a weakness in the default security settings of the sadmind RPC application. This server is installed and enabled by default on most versions of the Solaris operating system. Vulnerable systems include solaris 2.7, 8, and 9.
14557b273499a2ea3ee86d39d208d2b582a750cf286e96ff62c3dd367eac0d64