BulletProof FTP Client 2010 buffer overflow SEH exploit.
9d2a8f92ad8d040a364da21925a40e5176a44528e1c55fb4e35eb9154c1ee38e
Apple iTunes 8.1.x (daap) remote buffer overflow exploit that binds a shell to port 4444.
2bb5bfe2e71d4174f29903dbbe4432af6a53097f6a819366afce1e705044cd72
Novell eDirectory version 8.8 SP5 post authorization remote buffer overflow exploit.
e4717073408a321c6c8d5bcd8643d68090de5191d64938212bef8b1f5b834fd4
This Metasploit module exploits a stack buffer overflow in HT-MP3Player 1.0. Arbitrary code execution could occur when parsing a specially crafted .HT3 file. NOTE: The player installation does not register the file type to be handled. Therefore, a user must take extra steps to load this file.
93c3719a58f1c3f72ff27596e136d037fd1436d92c5834b6f8a0c7ed3b2353b0
This Metasploit module exploits a buffer overflow in the ProFTP 2.9 client that is triggered through an excessively long welcome message.
1918602f6affb5fdc82662276ec5de0d38abc7dae16aeaa165740d9a06480b94
FTPShell Client version 4.1 RC2 universal remote buffer overflow exploit that binds a shell to port 4444.
82ec113b5a168cfb506aa28c64af2184c16742112e123d0041fd3307588f64b0
This Metasploit module exploits a buffer overflow in the LDAP service that is part of the SIDVault product. This module was tested against version 2.0e.
7909249c5430e14d66058c61646983e17255bc1f37cd06ec40583c4488d67996
This Metasploit module exploits a buffer overflow in the ProFTP 2.9 client that is triggered through an excessively long welcome message.
c33c4e4704cbe8d199f4eb59ea735d850afa48916f3f2703544acd42fdd4e42d
Amaya version 11.2 W3C Editor/Browser buffer overflow exploit that creates a malicious .html file.
4f580ce6b0d0a1455564b8712abbdd29cce687fd15564c38f3c70f6f012539bf
Compface version 1.1.5 local buffer overflow exploit that creates a malicious .xbm file.
8dcd754e45a8e5e21eff1fb91a0e747183d45f326b5b73197181715f11b0e572
VLC Media Player version 0.8.6f smb:// URI handling remote universal buffer overflow exploit.
d649fdc474ecfb008b12a47690f63248a097941ce54eae24de0fa9f8f47e64c1
Pitch IRC 98 Client remote buffer overflow exploit.
746ee79e3b3a17b45bf5b6dbc83da081a968cddd7cd03d0914a2f0b8e7e101ff
Photo DVD Maker Pro versions 8.02 and below buffer overflow exploit that creates a malicious exploit.pdm file.
01411ee8aeda69d3d46453ec511a4ed2829964bbd5c43ba3d6f12322d5a6115f
HT-MP3Player version 1.0 universal buffer overflow exploit that creates a malicious .ht3 file.
7b9c3091853dc6c43b3d60db439f059ddae7967b3ba6846656b28c36f8f6805a
Remote buffer overflow exploit for the Bopup Communications Server version 3.2.26.54.60. Tested on Microsoft Windows XP SP3.
f90f5b3beafa4bd022aba03f1306d9f4e21f625f4cd3d94c8973ee00c8d02743
Roxio CinePlayer version 3.2 remote buffer overflow exploit that leverages IAManager.dll.
ed043f658dc686287db1e0e676a4fb93641cbdd2fea1a8fd928f21deb467711b
Soulseek version 157 remote buffer overflow exploit.
38df46fbd03aaa6df10c16f2368d0f6fc1f28ef03706f119da7e844b0199b231
WinAMP versions 5.55 and below MAKI script universal SEH overwrite exploit.
f94826f92efd36d62df6e4978119b9b375ea487e89205060f3e7030dcc2b3351
httpdx versions 0.5b and below CWD related remote buffer overflow exploit.
3a673d9784f945eec0d25868cc777143875b140033f88820c081cc2255394728
httpdx versions 0.5b and below USER related remote buffer overflow exploit.
89ce0d6efffb25891daa035f66e689de999aedc54eae7052a360422415ef0023
Audioactive Player version 1.93b local buffer overflow exploit that creates a malicious .m3u file.
2a6d6e5b69292c66335256c9b6bb479892daa12ddd47dac0b35e4e4934192076
MPLAB IDE version 8.30 universal SEH overwrite exploit that creates a malicious .mcp file.
758c29c1b329479585d3990956fee17dcca4877dc0bec1fcec02911de89cabc7
This Metasploit module exploits a buffer overflow in the 32bit FTP 09.04.24 client that is triggered through an excessively long PASV reply command.
adc6c68a51d1ea3ddfe0be53378831a5317f527786737ddce43ec401a11e5c20
32bit FTP CWD response universal SEH overwrite exploit.
05e398432a62297a65623d7fe16ff221ffee9de31d580c242bf1ce5431e8c3be
32bit FTP Banner remote buffer overflow exploit.
4f0d3c6a8612a385fcb882eb2d290cc3b3bb6eeeac10d59b17c11e0e0b6afd38