Remote exploit for the buffer overflow found in the LICMGR_ADDLICENSE Field of EIQ networks network analyzer.
2fd385aaecbd319e45011cb0297961bc7072184913dd3828fc4dc4b0331f3984
Remote exploit for OmniHTTPd versions 3.0a and below.
10a187c64b2c3812f3886a960408b6c725c3e5e4e0c7b49ebb7470c071cdf861
Remote exploit for Monit 4.1 that uses connect back shellcode. This exploit makes use of a buffer overrun when an overly long username is passed to the server.
9115921f367182e04c2a327689c0ea998acdbb7ffeb7313c0e4390f4bba7e4da
Remote exploit for the Sasser worm ftpd server that spawns on port 5554.Targets included for Windows XP and 2000. Note: To use this against Sasser.e, change the port to 1023.
fe6e7139ffe5455305da5e52b63eeb8d4a419766258966ceb2ef0016e7cbe63e
Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server. Ported to compile properly on Linux.
de64cd542848869101fd0295b16efedcc16a5d8fa502380d2df58defde723411
Remote exploit that makes use of a file inclusion vulnerability in 4nalbum module version 0.92. To use, you must change the retrieve URL to point to a script that binds a shell to port 1234 of the server.
3a7ac4cceaeef914f10ea4087f7dad06d55ce85def6e4463349e310e545c3d38
X-Chat versions 2.0.8 through 1.8.0 remote exploit that makes use of a buffer overflow in the SOCKS-5 proxy code. Successful exploitation binds a shell to port 7979.
2fee8170f90a051fd47c72f81150fec692e3bf4fac546c3cd394c69c90bc8001
Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.
c155fee77b812701dd4efb98b8ad352943a5fa4ca64edab679c6ddefca7a2e45
Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server.
b67594dc0860e55e0a2dbb1361ffe68073b8564d93f740595e75b36e19a82e49
HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.
0f0b1134f526e9e119a43dac0a36550ab2c1495e9c627acdb6f4557b53503898
Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.
59990e1585e8a43db707953bdaf4a443fe2cfb007fbeb1b8f7770a1e56900e07
Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.
2313f6c8c3680934ff278d70f97559a0358c9851c286921cd3a616b0ad3e2749
Kinesphere Corporation Exchange POP3 e-mail gateway remote exploit that makes use of a buffer overflow.
aa21d34e23c056c9250ad35d4abf58eeff4391ebca64ff0ac12966a256d74237
Remote exploit that makes use of a SQL injection vulnerability in Phorum version 3.4.7.
9f4cf79038884aae5dcd94f78963562f26d6d2bddc3d43b27874e515c90298cb
Monit versions 4.2 and below remote exploit that makes use of a buffer overflow in the handling of basic authentication. Binds a shell to port 31337.
ba0446ecc2f07da2a2e4e121bf6475f2fd33ff6fdc434504fec164c267d88c3d
eMule versions 0.42d and below remote exploit that makes use of the buffer overflow in the DecodeBase16() function. Tested against Windows XP SP1 and Windows 2000 SP4.
3593a07b9342dcd9a1d5535855246fa52ec72837d95266e930d2d5157c286cdb
Remote exploit that makes use of overflows in versions 0.4.4 and below of LCDproc's daemon.
88025a702af48e6df6a33abdefbf654f1a43d47098fb37126af799e9e62b42d0
Remote exploit for eSignal versions 7.6 and 7.5 that downloads and executes a file.
4de8ee1d043050fc6b60d8d9e1cf57973ba65d5c71d9339504b1035fc27cfc36
Remote exploit for Ipswitch WS_FTP server version 4.0.2.EVAL that makes use of a buffer overflow in the STAT command.
e993fa25947b8629ad5a12de268189a00ea40196ac545b8061e970e085a73b11
Remote exploit that causes a server crash in Chrome versions 1.2.0.0 and below.
dcf8df6f24acf38d664322e4c28369904c5ff6469a4572a3985c4476cc1af158
Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.
f2ad6f0382c6310f3658254e54ad15974683f2ce8e29ff239c7888bb1e7b02fd
Remote exploit for the Unreal game engine for Windows, MacOS, and Linux that makes use of a format string bug. This proof-of-concept is a proxy server able to modify the Unreal packets in real-time allowing the insertion of %n into the class names sent by the client to the server causing the remote crash. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.
87f327452ec46e6b01fe3b3812aa44923bf4c03bcf59360267ddca9d1b307e79
Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.
6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.
4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
Remote exploit for WFTPD server. Tested against WFTPD Pro server version 3.21.1.1 on Windows 2000 CN SP4.
36efa8521fe6d42fba082e0c14015fe3be98a3a0ad14ca3a9df03000a85bc69b
Remote exploit that makes use of a buffer overflow during GET requests in the PSOProxy server version 0.91. This version support the following operating systems: Windows XP Home Edtion SP1, Windows XP Pro Edtion SP1, Win2k Pro Edtion.
62202900b3384ce959dde0cd62c292867091c117c07c81cfffbd72ae412dbd85