This exploit allows an attacker to perform a Denial of Service (DOS) attack by sending a large buffer of random characters as the username and password to the Quick 'n Easy FTP Server 3.2. This causes the server to become unresponsive and deny service to legitimate users.
This exploit allows an attacker to change the admin password and add a user on Linksys Cisco Wag120n and similar versions. The attacker can use the 'sysPasswd' and 'sysConfirmPasswd' fields to set a new password.
Unprivileged users can effectively remove the sticky-bit from the system /tmp directory, making it unsafe to rely on the stickiness of /tmp on Red Hat Linux systems.
This exploit sends a crafted packet to a target server, causing it to crash and become unresponsive.
The program suffers from a buffer overflow vulnerability when opening autorun file (.ini), as a result of adding extra bytes to parts of the edited file, giving the attackers the possibility for arbitrary code execution on the affected system. Also, the buffer overflow vulnerability allows the attacker to bypass Structured Exception Handling (SEH) protection mechanism.
This is a proof-of-concept exploit for a local buffer overflow vulnerability in Oracle 10/11g exp.exe. It allows an attacker to execute arbitrary code by exploiting a buffer overflow in the param file. This vulnerability was discovered around 9/3/2010.
Mrxsmb.sys, around BowserWriteErrorLog+0x175, while trying to copy 1go from ESI to EDI ...Code will look something like this:if ((Len + 1) * sizeof(WCHAR)) > TotalBufferSize) { Len = TotalSize/sizeof(WCHAR) - 1; }-1 causes Len to go 0xFFFFFFFFFeel free to reuse this code without restrictions...
This exploit allows an attacker to gain administrator rights on the Aztek Forum 4.00 platform. The exploit requires magic_quote to be turned off.
This exploit allows an attacker to perform a denial of service attack on XM Easy Personal FTP Server 5.8.0 by sending a malicious LIST command. The server will crash and become unresponsive, denying service to legitimate users.