Remote exploit for QTV, a tool used for broadcasting QuakeWorld games.
47127f1505c7697ad9e699913c9d553c9bba2efc8023d2a52edf6c5fd97673ba
PHP CGI argument injection remote exploit version 0.3. Works on versions up to 5.3.12 and 5.4.2.
c1ea06d9cffa10420a9d1187939611b8d7ae8fbca94540c697ed77e8bcca021e
LiteSpeed Web Server version 4.0.17 with PHP remote exploit for FreeBSD that uses a reverse shell.
b0012b61c33fd5c2dc2a099bfb8c36b4de98d5171a58428b919cf7223ecaadd4
Trend Micro Internet Security 2010 Active-X remote exploit that leverages UfPBCtrl.DLL.
20e0e5c29a061662abfb93bf2ab57c0045e3f149baef2042da93e7c456c8c5c4
Remote exploit for EvoCam Web Server versions 3.6.6 and 3.6.7 on Snow Leopard. Binds a shell to port 4444.
de2ec3dc7f11bb55b3dcefa4d07509282323883712a903b96f11073979b1bd79
Sun Microsystems Sun Java System Web Server remote exploit for Sparc. Binds a shell to port 5555.
58d3d00ceb2912ac710a08f0960ba35a4e854dccf29619ef655137c811281052
Open and Compact FTPd pre-authentication remote exploit that binds a shell to port 4444.
e9b123d40e159e6c6bc9b86b574b0dfedd1571e2c5995f6097bba18fa544d814
Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. This version has been updated by FortConsult A/S to use the same byte code as the Nessus plugin.
05af56508525edf0cf99ea659ff6d05ca91fd9083283f2d88a196e7beafa974b
The Everfocus EDSR firmware fails to correctly handle authentication and sessions. This remote exploit takes advantages of versions 1.4 and below and lets you view the live cameras of remote DVRs.
10026da1a7949dc0eaf28f986ef241f8679e65ad5c74df580ec8f86a61a39823
Remote exploit for InselPhoto version 1.1 that uses SQL injection to extract administrative credentials and perform file disclosure.
bb07e6526359351e0ec4b102924238f2cf20609c7a81da5dd39b2057f07d89b7
Remote exploit for Bloggeruniverse version 2Beta that uses SQL injection to extract administrative credentials, file disclosure, and remote command execution.
2c0d883c2325166492708347aba64e0139eb3fda8b4a9bd4540c7bf1a1e8495e
Remote exploit for the authentication bypass vulnerability in ProFTPd using mod_mysql.
e1f5b601f8af81df0b2624222de455c263ed411d290e7259eac220962b0c67c4
Invision Power Board versions 2.3.5 and below remote exploit that brute forces, attempts IDS evasion, and more.
7779c993b7397aaec65eef50dc7ff88cbb5936a2ae85c14d56352edc8fc4a524
LoveCMS version 1.6.2 Final Update Setting remote exploit that manipulates site settings.
d63a08a017585edabcfbef1997c9d25b584c5ca4992a4e456f3b5d4edf7cd547
Cisco IOS FTP server remote exploit that escalates privileges to level 15. Specific hard-coded addresses are for IOS 12.3(18) on a 2621XM router. Slightly crippled forcing this to only work when the router is connected to a debugger.
d54246014babb4c769cae5fee17eb1d8d2663d37a25a025002299897d93a764a
Microsoft Access ActiveX related remote exploit that makes use of Snapview.ocx version 10.0.5529.0.
b418fa673cc55dfcf90f4e9dfce2c5f05a6ce9565e0807ae39e50cd98b56534f
Remote exploit for SAP MaxDB versions 7.6.03 build 007 and below which suffer from a pre-authentication remote code execution vulnerability. Launches cmd.exe.
eb4f7cf06c6757a1371d0c92e9e5fc1d080f3f0a62dc8317785e8b3b2d680924
Sendmail/Postifx FORWARD remote exploit that leverages ftpd.
6c2d599af10d5698c6da37d9b221e8084949a0ae2fc59f66e062df0039438a0b
Apple Quicktime with Internet Explorer .qtl version XAS remote exploit proof of concept.
de4404cb7f47bc2c5e0fcb7378ef9ef71fe35d3013f67082b48b39e11d466c91
IBM Tivoli Provisioning Manager PRE AUTH remote exploit that binds a shell to TCP port 4444.
274b58c71804e51a1b53bb25dfe6e426f2dad792e863c34a4944ce547967aa3a
Remote exploit for the Microsoft Windows DNS RPC service vulnerability. Tested on Windows 2000 SP4. Binds a shell to TCP port 4444.
52be5bb153f92f69f6c22aada5a4bf41e884d3ca129b013c5861c86b7ca83c81
Remote exploit for dproxy versions 0.5 and below. Binds a shell to TCP port 4444.
71d56c60f1e232a94229b71556636b01433745ed2ae92d6b6761ae4dc0da6e6e
Easy File Sharing FTP server version 2.0 PASS remote exploit for Win2k SP4 that binds a shell to TCP port 4444.
3def45a977c52b6e8f0f60e1a2e14790ace91d83b4d0ef088bca447292e76c55
Remote exploit for Exporia versions 0.3.0 and prior remote file inclusion vulnerability.
183b507d646cee848ada27494f71e8282579022ef9d72ed92d35c5a851a4805b
Proof of concept remote exploit for the MDaemon POP3 preauth buffer overflow. MDaemon versions 8 and 9 are susceptible to this.
e36d9a6cd5875ac91dfbfc8be90a0ef092197e21924979c6115982c649be0d8b
MS04011 Lsasrv.dll RPC buffer overflow remote exploit version 0.1. Untested.
7d6457eada7d956609ced1edae13ed6602702803d0e989601405109add713f5c