This exploit is a brute force attack on the DMhpux FTPd REST bug. It sends false login credentials and then attempts to brute force the REST command with a range of values.
The OpenSiteAdmin 0.9.7 BETA version is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by injecting a malicious file path in the 'path' parameter of the 'pageHeader.php' file. This allows the attacker to include and execute arbitrary files on the server.
This exploit takes advantage of a format string vulnerability in the Snmppd SNMP proxy daemon. The vulnerability allows an attacker to hijack the Global Offset Table (GOT) entry of the strdup function. The exploit is successful on the third attempt.
This exploit allows local users to disclose proxy passwords in FilePocket v1.2 and possibly prior versions. The exploit leverages a vulnerability in the software that allows access to the proxy password through the Windows registry.
Bug is present in <= 2.6.31-rc7, but the impact is limited to <= 2.6.24.4 as AF_LLC sockets have been restricted to CAP_NET_RAW since then. Only 5 bytes of uninitialized kernel stack are leaked via AF_LLC's getsockname().
This exploit demonstrates a buffer overflow vulnerability in an unnamed function. It allows an attacker to overwrite memory beyond the bounds of the buffer, potentially leading to code execution or a crash. The exploit includes three different buffer overflow payloads of varying lengths.
The Firelinking - Proof-of-Concept is a proof-of-concept exploit designed for Firefox 1.0.2. It takes advantage of a bug in bugzilla #290036 to execute arbitrary JavaScript code in the context of the user's browser.
When processing an IP packet with an option size (2nd byte after the option) of 39, it will crash due to an off-by-one error. The maximum available size for the whole IP options field is 40, and two bytes are already used. Checks are done to validate that the option size field is less than 40, but a value of 39 is not checked properly. This vulnerability does not affect all options and is dependent on the underlying protocol.
There is an authentication bypass vulnerability in page=CD35_SETUP_01 that allows you to set a new password even if the password was previously set. By setting a new password with more than 512 characters, the password gets reset and next time you access the router you will be prompted for a new password.
The Papoo CMS allows authenticated users to upload GIF, JPG and PNG images if they have the "upload images" privilege, which is true for all default groups that can access the administrative interface. The CMS checks the uploaded images only for their header, but not for the file extension. It is therefore possible to upload images with the file extension ".php" and a valid image header. By embedding PHP code into the image (e.g. by using the GIF comments field), arbitrary code can be executed when requesting the image.