Remote buffer overflow exploit for Kmail, a mail client for KDE. Tested against kmail v1.0.29 and v1.0.20.
f55166711a0a151507c36c9ae5b1a55081ad5bbd687b9780e99dbcb0964c7668
Hero DVD version 3.0.8 remote buffer overflow exploit.
b96ff541e105a651045d18859fd6f9197a4aa071b0a112c09f988427f6a709df
Editran editcp version 4.1 R7 suffers from a remote buffer overflow vulnerability.
f6cf7e0a1f25c0379e532cbc05ba69f842d14168870d4997d94a2bb755af715b
WarFTPD version 1.65 USER remote buffer overflow exploit.
e6546c6df1507850819e3f17350110c5e82baa33b4be814da0753b293680e7b7
Mac OS X EvoCam web server versions 3.6.6 and 3.6.7 remote buffer overflow exploit.
c277f9fc75173d72ca92fd9949166ab4441b2ebdf519ffab0033f3ae50fb6d4c
Amaya version 11.3.1 remote buffer overflow proof of concept exploit.
4d3d211fc71e047e923473d9df15698aa896aae81c8d409b32b69d47e1ed3fec
ComponentOne VSFlexGrid versions 7 and 8 Archive() method remote buffer overflow exploit.
a3f2c4d99a0f021f99d8f739fdc7ced80d7435e468a61de729349316ebfe9c2c
TeamViewer version 5.0.8232 remote buffer overflow proof of concept exploit.
eb3b4275204e3eb34a3eee73ff80bc30dc6a1ff82440af7000f547ec3b909b22
Mocha LPD version 1.9 remote buffer overflow denial of service proof of concept exploit.
099a4af3c61fee3a7ffb30879dc26ba970befd43bfd5048944193ce77f98beb0
MX Simulator Server version 2010-02-06 remote buffer overflow proof of concept exploit that spawns calc.exe.
37d5b28afb8e0fb8912fa25827309ea8a464bf7f4cb359d4f18fff32df8b1422
BS.Player version 2.51 build 1022 (Media Library) suffers from a remote buffer overflow vulnerability.
f25468b418f5da883aba03ba3a97cc69a0ac12dd3a29002bcf52aaf5015b998d
VLC Media Player version 1.0.5 Goldeneye suffers from a remote buffer overflow vulnerability.
45fefeb10cd2a4179005d5fc8f1bb446d212e60c0c3bd235dc346b222895e4af
Easy FTP Server version 1.7.0.2 remote buffer overflow RET overwrite exploit.
35d27eb6cda7ed96990aebb92e2bf405de86118170a839bfb80142b000f807cf
Whitepaper called Remote Buffer Overflow Exploitation. Written in Portuguese.
64a8be14586a9895deb175eb6875f0fd6992016a6393dff86273874be2347af4
Easy FTP Server version 1.7.0.2 remote buffer overflow exploit.
606a0e53d73e41e3179f9b19a3df894919b9fa12dec32e997546c5dfe0b8102c
Easy FTP Server version 1.7.0.2 HTTP remote buffer overflow exploit.
5c98e2b155f2d8592a555a6bbc6cd89ee7da62b37271325ca52740165008a832
UplusFtp Server version 1.7.0.12 remote buffer overflow exploit that launches calc.exe.
eed065ff637217f32b5713329f2c0d3f9b0162aadcf4bc529193308b482896e6
Vermillion FTP Daemon version 1.31 remote buffer overflow exploit that spawns calc.exe.
8cd7207fe0c17003da397f372225d80927a3889b3b21db5b248fcf42b2164597
BigAnt server version 2.52 remote buffer overflow exploit that binds a shell to port 4444.
59d8e7442ac2d463b9db9ac940263c37bcf89e4631168851427fffbcf330ef3a
Apple iTunes 8.1.x (daap) remote buffer overflow exploit that binds a shell to port 4444.
2bb5bfe2e71d4174f29903dbbe4432af6a53097f6a819366afce1e705044cd72
Novell eDirectory version 8.8 SP5 post authorization remote buffer overflow exploit.
e4717073408a321c6c8d5bcd8643d68090de5191d64938212bef8b1f5b834fd4
BigAnt server version 2.52 remote buffer overflow exploit.
de3d12e4bf47b1bb1e8e244dcb336d197cf598b4b1a1678cc5156b811f795f0c
Savant Web Server version 3.1 remote buffer overflow exploit that spawns calc.exe.
3fa66cbff5e18842cb286371a684a2742ba0f4dd5938979434263089cba66f34
HP NNM version 7.53 ovalarm.exe CGI pre-authentication remote buffer overflow exploit.
c3254e5bce844de2beae7b43c17e8ca6a8e7cc2e902e7f875b73fd47ddbfe34d
Eureka Mail Client remote buffer overflow exploit for XP SP3 English egghunter edition.
f29a7454bf1ff8c2e715f10967b9b3be3095c1e362abe2ecff73097a43f8e06b
This Metasploit module exploits a remote buffer overflow in the MailEnable web service. The vulnerability is triggered when a large value is placed into the Authorization header of the web request. MailEnable Enterprise Edition versions prior to 1.0.5 and MailEnable Professional versions prior to 1.55 are affected.
ff2e2ce5c94655dfb9465949f75f90f07c48c21db60b136d56f8315fb6e91c26