Proof of concept exploit for the mod_include module in Apache 1.3.31 that is susceptible to a buffer overflow.
a7d67b6ae598462fcf1311fa7182534dd474a28ce7c057c3264a690b66f04628
The mod_include module in Apache 1.3.31 is susceptible to a buffer overflow that allows for arbitrary code execution.
055d7f5955acdb2a54ae5d8fe0303663f38e57ee7640eff8edfe63a8e6520ded
Remote exploit for mod_gzip when in debug mode for versions 1.2.26.1a and below. Yields user id of the webserver. Tested against RedHat 8.0 and FreeBSD 4.7.
84af6d61c9fc50f2b274b91ce6e52fe5474e910aad12553f3e47926b21d32e6e
Local exploit for the ListBox/ComboBox vulnerabilities in Win32 platforms. Included is an example of a vulnerable program. Related advisory is available here. Tested on Microsoft Windows XP.
f61c932efba689ebf07ce59c123ce316c2c38a7c038c03fa8755f5576f9aa8e1
Remote exploit for Windows that makes use of the buffer overflow vulnerability in NIPrint discussed here.
b8e789a710d11c4ae816a47e4c3c5dc916c7e08b994a2904c440325f1d28ff37
Remote exploit for Intel's PXE (Pre-boot eXecution Environment) daemon on RedHat Linux 8.0.
6ee7f60bbf12228d58ccf17f6d93e028fed34300347b2f6d532b8eabc173c677
Exploit for the file(1) buffer overflow vulnerability found by iDEFENSE. When file is run upon this binary, a shell is bound to port 2003.
3cd39a300697230bb93932f5c217630f5baeee36b12e0e1b50ced39e0099e3be
HTTPda is a perl script that searches a remote site for forms, .cgi and .pl files.
a3a3bab1e06d96a25c57f97e38cf006c4f87a7a73c39b74655b5d7f80e29a0ea
Sendmaild.c is a local root exploit for Sendmail on BSD. Exploits the bug discussed in FreeBSD-SA-01:57. Tested on FreeBSD 4.3-RELEASE with Sendmail 8.11.3.
af378464c45ce674f69dcef1b241d4a304679c343fa1f55700fd04fe7f29c324
2fax prior to v2.02 for Linux and Windows contains a locally exploitable buffer overflow.
14214e7f949c470b58c600c51e76ebc4d256a68496c77854fa8efd95dc259861