Real Name | Jeremy Brown |
---|---|
Email address | private |
Website | www.patchtuesday.org |
First Active | 2008-07-15 |
Last Active | 2022-09-05 |
This Metasploit module exploits a stack overflow in gAlan 0.2.1. By creating a specially crafted galan file, an attacker may be able to execute arbitrary code.
2e0713dab708cb8928f5ff1281dd21157fc4f28fefbc51535925ce25b30b52e8
This small perl script is a generic random remote fuzzer.
f4bddba1bc5967ea0646d047d5e4b798651d79d68b89137957542fd3a0fcb94b
Mozilla Codesighs proof of concept memory corruption exploit.
ac84817c4dfc7ef08ccd8e283fbe5ef0d20f14b66c2ebc672172c6dda236941d
This Metasploit module exploits a stack overflow in gAlan 0.2.1 By creating a specially crafted galan file, an an attacker may be able to execute arbitrary code.
84833b79cf2cab4f019e6973600309cc45a88235936500d449effe956f3c1c72
gAlan buffer overflow 0-day exploit. Spawns a shell on port 4444.
529fd011b70918966b4dc24d3212e6178ad12b168b2838b27dcd31f6bfb1cc5a
Polipo version 1.0.4 remote memory corruption 0-day proof of concept exploit.
f0c3f97fb8cde0a5a5185ce0a01dc58d0b7e14232087ec8b44d18608edf9a268
Safari version 4.0.3 (Win32) XSS remote denial of service exploit.
a7d9ba59f478e5a36cfe543be10d0937974a736f8df9367cba150bfafe28c98d
Mozilla Firefox version 3.5.3 local download manager exploit that demonstrates a temporary file creation vulnerability.
c57f747c188be90e736885f8d76cc1b16b4e1cbbc6eee9473f672dc486c86f84
Geany version 0.18 local file overwrite exploit.
a7a3082a458cb9a5407ee29030388b9fd81db7ce126fa8d2139b4e3d1b97f6f9
Sun Solaris 10 RPC dmispd remote resource consumption exploit.
68846ee95a74c6a2bd7ec27d0f12f6f7ff11db7b031d8801eb567b3017bd745d
4f is the file format fuzzing framework.
008ec7e8c205931119fd3a3bc5f03ef58d628982adc30a9530caaae62cf58313
GemStone/S version 6.3.1 "stoned" local buffer overflow exploit.
70a8894cf0f23bf12c6a2ed163f1ec19b33051065ee557a0b635c9597e99dcb2
Safari version 3.2.3 (Win32) javascript eval remote denial of service exploit.
490f06e5338cab63bd2928a68a3a9a7ef5222f8bb66d7a05072d30d8bd887906
Ipswitch WS_FTP version 12 Professional remote format string proof of concept exploit.
3d28fc88846ed7542b1710374f7dfada1afc361ac468aa6af106cbda82a5da35
Adobe Acrobat version 9.1.2 NOS local privilege escalation exploit.
c5e8e232d6334990e5e9405b8fa2fbb77b058ca324c79bc5d4cfcd3cc1081e24
GrabIt version 1.7.2x NZB DTD reference buffer overflow exploit.
6194460d5210dafaad1533b705fb4449d43f9bc1f6d292929c0c1fadd26b0de3
Hzzp is a HTTP compliant client and server fuzzer. Hzzp's main features include HTTP response and request fuzzing, authentication fuzzing, query parameter fuzzing, and automatic or manual exploit generation.
7407b05d1cf6bb1faff9f84cb8b6c90807c711fc7d4cb78481ca10533173aeea
POP Peeper version 3.4.0.0 remote buffer overflow exploit that spawns a shell on port 55555.
d4d795143ee698dc9b46c6db354f2aa5ed011e378b2491fa94d64a0770125d31
POP Peeper version 3.4.0.0 is vulnerable to a remote buffer overflow vulnerability. This vulnerability is exploitable on the client side. A vulnerable POP Peeper user must connect to an exploitation server and retrieve mail to be affected.
7e864726d86e126383c7e331e2a51f140bb51683dad50c8f9835cb3ffb508365
POP Peeper version 3.4.0.0 UIDL command remote buffer overflow SEH overwrite exploit that spawns a win32 bindshell on port 55555.
5e1096ecb0bce0b064f117ba74b2a5a09ddcb5529a2b555bff5980f790a314d9
POP Peeper version 3.4.0.0 suffers from an UIDL command related remote buffer overflow vulnerability in the client.
1e2bca809abe96062727e81100e29a2caa524e9c2a45aa5c22fef4d479395bb4
fzem is a MUA (mail user agent) fuzzer that fuzzes MAIL/MIME email headers as well as how clients handle SMTP, POP and IMAP responses.
599f60cea508535311603dca6768627d03bd9bcd767d3a2b1e4e869a9ece418a
Whitepaper called Fuzzing for Fun and Profit.
768dd0043af9a050054a164285b92b9a735df2f08c479aa9062253d8d6558d37
Browser Fuzzer 2 (bf2) is a comprehensive web browser fuzzer that fuzzes CSS, DOM, HTML and JavaScript.
9c0853e1720bef8ed4d5727782ddb76c3ffde6981e51439d0fe5e1c930239e27
Novell Netware 6.5 ICEbrowser remote system denial of service exploit.
8cf6e163511ddc9bbab87eac58691a40950d62e487f361ad82a515f5293e5aa7