Remote buffer overflow exploit for Kmail, a mail client for KDE. Tested against kmail v1.0.29 and v1.0.20.
f55166711a0a151507c36c9ae5b1a55081ad5bbd687b9780e99dbcb0964c7668
I.D. Manager version 6.06 Build 8 remote buffer overflow exploit that leverages downlWithIDM.dll.
b921a47093a2c25825d08f97806b95790aa8ee0121cb97d7e587f6ccaf2a11fa
iMesh versions 10.0 and below remote buffer overflow exploit that leverages IMWebControl.dll.
b530a56a39adab0c7ccef51e41336d51d4fe9c3fd005927036486c4e2a7c6be0
ActFax Server FTP post authentication remote buffer overflow exploit.
4be2f3a68350281866ccffc27102dc7ca96ae58300eeb928a65f39b7f23e1fea
Xitami Web Server version 2.5b4 remote buffer overflow exploit with egghunter shellcode.
73db261ddf9325903ce5ef0bdf12b3e24b054fe1f3131430c8e164a3ee276687
Xitami Web Server version 2.5b4 remote buffer overflow exploit that spawns a shell.
d74f1c9cc0694320046e368dd4c524292f1aa8c23e024ab073a7ec3cae132bc9
Poison Ivy version 2.3.2 remote buffer overflow exploit.
5b3216c88aa8ecb57dc333701bd9328faa889c21e0e43688f483d216b3c65eea
ActFax Server LPD/LPR remote buffer overflow exploit that binds a shell to port 4444.
2ebd17d945bc423b321135f0783c3876ec973dd144c78277fde44d8e82cecd88
Unreal Tournament remote buffer overflow exploit using SEH and written for Windows.
3501ce11a58cf39d271605054c6374c1f2573ea2afe44f7646baa59a2bc5fcaa
SDP Downloader http_response remote buffer overflow exploit.
30039d10f3a60644f13e3bc80df52f71589858a61d3a013b778e84056cdb0de2
Sync Breeze Server version 2.2.30 remote buffer overflow exploit.
2ea4239f4bc3ba3677f10749cd14e33e6c090fa74c5f4bbe8fc6a7a59f85284f
Part of the Alcatel Omnivista 4760 administration software of the Alcatel 4400 PBX is an HTTP proxy. It is used to tunnel ssh-connections to the ssh-ports of the PBX within the internal network. This proxy is vulnerable to a remote buffer overflow.
5cd45b1c09ebec546267dae931c9ff29744617b38e2df6f7e0ab905d89d90e04
This Metasploit module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes.
d01b8d0eccb2aec11afecf3d49371c3c926e2d006a81facbb808d6626fec7fa3
YOPS (Your Own Personal [WEB] Server) version 2009-11-30 suffers from a remote buffer overflow vulnerability.
6694052f138560b7bda843c825debc8144e0312b513297460d9966fb3c62c18d
This Metasploit module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes.
39c01041cd7a953eb8e64486e1f5865273ee4d2db2d0b6b1cfb86aad1711e782
Internet Download Accelerator version 5.8 remote buffer overflow proof of concept exploit.
f4715608cde4e3695dbc213d0ee22153b68ce7abb0bb1299ca53ae178285aa2f
This is a Metasploit module that exploits a remote buffer overflow in Integard Home and Pro version 2.
d4089119cb05d1fbda649606b655fb13dc6b8bd56736cee01e8bbc3e9d7072ab
LEADTOOLS ActiveX Raster Twain version 16.5 remote buffer overflow proof of concept exploit that leverages LtocxTwainu.dll.
d621a52b3e4d10ca46462b146fbbc96a27cb4bda25c731aa2e4ea0fe565e009f
Easy FTP server version 1.7.0.11 NLST , NLST -al, APPE, RETR , SIZE and XCWD commands remote buffer overflow exploit.
c3bd3efeb858314820cb926c216f6e1410a737ff72385ec4adbb22d16492d24c
Sopcast version 3.2.9 remote buffer overflow exploit.
8649b23b0560a33f56d05ad294b1860670869f80d563a28bc7b03394962a3a49
SigPlus Pro version 3.74 Active-X LCDWriteString() remote buffer overflow exploit with JIT spray and ASLR/DEP bypass.
9c685d938e1883d1e4e7b6e6b3ffab5eeccd0e9a73fbbf46776e45a8aa313f27
UPlusFTP Server version 1.7.1.01 remote buffer overflow post authentication exploit.
a6a08e41b5947372974aff9b14a2282596f65cf35a007410bc1f76fed9559f49
Easy FTP Server version 1.7.0.11 CWD command post-auth remote buffer overflow exploit.
0e5afb9d2d4d68e8cc20883e5970167b4b47818ba2a76a82ab5176f66cd07cb9
Easy FTP Server version 1.7.0.11 LIST command post-auth remote buffer overflow exploit.
d1e6f817a66ed71281c4c1920cb0216d75cb0139ee45bf7395aae21774fc1c24
Easy FTP Server version 1.7.0.11 MKD command post-auth remote buffer overflow exploit.
5e37423f9c90a9b9b2c38af8b5cb1d64f13a2bc9b0818c75a12b6aba05eea66f
Haihaisoft PDF Reader with OCX control version 1.1.2.0 suffers from a remote buffer overflow vulnerability.
f4f2df2555e6a1b165df2624885a25e4c36da2d1ed12ade17c8c774d9d6cbb70