Remote buffer overflow exploit for Kmail, a mail client for KDE. Tested against kmail v1.0.29 and v1.0.20.
f55166711a0a151507c36c9ae5b1a55081ad5bbd687b9780e99dbcb0964c7668
This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x4c (PROXY_CMD_PREBOOT_TASK_INFO2) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 / SP3 and Windows Server 2003 SP2 (DEP bypass).
eb8d23c0d1251c7dcb0480044c6de8f7f8d9c2d7e8de5b4a78afffe09b659c78
This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x6c (PROXY_CMD_GET_NEXT_STEP) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 / SP3 and Windows Server 2003 SP2 (DEP bypass).
7d25707a364b6e8cc80a0819d82a572cf3f8dd0815e6c1b374eaa52379c9f479
SimpleWebServer version 2.2-rc2 remote buffer overflow exploit that achieves code execution.
d479bd8f4fea4bdf5c0972e056189d54814dde491f87ef49ea5a3093231a8ef1
This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management 10 SP2. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x06 (PROXY_CMD_CLEAR_WS) to the 998/TCP port. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 and Windows Server 2003 SP2 (DEP bypass).
d8e51661349a2d58c55ebba98e0aab7bf40252bcd11e9570670dbb09e98a4244
This Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management 10 SP2. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x21 (PROXY_CMD_FTP_FILE) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 and Windows Server 2003 SP2 (DEP bypass).
10965ccc1d7f3bdfb1cdc1edf6199b5eb01250bbec68ab0ee4cf54ba20262a61
This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020006 (GetObjetsRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.
e3c0a6f5b3a3f26ed4fb9bebaf9f0c8831cc32e99feb9f9583bae8d17e4829c2
This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.
95742b6130c01a360fcb07725b756b00b4f683ebbfffb07615e116c0dbccde5f
This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020004 (GetBootRecordRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.
48a0910b2afcd24f3d4c665d8c997a2e0fe577dffb6bca3c0ecace91c10b120f
MailMax versions 4.6 and below POP3 USER remote buffer overflow exploit.
14b8a1f5446fbce8f0033455b422da494838ebd8f710bfefe2e225cd86bde3c9
The TRENDnet SecurView TV-IP121WN wireless internet camera UltraMJCam active-x control suffers from an OpenFileDlg() WideCharToMultiByte remote buffer overflow. Proof of concept code included.
a1448bcd0d8740d3db37283f486bc15f2158a7b7818ccafbfc0569b5d3cb8984
Ricoh DC Software DL-10 FTP server (SR10.exe) versions 1.1.0.6 and below remote buffer overflow proof of concept exploit that sends a malformed request.
e13e1ecd389948511c8683234485d24ca0d9825e618486eaf3a184e64db4cf90
The Dell Webcam software bundled active-x control CrazyTalk4Native.dll suffers from a remote buffer overflow vulnerability.
4602832995fbcf6a2ccdc7e3b461f2c912eb866acd281ca2f1041eff63882cc0
This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet to the 6905/UDP port. The module has been successfully tested on Windows Server 2003 SP2, Windows 7, and Windows XP SP3.
5d732951640be5f0d7a3bbb2123ba314dbfea24dfb6b7fe3d4aa47cf4fcea31a
CoDeSys SCADA version 2.3 remote buffer overflow exploit that spawns a shell on port 4444.
246e63e61f456255caf013a451fa1ec3a7bfd1fcb05a38899d181f2bf21a75d4
Wireshark versions 1.4.4 and below DECT dissector remote buffer overflow exploit.
91fcc95ca27f4ef01b2a8297dc35149955807464bfbe20fa97d69586760f6ff2
AbsoluteFTP versions 1.9.6 through 2.2.10 remote buffer overflow exploit that leverages LIST.
872f01e2a854cf7a032dcfdef483fd45566641df3e165e3e32f59442959ff147
AmmSoft's ScriptFTP client is susceptible to a remote buffer overflow vulnerability that is triggered when processing a sufficiently long filename during a FTP LIST command resulting in overwriting the exception handler. Social engineering of executing a specially crafted ftp file by double click will result in connecting to our malicious server and perform arbitrary code execution which allows the attacker to gain the same rights as the user running ScriptFTP.
83a230051d7cd6708a4d86afbe83ebbe437a5ab42fac5587f0c6034133b2f3f5
KnFTP server version 1.0.0 remote buffer overflow exploit that leverages the USER command.
ad1af12d60d187a995b54043229d49d25f922fbb2e08bf4d92ad939e4049bace
This Metasploit module exploits a remote buffer overflow in Bison FTP Server version 3.5. It leverages the XMKD, MKD, REST, and ACCL commands to cause a denial of service.
fd0d9f5b757bdeb86dbd65362248c57c98b61dddd1e7dd0d3a0594dc8339ff84
BisonFTP server version 3.5 MKD remote buffer overflow crash exploit.
6157ac1b4d0108188bcfac3f9ccdadb47a302240c656b2fa5c72bfb65f934e09
Cerberus FTP Server version 4.0.9.8 REST remote buffer overflow crash exploit.
4ffb43902001c39a48c6ed0bb68c9a86be4f2acf228608af5c8b5dfb4e6c2a2d
Simple HTTPd version 1.42 PUT request remote buffer overflow exploit.
0252f9817102dd7dc326bcc8709a4f571708533f062b11b61019aeedce1db410
EChat Server versions 2.5 and below remote buffer overflow exploit.
5a3c92e65db932fc1ae8d33b82dcd54b99f4007305f90ef654948d67cc16f572
BisonFTP Server version 3.5 and below remote buffer overflow exploit that binds a shell to port 4444.
1a88851fa0310e4f3e25543a4517d18bd038aecacb30feaebe7528df23dfe67b
HP Data Protector version 6.11 remote buffer overflow exploit with DEP bypass.
9e8e5a84de486e78b0670c124724bc4754ef8447902faec7f282f582cbf86f0c