eXtremail versions 2.1.1 and below memmove() remote denial of service exploit.
f4094ce32bf8bf156e5f7fb5b9e60ba7cc9b4c382d687f88d69592c6297e5f71
iDefense Security Advisory 09.25.07 - Local exploitation of an information disclosure vulnerability within the ALSA driver included in the Linux Kernel allows attackers to obtain sensitive information from kernel memory. iDefense has confirmed the existence of this vulnerability in version 2.6.22.1 of the Linux Kernel as installed with Fedora CORE 7. It is suspected that other versions are also vulnerable.
949399f1ef56b7cf5b001af2d386dd168ad4fea165fb77e0c740cb6214ea3165
SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.
3924cdfbf8c1a779b860432690b7cdfb61b87f7a8674b3c78b9a7593e21c3ed8
iDefense Security Advisory 08.07.07 - Remote exploitation of a heap overflow vulnerability in Apple Inc.'s mDNSResponder application may allow attackers to execute arbitrary code with root privileges. The vulnerability exists within the Legacy NAT Traversal code. Unlike the core of the mDNSResponder service, this area of code does not rely on Multicast UDP. It listens on a dynamically allocated Unicast UDP port. The vulnerability occurs when parsing a malformed HTTP request. This results in an exploitable heap overflow. iDefense has confirmed the existence of this vulnerability in Mac OS X version 10.4.10, Server and Workstation, with mDNSResponder version 108.5. Previous versions may also be affected.
6d4ffd82d1feb8bfe7a7063ef0cd7c374ce49e3b42b3308f79af1c4ab79d31a6
ImgSvr suffers from a stack overflow vulnerability.
565d22b95eca8b9f9bc666c22a941d4f22918caf966cb2431c62ee0ee7aa6b51
Proof of concept remote denial of service exploit for IPSecDrv.sys as shipped with SafeNET High Assurance Remote and SoftRemote versions 10.4.0.12.
8aa31e8ee4e11197125926ddeb59def52feef1797f372b0f920e2f3c2fb1376f
Remote heap smash exploit for mydns versions 1.1.0 and below.
383a86d6237fe7faea74e4c4c213c937a4a013765674bbfca4a5f4d139f8f3c7
SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.
10725e496d28dfd91563bb7385d6f82ad8526ac050bf4626f0fea222130bfb8b
SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.
47dc879fed164cbb41bec07d33de62faf97d964d92278bce0fa318c910ca12ac
Proof of concept exploit that exploit a trivial stack smash in the DNS parsing code of eXtremail versions 2.1.1 and below.
377dfe1d034e0ecff74ebda7b7ee1723d5be49dac5587f16ca0d6a9994ca2d85
raw-socket ICMP/checksum shell shellcode that is 235 bytes in size.
8f0bcd2b244d7627399086ddb072b42bb32cc90ecf2fa10c877287dcbea6e040
Remote exploit for dproxy versions 0.5 and below. Binds a shell to TCP port 4444.
71d56c60f1e232a94229b71556636b01433745ed2ae92d6b6761ae4dc0da6e6e
Mercur IMAPD exploit that makes use of several bugs in the NTLM implementation. It gives the attacker complete control over a memcpy to a stack variable and the outcome is a denial of service (crash).
84fc3e80797cb6515674112ded1476d513c92ca06b47bff1373db7fed2520cff
Proof of concept denial of service exploit for Mercury/32 version 4.01b IMAPD.
169fd76ee25ab133f610474bc1dcbf4564b17c8c7e4a1c34770b7a4568a52f81
Mail Enable Professional/Enterprise version 2.32 through 2.34 (Win32) remote exploit. Binds a shell to port 1337.
d6aed800fc5e11948e268ef3396c66fbfe126cef44542ce029e6669cd269b2d2
Mail Enable Professional versions 2.35 and below remote exploit. Binds a shell to port 1337.
e0d2bc41213f8df344b05c9e1cb7d29e08fa9991918f5ed0988151e5dba195bf
Mail Enable Professional/Enterprise version 2.32 through 2.34 remote exploit. Binds a shell to port 1337.
1f224f2f0cc7562a879bfed65a13fe325aac84ab7363a3445e180ebe169dab82
MailEnable Pro/Enterprise version 2.37 proof of concept exploit that makes use of an out of bounds memory read in the NTLM authentication routines.
8232149536e1a3a79572b4f8e18e033b75359eb3dae51b2236c5f1c0d6873713
MailEnable Pro/Enterprise versions below 2.351 proof of concept exploit that makes use of an out of bounds memory read in the NTLM authentication routines.
0eb226440d272dd7b50d84b1d0e45df785d10d57377fc564492aed8c271a5494
Denial of service exploit for Axigen versions 1.2.6 through 2.0.0b1 that makes use of a null pointer dereference.
1d8be3302c6c9a9cc327d00d2e6d2ec7097b1733bf7f7f3503ff13a353bc816c
Denial of service exploit for Axigen versions 1.2.6 through 2.0.0b1 that makes use of a single byte underflow.
42ff42379c36a0bbddfe70130572a6733ddb019470627586b6cd3e50f47378e2