D-Link MPEG4 SHM Audio Control remote overflow exploit that makes use of VAPGDecoder.dll version 1.7.0.5.
3155a104305a8783639733d34e284568fe9b92635193881c099dff3599f43c26
Microsoft DirectSpeechSynthesis module remote buffer overflow exploit that makes use of XVoice.dll version 4.0.4.3303.
7718f8446822b64a7c81ea9b0388ff3cdb8304d505ab0e6503dff8ede1143bdb
ImageShack Toolbar version 4.5.7 FileUploader class insecure method proof of concept exploit.
00d868858565241dd37da4195ce062c98b6b7264a20be4df86f24e004f8495c6
Digital Data Communications RtspVaPgCtrl Class remote buffer overflow exploit that makes use of RtspVapgDecoder.dll version 1.1.0.29.
af015133b5fb852204dcbe8a9e537fb0c262cb3e6f6a5107a22e3410079835b1
RTS Sentry Digital Surveillance buffer overflow exploit that makes use of CamPanel.dll version 2.1.0.2.
a107188cb89bc1cffd2b55b52f95827b328468e2f2ac2e5e5b9117e0368872c5
NUVICO DVR NVDV4 / PdvrAtl module with PdvrAtl.DLL version 1.0.1.25 remote heap overflow exploit for Internet Explorer 7 on Windows XP SP2.
9ee68690af569f2155d52e1d0bea6ce85186e02b540a9a4924aeebc6c338d350
Docebo versions 3.5.02 and below SQL injection exploit that makes use of lib.regset.php.
d5128df2988a271ca9ff69c11ac5b41342bc66c604855efb747764d4465690cc
iMesh versions 7.1.0.x and below IMWebControl Class remote heap exploit that takes advantage of IMWeb.dll 7.0.0.x.
bda7d1cdc934e1f0e4484e108927329c7550e60068d4168673d120bed0940cf7
SurgeMail version 38k4 webmail Host header denial of service exploit.
49a73d329f08f1ae216aa0a1afcac1586fb07eb9337bcfd4563e094053c43add
RaidenHTTPD version 2.0.19 ulang command execution proof of concept exploit.
673b614fe243897edcb2b2bdcbd71a1f52312222617148de6b1adb3a887a63ac
GOM Player version 2.1.6.3499 remote overflow exploit that makes use of GomWeb3.dll version 1.0.0.12. Spawns calc.exe.
906d927f7281a8d6b9f463de5a38983fe8e053fcbf3c0fe5cc7a02137c97ef19
CyberLink PowerDVD CLAVSetting module arbitrary remote rewrite denial of service exploit.
dc99ac5c0ba7789ad4c2e98c65ba7f59a828327c71d0b166f22e8d6ecd713169
EasyMail MessagePrinter Object buffer overflow exploit that makes use of emprint.DLL version 6.0.1.0.
ef38c253e5f6159950c93daca6f0f601d24318dd711729c8dcbe93c1154b92d0
Microsoft SQL Server Distributed Management Objects OLE DLL for SQL Enterprise Manager remote buffer overflow exploit that makes use of sqldmo.dll.
1ce95bc82766e57689e496cbc4fd2182f5c05d73f3ca933f27c93da5c0cf9a1c
Telecom Italy Alice Messenger remote registry key manipulation exploit.
5ced2ef887bd909dc01196510eb1d3d09b87d3be937a851965869d6005ab6df7
Hexamail Server version 3.0.0.001 pop3 pre-auth remote overflow denial of service exploit.
6ecc71a7cc6a2be2b79f037aa2d625facdb9ea17f3884c323f20ebdbe363722d
Postcast Server Pro version 3.0.61 and Quiksoft EasyMail emsmtp.dll version 6.0.1 buffer overflow exploit.
f12f44542d5b9709753549c601a5b50b87a129fd6937e95d3680f3629394c1e8
eCentrex VoIP client module remote buffer overflow exploit that makes use of uacomx.ocx version 2.0.1.
bb46182efc060e88d93f7e422edff4403336f30750543d554eab142e85c2573a
PHP versions 5.2.3 and below snmpget() object id local buffer overflow eip overwrite exploit.
013bac58df94a21b30524ccfd27345df772f91f027c22f59e55994f248dddb15
AMX Corp. VNC ActiveX control remote buffer overflow exploit that takes advantage of AmxVnc.dll version 1.0.13.0.
3e4b4e7e49614651ed8f8e25252d24cf8f65c7c0d33be9a44650128ae52249ce
PHP version 5.2.3 Tidy extension local buffer overflow exploit for win32.
77ab4ff0f5a046cb4cf44bd4a513d14d0712af937e419f340866aac22359816d
Microsoft Speech API ActiveX control remote buffer overflow exploit for WinXP SP2.
9831ecdc3136c5ebcd838861c5051d81e53598094f8c0de11e0426cf26fe916a
Microsoft Speech API ActiveX control remote buffer overflow exploit for Win2k SP4.
4e8e2cfc8860f5b749fc21be1eb6f974459d23a7bb2b6fe42476964ef495ba24
Internet Explorer 6 / provideo Camimage class (ISSCamControl.dll version 1.0.1.5) remote buffer overflow exploit.
3aab16ecb5367ff36e1d1932841b62652beb912e7e48c1e65e46180075fbf37d
Internet Explorer 6 / Ademco, co., ltd. ATNBaseLoad100 module remote buffer overflow exploit.
cc172dca81fb7d641e2ef31d86eca200033d53f260d74a5994cc178ce9925bf3