![]() platforms/windows/remote/37.pl MS Internet Explorer Object Tag Exploit (MS03-0 20). platforms/windows/remote/36.c MS Windows WebDav II (New) Remote Root Exploit. platforms/windows/dos/35.c MS Windows IIS 5.0 - 5.1 Remote Denial of Service E xploit. platforms/linux/remote/34.pl Webfroot Shoutbox < 2.32 (Apache) Remote Exploit. platforms/linux/remote/33.c WsMp3d 0.x Remote Root Heap Overflow Exploit. platforms/windows/local/32.c MS Windows XP (explorer.exe) Buffer Overflow Expl oit. platforms/linux/local/31.pl CdRecord Version <= 2.0 Mandrake local root exploi t. platforms/windows/remote/30.pl Snitz Forums 3.3.03 Remote Command Execution Ex ploit. platforms/bsd/local/29.c Firebird 1.0.2 FreeBSD 4.7-RELEASE Local Root Exploit. platforms/windows/remote/28.c Kerio Personal Firewall 2.1.4 Remote Code Execut ion Exploit. platforms/linux/remote/27.pl CommuniGate Pro Webmail 4.0.6 Session Hijacking E xploit. platforms/linux/remote/26.sh OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh. platforms/linux/remote/25.c OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool. platforms/linux/remote/24.c Sendmail <= 8.12.8 prescan() BSD Remote Root Explo it. platforms/windows/remote/23.c Real Server < 8.0.2 Remote Exploit (Windows Plat forms). platforms/windows/dos/22.c Pi3Web 2.0.1 Denial of Service - Proof of Concept. platforms/linux/local/21.c Qpopper 4.0.x poppassd Local Root Exploit. platforms/windows/remote/20.txt MS Windows SMB Authentication Remote Exploit. platforms/linux/remote/19.c PoPToP PPTP <= 1.1.4-b3 Remote Root Exploit (popt op-sane.c). platforms/linux/remote/18.sh Snort <=1.9.1 Remote Root Exploit (p7snort191.sh). platforms/windows/dos/17.pl Xeneo Web Server 2.2.9.0 Denial of Service Exploit. platforms/linux/remote/16.c PoPToP PPTP <= 1.1.4-b3 Remote Root Exploit. platforms/osX/local/15.c Mac OS X <= 10.2.4 DirectoryService (PATH) Local Root Exploit. platforms/windows/dos/13.c Chindi Server 1.0 Denial of Service Exploit. platforms/linux/local/12.c Linux Kernel < 2.4.20 Module Loader Local Root Expl oit. platforms/linux/dos/11.c Apache <= 2.0.44 Linux Remote Denial of Service Explo it. platforms/linux/remote/10.c Samba 2.2.8 Remote Root Exploit - sambal.c. platforms/windows/dos/9.c Apache HTTP Server 2.x Memory Leak Exploit. platforms/linux/remote/8.c Clients Buffer Overflow Exploit. platforms/linux/remote/7.pl Samba 2.2.x Remote Root Buffer Overflow Exploit. platforms/php/remote/6.php WordPress <= 2.0.2 (cache) Remote Shell Injection E xploit. platforms/windows/remote/5.c MS Windows RPC Locator Service Remote Exploit. platforms/solaris/local/4.c Sun SUNWlldap Library Hostname Buffer Overflow Exp loit. platforms/linux/local/3.c Linux Kernel 2.2.x - 2.4.x ptrace/kmod Local Root Ex ploit. platforms/windows/remote/2.c MS Windows WebDAV Remote PoC Exploit. )Thanks :)Dr./platforms/windows/remote/1.c MS Windows WebDAV (ntdll.dll) Remote Exploit. Not trying to spam the comments, just wanted to clear up any misconceptions about what we do and HOW we do it. Even though I'm a big fan of MediaCoder (I've been using it since v0.3.8) and would rate it higher. (I rated MediaCoder a three (3) or 'average' to be fair since I'm responding to a comment. We are updating our EULA and privacy policy to more accurately reflect this information. Recommendations powered by OpenCandy are OPT-IN, which means you WILL NOT end up with software you didn't want simply by clicking 'Next' or 'Install'.We do NOT collect ANY personally identifiable information from users receiving recommendations. We provide software publishers, like MediaCoder, the ability to recommend a piece of software during installation that their users may find useful. Thought I'd chime in since I'm OpenCandy's Community Guru.OpenCandy is NOT spyware () or adware ().
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |