Remote proof of concept exploit for Soldner that demonstrates a socket termination when an oversized UDP packet is sent to the server.
010a24a60fd04ac41eb59c4fa05887a18229b63421b910d2dfbc141d3974c964
TestLink Open Source Test Management versions prior to 1.9.16 remote proof of concept code execution exploit.
7f1cec95295792a263ea245ef75d239589db9afc06b5a1a8e021fc6d031a4154
rpc.cmsd / Calendar Manager RPC service remote proof of concept buffer overflow exploit for Solaris, AIX, and HP-UX.
5b93d417eda40ad6a76cd6bd81c57c1a00b7622bb6aa9d80ff8bb2625d7e3c02
Motorola SB5101 Hax0rware Rajko HTTPd remote proof of concept denial of service exploit.
f11e4c8e042ceb2366c5e971c759cb7848d1150fcf836c96cb932f831a22d2e8
XRDP version 0.41 and below remote proof of concept buffer overflow exploit.
3850e56fcdf1147801a0b4e75c405946f3f28619ee595802594985b5ced6241c
FTP NOW version 2.6 server response remote proof of concept crash exploit.
264b725645dd4eef5acb455224f4a194db46e282bdb2be9751d8f89d8dc984fa
FlashGet version 1.9.0.1012 FTP PWD Response remote proof of concept buffer overflow exploit.
d1d88ce8131aeef632d51ba972fc221d0931fc545dd28d2e5d6028a0dc8877d6
FlashGet version 1.9 FTP PWD Response remote proof of concept buffer overflow exploit.
4717be597074ab3666f0b2540eefa529deec56009bc49551b3a090ceed9c8bd3
SecurityGateway version 1.0.1 remote proof of concept buffer overflow exploit.
452678bb33db4caf6ba070773ede00d035bb357b1365a3516c2f545c5fa59459
Titan FTP server remote heap overflow remote proof of concept exploit.
57e2dbd5cd27fe10846cd09ea71491072c6ba6bf95a6892124428844c8de154a
Easy File Sharing ftp server version 2.0 remote proof of concept exploit.
600f9e36332033b9a64f2b63f27cdda2ed523db9b876baee3ee689a3652e8f64
Remote proof of concept exploit for Raydium versions SVN revision 309 and below.
df0a79143ecc3e6f7c7f2d7a3a0610d01ec1f060ca6f8fa99f8fb2024c2dafc1
Revilloc MailServer and Proxy version 1.21 remote proof of concept exploit for the USER directive heap overflow. Binds a shell to port 9191.
3c9ad856259ed9d850a7e48cd14c79377eb82fa3483a9cd37f035a2880eedc5a
Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.
5a516d222a183472ce165846622b1deb7443c5cc0b80551438fb933e3bac6c4d
Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.
ffaeef19db3c4daa82885e504f38a1055423d7b036404e4e4a8f846eccf60364
Remote proof of concept buffer overflow exploit for the IMAP server in FTGate4 Groupware version 4.1.
407fcb6c333d58d2349fad1a8b780a19e4b7926bc74f534bc88f3a61e8b5177b
Snort versions 2.4.0 and below remote proof of concept exploit that creates a malformed TCP/IP packet that will trigger a vulnerability in the PrintTcpOptions() function from log.c.
5cb6f490e8d8bdbbc7c4c7316ff20da370bf31d280b268795c2bb556ca899b9a
Terminator 3: War of the Machines versions 1.16 and below remote proof of concept exploit.
9c83b07c87b070924924298b43bc31030ddad76802a9f36fba5f17b2f838abaf
SlimFTPd 3.16 remote proof of concept exploit.
fd39268110becc1ce7adb2f03d24132bc1fd6bb347f4378611a43390faa26c71
Remote proof of concept exploit Scrapland versions 1.0 and below which suffer from a flaw where the server terminates prematurely when it errors.
ad090bf36af268fe6672741205acb833fbf3a13c5c6030bbbd25858ede859708
Remote proof of concept exploit for the buffer overflow vulnerability discovered in Exim 4.41 by iDEFENSE.
753d89e248ed9f5367270763d2d68d1468737e48ae16a35a50dcfe7aa88d72f4
Soldner, the tactical military game by Wings Simulations, is susceptible to silent socket termination, format string, and cross site scripting flaws.
d406a8086d751f07a524645aa489a9fcac21dea5d48bad84de3263bb19a1b224
Remote proof of concept exploit for the NetDDE buffer overflow vulnerability as described in MS04-031. Tested on: Windows XP Professional SP0, Windows XP Professional SP1, Windows 2000 Professional SP2, Windows 2000 Professional SP3, Windows 2000 Professional SP4, Windows 2000 Advanced Server SP4.
ed242658979dfa1884e2aa77a982d4ccf26b819190eca90639d35aa38c38b027
Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.
b7866a8811b382a054ae7fb62572e6e373eb33af3e44cfec542ed5f71f5dca85
Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.
8c1f38ba19234cca1350bb97214735995b65a3407cba5859c48514f728863627
Remote proof of concept exploit for Privateer's Bounty: Age of Sail II versions 1.04.151 and below that makes use of a buffer overflow.
969c8216b3922369a4dfee9cedac1bdeb7f1c43d81ea49206668d6f8ca75322a