VLC Media Player versions 1.0.6 and below malformed media file crash proof of concept exploit.
13eb800a5cff5f157625c8d40d9606d5cda09def8324cf78fe127877e1d9a087
Open and Compact FTP Server version 1.2 universal pre-auth denial of service exploit.
684440a1375687cbbed6a34317a123196df83653b157c3498e09d81c91f2b0de
Zervit Web Server version 0.4 suffers from directory traversal vulnerabilities.
412f5bd324eda0957fd5a0e89ee6bacf545e251ff2eace1b61f5f221fde95db0
Zervit Web Server version 0.4 suffers from a source disclosure vulnerability.
6c805cb1027e40126e41e44719826c6fd8ba45f40b1b10441a9ae7155c02d7d2
Miniwebsvr version 0.0.10 suffers from a directory traversal vulnerability.
052a9e83d6d12c884693267a9e95733ea1c72e8fcbe5a5c85ef306156d415d62
This Metasploit module exploits a stack buffer overflow in versions v9.7 through v10.5 of IDEAL Administration and versions 4.5 and 4.51 of IDEAL Migration. All versions are suspected to be vulnerable. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code. NOTE: IDEAL Administration 10.5 is compiled with /SafeSEH
d487bf3a03cfdebd126e3b50fa65fc5bba22a39f6bc020af9d9f9429f2ff2e0c
This archive has forkbomb and unicode denial of service exploits for Firefox, Safari and various other browsers.
d9ed2cfda73d2c61b805add17e330491e74f3e95546a9bbe9df37bcf7e566cae
Safari version 4.0.5 Webkit blink tag stack exhaustion denial of service exploit.
3e012fa8c43470acb5ff285669c7a6cf64e74cc2ede2ed3538ac37fd50de1cef
IDEAL Migration 2009 version 4.5.1 local buffer overflow exploit.
3ad16b9660a81f545aa5212271ce5fafa81cf35afd9115c760c9d37598259ab4
IDEAL Administration 2010 version 10.2 local buffer overflow exploit.
c7613355ca5b9ab05ba984dd8f0f7e2ca0f6b6b8242c04dcf00805175b4c0521
Acritum Femitter version 1.03 suffers from a directory traversal vulnerability.
cb8dab774dbd16f5f21e1e46e39fcc8cdcd435b629137c0a322feb43385199b1
Mongoose web server version 2.8 suffers from directory traversal vulnerabilities.
c06c9b8a1ab7b64e816927760a9223bd4869afbcc92a31ce1a6fbea862d0a4db
MultiThreaded HTTP Server version 1.1 suffers from a remote source disclosure vulnerability.
987bf6b3565122edfa3d483af245ea664523df3e3e0ad0363fc9b0178c19cb29
This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.
03aa5d1fb353fd0b0a186d111853941e220644c617f4997fc853286c33067088
This Metasploit module exploits a stack overflow in IDEAL Administration v9.7. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.
671e32b58eafc179c66a2c75065bd9266308aadcc36d69ae7c4a2f035130544f
This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message.
215303af9fa1743f8f050624ab0a364dc6fdc4218fbee1b68806a9c6c18c6bd6
Proof of concept exploit for the VLC Media Player version 1.0.3 smb:// URI handling stack overflow vulnerability.
767d6f43bcd9f36c30425b5d2d15526afe7544a53c9dce0e06e4c05f44f0ea28
Local buffer overflow exploit for IDEAL Administration 2009 version 9.7 that creates a malicious .ipj file that binds a shell to port 4444.
9f5c5dcba2f81bff55ee61949db3938b13ef630dc6841b4c30fc4c4acb7ae863
This exploits a stack overflow in the BigAnt Messaging Service, part of the BigAnt Server product suite. This Metasploit module was tested successfully against version 2.50 SP1.
a6efaa655fbca2207d1e6a66a1c5c9d6fb68fe09f3765724c03c9f340169fcf3
Cherokee versions 0.5.4 and below suffer from a directory traversal vulnerability.
e98d286121b0854950d5c8ad20255bbe19675d7c7fec7efd3126c5b4d9d701fe
Boloto Media Player version 1.0.0.9 local crash proof of concept exploit that creates a malicious .pls file.
6a901ac053ed7ae3865f920867a1003d0f4fc947a6b68e9f1e75e6868ce4b8e1
xp-AntiSpy versions 3.9.7-4 and below local buffer overflow exploit that creates a malicious .xpas file.
fb7c0d38c62756cc07427f4f9cc68a113bb21c52a93dcd03c74d4ea5f5190bc2
GPG4Win GNU Privacy Assistant proof of concept crash exploit.
f45b73a43afd05c08a9cdd42903ee4e5aeef56c90200b4f4a4cff7479f86bd21
Mongoose Web Server versions 2.8.0 and below suffer from a remote source disclosure vulnerability.
de42bbe8b5418e0b3955394314e14cebeac3228c3c1732eff9a9fa188d93929a
GPG2/Kleopatra version 2.0.11 malformed certificate proof of concept crash exploit.
8fdf127e1bcf4e8fc3661e1905b9d258ed04c182e4640baf933708d72da5780a