This is a stack overflow exploit for BadBlue version 2.5.
0d475fde99075c9ad6bf634410f200dc2f13e92c479178bd8bcfe8964c45e884
This Metasploit module exploits a stack buffer overflow in Bomberclone 0.11.6 for Windows. The return address is overwritten with lstrcpyA memory address, the second and third value are the destination buffer, the fourth value is the source address of our buffer in the stack. This exploit is like a return in libc. ATTENTION The shellcode is exec ONLY when someone try to close bomberclone.
1f188f97f389b0404fc041c1871d2fe7bd68b27ac86eb20c50950042743fad29
This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This Metasploit module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable.
bf2dd8378c0c0c82b912aa8e98c2826676a3f7e41c1c019b8e7c7c3874814359
This Metasploit module exploits a stack based buffer overflow in TinyIdentD version 2.2. If we send a long string to the ident service we can overwrite the return address and execute arbitrary code. Credit to Maarten Boone.
601ec2e4dd4f0b07bc02e96e7deceeb429b132776551eac89821dfda408aabc9
This Metasploit module exploits a stack overflow in the YPOPS POP3 service. This is a classic stack overflow for YPOPS version 0.6. Possibly Affected version 0.5, 0.4.5.1, 0.4.5. Eip point to jmp ebx opcode in ws_32.dll
8086b7ecc822149497a88947dda81327a12cdd2fb97bfbd37aca433d365d2157
BadBlue version 2.72 PassThru remote buffer overflow exploit that binds a shell to port 4444.
46bece2879dafcd7a2627df7bb34e2b5288a2a24d2b27ab17669cd36ad229e95
Savant version 3.1 GET request remote universal overflow exploit that binds a shell to TCP/4444.
12b874bede38d6dd884dfbb2fc091d660d3216fcdc9cd1790d40574c079fc821
Mercury Mail version 4.0.1 remote IMAP stack buffer overflow exploit that binds a shell to tcp port 4444.
308d3bd40ecffab66f0b3f06841565b1d6bcb4c5c1f45f07bac86bc22bc5eba8
TFTPDWIN version 0.4.2 remote buffer overflow exploit.
e724fe199ca4d5e5a07bb6f90f052bc00ca8afcef913ba5252f577b1d730625d
Mercur Messaging 2005 IMAP remote buffer overflow exploit.
649b1fde3c13ae9c52cbaf05b122cbce2c70938b002e95398d2969941beb60c1
This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch.
f25a8a610606ce2536b71ee4fa08f1f50550ae6904323d8724939d02e5fb2960
This Metasploit module exploits a classical stack overflow in Navicopa Web Server 2.01 version. Credit to h07 for the discovery of this vulnerability. This is a port to the original h07 c code.
b7044add722392d88e706c99af870a67fcd52afc19b6a4d1270d7a0308aaaaed
QK SMTP versions 3.01 and below remote buffer overflow exploit that makes use of RCPT TO.
243f6ba39f3d176dfbbf1b83621a028ca22dfa5ec70aeaae81d4a4ad1cb18b9e
AT-TFTP version 1.9 and below remote buffer overflow exploit that makes use of long filenames.
3c055612e0d3fc3c594e459088e2ca19c7013d09596cc2b275be81d1dd9fdf14
Mercur Mailserver version 5.0 SP3 IMAP remote buffer overflow exploit.
6bbdb8cc62e4570faa04303fb081ebab2238aa2e32496038f4f016c6404dad70
SIPfoundry sipXtapi (C Seq) remote buffer overflow exploit written in Perl.
049cf3f51c33719431487b46b3641548a6539f7bd91773f80826ed2e67497a73
Remote buffer overflow exploit for FileCOPA FTP server versions 1.01 and below that spawns a shell on tcp/4444.
e37152dd62f73e8c31017964528bea873eeadc9434cbfb75b054f2890a273f13