Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.
2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984
Remote exploit for a buffer overflow vulnerability Savant Web Server 3.1 that allows for remote code execution by sending a malformed HTTP request.
879bb95f484a5ae79c71b373fa76693e14558c6f822ed39c731fc778c00110ad
MPM Guestbook Pro remote exploit that performs arbitrary command execution and local file upload.
8fa4ecc8f4bf22735a4a28510742a044cea289c4ca55a8b239f9e934bbb92f54
Remote exploit for phpMyChat 0.14.5 that adds an administrative account.
7411ee8518fab68a41d30bfd0f3a94f3fa20cc9fdda22d29b84c18d9b0cd26c4
e107 remote exploit that makes use of an unsanitized include().
cd5aada48bdc5a139e6392fe6b608c74e14b107752b6f4d4ebbbaf991a51b73a
Remote exploit for Kreed versions 1.05 and below that suffer from format string error, denial of service, and server freeze flaws.
2c1ad57a838694f28a0578b571f486e9794175f13eab0b0421ad03831649f766
Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server. Second version loaded with 14 types of attacks.
710886be64bb7fff70903561833230b2e7ba604b91496598106c7e46d700926f
Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.
1992e2ec6ee91bec2e209f5d8942e15e93e225cd81bc0a56fc5540e11094d323
Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.
0e9f16d2eb219cb6649d8a93058aceadd447cca259e088bba13b7e2bcf6a5f46
Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.
c5de8860494ec9c6c1f6fd843c7a558b1fee55f076ab1a36f0363084f66befb4
PhpBB v1.0.0 - 2.0.10 remote exploit which takes advantage of a bug in admin_cash.php. Opens a back door on a tcp port.
759e1b3c1fd320dbe0d222403ebfadaef07dc4d09e204984eb5cd514f21054bc
Mailtraq Version 2.6.1.1677 remote exploit which allows SYSTEM level access while using the Mailtraq administration console. Requires a Mailtraq admin account.
9363a24390dc5f166823eede37366696be7abfad27c632dc5627567f22951267
Remote exploit for the IPSwitch-IMail 8.13 stack overflow in the DELETE command. Successful exploitation binds a shell to port 4444.
34486ab358c7f8793e3c20cec33de6a9c6baf7c1e07b04a872a23d2c482b2059
InternetExploiter.html is a remote exploit for the IE IFRAME html tag buffer overflow vulnerability which binds a shell to tcp port 28876. Tested against IE 6.0 on Win XP SP1 and IE 6.0 on Win2k.
0ecca01eb05bab171b33265b3ea3ac3e0cd2cac3fc0ae02350d422d833d55e3f
Ability FTP server 2.34 FTP STOR buffer overflow remote exploit that spawns a shell on port 4444 upon successful exploitation.
39dfb200bb55c2fb0fffdc3697970f7ee2ba3f62c21c2adfd4d3a5f4996de5a8
Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.
e80d2409b6e269d59edd99db2b19a5529b757d7eb1f822c75d015ee3aba48dbb
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes. This even-moreso enhanced version also has the ability add a user to the administrative group and can perform a file download.
20c93c78772b0990144751c09236f2b8c235714fcc01bac6f35dc0c88f2dc37a
GDI+ JPEG remote exploit that is a modified version of the FoToZ exploit that has reverse connect-back functionality as well as a bind feature that will work with all NT based OSes.
d8355ee0ee39e0020db08761e80e8dc97cb432c9a970c1cd4a0d88cdb50b417c
Private version of the remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Support for Red Hat 7.1, 7.2, 7.3, SuSE 8.0, Debian, Slackware 8.0, 9.0.0, 9.1.0.
0288e222e92a3ec340ab792060fffc178ba5bce0ce2bdd19260c5dc60893692b
Remote exploit that will change an IP address for the D-Link DCS-900 IP camera, due to the fact that it listens for a 62976/udp broadcast packet telling it what IP address to use without any authentication.
80731a57a2cea9ecb8dd3acadf07b2de5a77b44a1815266951ba9d93b953b1aa
Remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Successful exploitation adds an account in /etc/passwd.
49c652bb47321274ba36227f601c86fc98a4cb2b83fcc5e9942bc5c64a9773ad
A remote exploit has been discovered in the Apache 2.0.49 HTTP server which allows an attacker to cause the server to allocate increasing amounts of memory until system memory is exhausted or until process limits are reached.
d52c9414d2197f648b3d31a6f01f66b36cd2811cf96502d02d2519eb5d7614b1
Remote exploit that makes use of a format string vulnerability in rlpr version 2.x.
671d9ed33356c2438a4c4a70a5e1e61d2e6b9186125af05bd345ee60f4144974
Remote exploit for Borland Interbase 7.1 SP2 and below that spawns a shell under the uid running the database. Targets included for Linux Interbase 7.1 SP 2 and Linux Interbase 6.01 InterBaseSS_LI-V6.0-1.i386.rpm.
5d817a11e46cbba76ba13cffc204517f20ed0ba8ab02ea224660d23758ad1bc5
Subversion 1.0.2 remote exploit that makes use of a stack overflow in the svn_time_from_cstring() function. Binds a shell to port 36864. Tested against RedHat 8.0 Psyche build.
d02b1feccebffc24878e8b25042a2f7c26807f4574998ffb926f8c0216c55f63
Metamail remote exploit that makes use of a buffer overflow and upon successful exploitation, binds a listening socket to UDP/13330 awaiting shellcode. Affected versions: 2.2 through 2.7.
4b90ebafdf1d434a218d36dfbf9b51ff8ab8e7a904b5b69a39f31b140b267ee8