Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.
2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984
MS04011 Lsasrv.dll RPC buffer overflow remote exploit version 0.1. Untested.
7d6457eada7d956609ced1edae13ed6602702803d0e989601405109add713f5c
Remote exploit for the Syslog server by eIQnetworks that has a vulnerability when processing long strings transmitted to its TCP port.
60bffcf1a26deeb9ebda5eb75a657c002ee82720c1ef7a36d68131a01a17d94d
Triton version 1.0.4 remote exploit for the sipxtapi vulnerability.
f93b23609f2b1ea7d2fa0921eaab18bffbff4d1f638e4c6b7dad4792aca8f31a
A vulnerability exists in the IQnetworks Enterprise Security Analyzer. The specific flaw exists within EnterpriseSecurityAnalyzer.exe, which binds by default to TCP port 10616. During the processing of long arguments to the LICMGR_ADDLICENSE command a stack based buffer overflow occurs.
62dba3a26852eedc18c6ce2aca71f4563fcba6abc5407d832c1d9a918fee9f91
Functioning remote exploit for the Windows DHCP Client broadcast attack vulnerability as described in MS06-036.
5e033b168105689986e7b2df247c78c44f22d6ec22b3b955cc3445ba86a8d6aa
Remote exploit for an old flaw in GUESTEX 1.0 guestbook that allows for remote code execution.
bb3e843dbd7e85e94f043786965ba4cf0fd2d1035be98b3b2b98554289d95f2a
Remote exploit for an arbitrary file inclusion flaw in Unclassified NewsBoard versions 1.6.1 and below.
0abf7924e12ca0c4cf02b57e277252115334faa389dec0a3d0df88dd9c22be0c
Nodez version 4.6.1.1 Mercury remote exploit that makes use of arbitrary inclusion and authentication bypass flaws.
5d6166ec9ae5d6d089413a57324580495715cccb2a8ff7f5c31f86e7b0497552
Remote exploit for ArGoSoft FTP server versions 1.4.3.5 and below that makes use of a remote heap overflow in the DELE command.
7254d5e1a22aa5a9bedc2e13bb70cc4b7c74c92e5c1eac37b5611a7eb4360abd
D-Link fragmented UDP denial of service remote exploit that makes use of a design error flaw.
7eaaf634f7193ebbda5c1b77c8b1aae055a9904f48c80350134ddaead13b52fa
Remote exploit for eXchangepop3 that makes use of a buffer overflow attack.
fdc180d92a58df7519a77e8c23a67af73ce3279b446f4560f4e15d95204a3c26
Farmers WIFE version 4.4 sp1 ftpd remote exploit that allows for system compromise.
890997b51723f28c17e0b21e78bc7cc7e3e5fb4620c3ebe70555565e6bffafc1
Microsoft Windows Metafile (WMF) remote exploit which takes advantage of the bug known as ms05-053. This program creates a special .wmf file which crashes IE by overflowing the "mtNoObjects" header.
8a69e2857d794a4dbba1f6eb8fe50a28af6da1e116e413522bef8d7a68279195
Remote exploit that makes use of a format string vulnerability in sobexsrv.
70af8edf82d16d5c0a15f619b7c245147a561588641160e58d5d55fedecb6bb3
Remote exploit that makes use of a buffer length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList (services.exe - ms05-047).
345a0d8ab4a6509f06d6a75f4f2eae744f2bf4df914b5e46c61fd00ce658368c
Microsoft Windows 2000 Plug and Play universal remote exploit for the flaw discussed in MS05-039.
781399405050c0988fddc2a8b8e492927b774aa17316460c4c494ff7b5f37391
Remote exploit for GoodTech Telnet server versions below 5.0.7. This exploit can spawn a bindshell or launch a reverse shell.
589775b96701523a09ebbc413fcde21a03c4bcb8b334a15046465788ed9e1f10
Awstats remote exploit that allows for remote command execution on the host with privileges of the httpd process. Versions 5.7 through 6.2 are affected.
e0d6aacf97481633bcc02f886a5337792a2211c0e98331682b0c4276982738ae
WebConnect remote exploit that makes use of a directory traversal vulnerability in versions 6.4.4 and 6.5.
2d547bdd62b6ceb8e18c55857e4b388aefd9f219e6a9f3609806e27395367f24
Bontago versions 1.1 and below remote exploit that makes use of a buffer overflow when a nickname longer than 512 bytes is sent.
3de0fc3cba9cb28bfb5fc6dd46c632438e39b87cdce96b3746fd833a07415d82
phpNUKE version 7.4 remote exploit that adds an administrative user.
86151974f860e2902a16b8cb3ca111c827b9c3fed0f5bf33e2ab3c7274a2abad
3CServer ftp server version 1.1 remote exploit that binds a shell to port 1180.
b5968e526f536105d0b7f4dd141a4dd4e87ff1181b770a5035d8b3578d83f457
PHP-Nuke v7.4 remote exploit which allows you to create new admin with relative passwd that you specify on the command line. Allows you to take administrative control of the webPortal. See here for more information.
d4519b08516e4a2b394f9870d72fa7a2e76009da122c00757f5e8ba8dabc2814
MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Windows. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.
c30c3511146addce1842ff9014814c1afd908e35efb8b7c35a338901c14f83a3
MSN Messenger PNG image buffer overflow download (ms05-007) remote exploit for Linux. Tested against MSN Messenger 6.2.0137. This vulnerability can be exploited on Windows 2000 (all service packs) and Windows XP (all service packs) that run vulnerable MSN Messenger clients.
7f4fd2c135fdf617b1189c77097199a161a47f41e34cbc4b66d71870dd2a774f