This Metasploit module exploits a code execution vulnerability in Microsoft Internet Explorer. Both IE6 and IE7 (Beta 2) are vulnerable. It will corrupt memory in a way, which, under certain circumstances, can lead to an invalid/corrupt table pointer dereference. EIP will point to a very remote, non-existent memory location. This Metasploit module is the result of merging three different exploit submissions and has only been reliably tested against Windows XP SP2. This vulnerability was independently discovered by multiple parties. The heap spray method used by this exploit was pioneered by Skylined.
cc7d3a0a5a7e5685948a23de177b0b8648ee1b05bb7f812884db09692b243c0f
Microsoft Internet Explorer createTextRang remote command execution exploit. Tested against WinXP SP2 RUS IE 6.0.
a2766d515bd66ef3fd37e9617c76b3ab7d6de03231a59be4454f195a4b5f3907
Microsoft HTML Help Workshop .hhp file compiled file header buffer overflow exploit.
d8c8e6100f377fb5a222992659e174f484e4a84eae0b3d385a7a8557f67fa7d1
Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.
ffaeef19db3c4daa82885e504f38a1055423d7b036404e4e4a8f846eccf60364
A format string vulnerability exists in Imapproxy versions 1.2.4 and below. Proof of concept exploit included.
a957e64eb23300ef5bd04f9396a66646f9eb4e1d06921f1eaf18205dd93c00f5
3CDaemon remote root exploit.
658be6711b3c4ab25d876b5aeda1635694af0554b4763b808488c3832356dbd5
Mac OS X.
c446553f4f3166b6eb2e42c816e8b5f650b517abc11872daf2276db5d0338396
Exploits for WinRAR versions 3.4x and below, possibly 3.5x.
321977b4c6611a137dee4e707f96acbc2b75443b57c3581fec815f9e2657831e
Mozilla FireFox remote GIF heap overflow exploit for versions 1.0.1 and below.
f6bf1f16b4c69ffd0c96d7def4314b0449714708db73bda0548a476c1dc053fd
Project6011 PoC exploit.
c0cef945267e904df5aa6b1978fec527005ae479a19c259adbf35e0655f76310
Fast banner grabber.
6c12bbb19754fc573f84eec67a3dbc75cc0965052bfb52226d518cf73db1a117
Examples of codes.
8e8049ca47b7ffbd37f6e713f61b1f58b4eae81f5df5a5819920d34b4aa4556c
MS05-036 code execution exploit (Win2k).
48e00bbeeeff04c6b5a22fa2c2c3c998c9fdfea79ebdde54c2f7b9ecaa28a2df
Firewall related paper.
2228fd4d7daf4d6e0dfd0626154974ef7b3d62db75ec57dc04ae501b9ca2860e
Remote format string vulnerabilities.
036f8350598c5dfc18a4d702c6e394323c1755a75f0ec682b891038df7f13ae7
golden ftp 2.52.0.0 remote root exploit.
4f4b914ded594ea8c8dbac619487bcbca312cfbace236eb179118e14514763c2
Kids buffer overflow paper.
80fb6fb02f497cea74049daf83728b003aad4d11e6721eb945dd5115d9f24356
PowerDVD 4.x local win32 exploit.
9ca71090ce171097c92df0d5c8162aa3c10c60119af5ced564dec9414ab90a9e
Paper on remote exploits.
fa5b3b2dd317bf0d324f9dc5e4c8ef6f0afa4db0decc52199b61e207d1122348
Pre-beta of new exploit generator.
25035f85d5c99656b5361cb5eb3704011e95c3a140a856a6e45e615c9bf884f7
Stupid lame release. Buffer overflow generator.
526dcdd0ee0cea8c13b5277b6dcf7e4a0a27884da61138086b5b99248c870430
GoodTech Telnet Server for Windows NT/2000.
907e839f9751fef0930dce3be9d9044671372460a81c694c5e4022e8e07d1304
GoodTech Telnet Server versions 5.0 and below remote root exploit.
401b4f1dc1a78082494dfefdb04709e899b6ebddd4e4ce7b99c3cd0f3b876d50
WinAgents Trial FTP server remote root exploit.
05b594d2c8754da23bd75546a4eefde568a29c39847387fdfe3b81d8862cd8e2
htget 0.9.x and below local root sploit.
5399850df8e0ceecf6000ec907c6faff3b8ab9f7a58340f19d5a40572aa50f18