IP2location.dll version 1.0.0.1 Initialize() local buffer overflow exploit.
33f5164ba978a0a1ae70ea5cf41e897b2b8c0d0abe3551ced804b41f635644d1
Rumba FTP Client FTPSFtp.dll version 4.2.0.0 OpenSession() buffer overflow exploit.
f8a80836fe03f35d036b720361ba68e13b24d7e5ae21a74cf06225fe8ccd90cb
Ziepod+ version 1.0 suffers from a cross application scripting vulnerability.
a14d376ffddf95b38d50cfdf952caf4f248dd106846d1b1748a963fdd02366d0
Ipswitch IMail server version 11.01 suffers from a reversible encryption vulnerability.
7b1ac88e4630f7a30de7d379397fdad972c1d75f101b4c7dcd55c49f6971fe39
Quick Player version 1.2 unicode buffer overflow exploit that binds a shell to port 4444 and creates a malicious .m3u file.
7120085cc61ac70aaf8d24d3adad38493fe40ea9658348cf64895d4cb0027c15
This shellcode creates a XP firewall rule to allow TCP traffic on port 445.
14707ba4c824ba767bf2f82c4923851e0a0d2118c5edf7ea3f5705c2de5cf5d8
This shellcode will attempt to delete the Zone.Identifier ADS and then runs the file using the ShellExecuteA function.
7c5c86d8a1260728dd1fb1099f979199962e2487372f6851fa49aa70d4606fca
HP NNM version 7.53 ovalarm.exe CGI pre-authentication remote buffer overflow exploit.
c3254e5bce844de2beae7b43c17e8ca6a8e7cc2e902e7f875b73fd47ddbfe34d