Travesty is a tool that can leverage a known directory traversal to assist in identifying interesting directories and files.
293428749e98bd1e7a59e6c0b2f55dd18872c3e73a8ff6357ffbf51cf66d0c37
Win10 MailCarrier version 2.51 POP3 User remote buffer overflow exploit.
13098e760a816ccb94607e0bf00c0b7ce7100d3be40e32babf503a1307f8b8a4
LabF nfsAxe version 3.7 ping client buffer overflow exploit.
5232feb1a878eadc6fa5fea25caf4ae4cccff94d7dddea954739c79adf9a2bae
QNAP myQNAPcloud Connect version 1.3.4.0317 suffers from a username / password denial of service vulnerability.
1ed366907ba905add57c515eb5e14afb1015ff7b06ae2ff183d2958c5c96d415
MailCarrier version 2.51 POP3 RETR command remote SEH buffer overflow exploit.
369b8595dde8c9b12c3bf187b78d4d2a5d97de8c059235337dc95c461bb91375
MailCarrier version 2.51 POP3 TOP command remote SEH buffer overflow exploit.
5e3cfc7a086a3ee6b354e87378e4218d1d8f32e911c2c2075269a0ae3098c550
MailCarrier version 2.51 POP3 LIST command remote SEH buffer overflow exploit.
0acc339f07429dfc0f2beb0c5c7c0eeb24241c16aa9860feb1dbff3278220106
MailCarrier version 2.51 POP3 USER command remote buffer overflow exploit.
a137125e236c4e956266d78de14d425b87cc0c8ead564c4b98597e075719e76c
MailCarrier version 2.51 RCPT TO remote buffer overflow exploit.
06af225548a7b678034086a9a481c8d02615a3c9cc7cbf7c820107e6dace3387
FTPShell Server version 6.83 Account name to ban local buffer overflow exploit.
0103d38b2c7038d9675cec12825180d27cb3877000d5630b501b92e494d707f8
FTPShell Server version 6.83 Virtual Path Mapping local buffer overflow exploit.
b248948dec16aaf4914136ef9f42d2199554d52e55dbc3162d171fc4450663a4
UltraISO version 9.7.1.3519 local buffer overflow SEH exploit.
6ab8a0be9621c72336bf3c3a52766bd10ac6041fa0b278ef35cb5cc1496ef4e2
AnyBurn x86 version 4.3 suffers from a denial of service vulnerability.
f0b728371088f2c5e8db6b8d83c58786df87204d9660153e3bd8f547200264d1
R i386 version 3.5.0 local buffer overflow SEH exploit.
a4af3b0cf6c770e0a4bffd814b8b4abd7a0fc4844ab958cf2b588386d96df166
HTML Video Player version 1.2.5 suffers from a local buffer overflow vulnerability.
5da13ce830ebd2299eb1a2322857e6fef1523e8861bf45742d5a162d465b4d06
R version 3.4.4 local non-SEH buffer overflow exploit for Windows XP SP3.
e429fc91825cbb5af51c40aff7f77d08263caf61f0c30a58c7a5ca15e40021db
PCManFTPD 2.0.7 server APPE command buffer overflow exploit.
4b5e524625d8561d8f94907e64844a935db1f3267c60bddae2eaecdb4ddef231
Hacking the Bluetooth Stack for Fun, Fame and Mayhem - As the use of bluetooth technology becomes more commonly used, the room for exploitation increases. From cell phones to gaming devices. Dino demonstrates various methods of exploiting this technology in real life situations.
371a5f5e0f86c9c0696d681ba324a68ce8da7ea7d9e88421d34c2d5e098fc51f