This exploit allows an attacker to gain root access on a system running mtftpd version 0.0.3 or earlier. The attacker needs to provide a specific username and password to exploit the vulnerability.
The PHPEcho CMS 2.0-rc3 (forum) allows for the insertion of JavaScript and HTML code, which can lead to XSS attacks. Additionally, there is a vulnerability that allows for the stealing of cookies. The PoC for XSS is the insertion of JavaScript code or HTML code. The PoC for cookie stealing is a script that redirects the user to a specified URL and includes their cookie information. There is also a blind vulnerability that allows for the execution of SQL queries based on a true or false condition. The PoC for this blind vulnerability includes testing the version number of the database.
The exploit allows an attacker to bypass authentication in PunBB version <= 1.2.2 by using a boolean value in the cookie password_hash. By setting the password_hash to a boolean value, the attacker can log in as any user.
From The Ashes and Dust Rises An Unimaginable crack....
This exploit allows an attacker to execute arbitrary code on a vulnerable Bopup Communications Server. The exploit takes advantage of a buffer overflow vulnerability in the server's handling of a specific request. By sending a specially crafted packet, an attacker can overwrite the return address on the stack and gain control of the server. This exploit has been tested on Bopup Communications Server 3.2.26.5460.
This exploit targets the preparse_address_1() function in the smail software. It allows an attacker to execute arbitrary code with root privileges remotely. The exploit takes advantage of a heap buffer overflow vulnerability. The overflow buffer must not contain any characters that isspace() returns true for. The exploit contains shellcode that is clear of such characters. However, if the return address or retloc has such characters, an alternative approach must be used. The alignment and size of the chunk being allocated can be controlled using the padding parameter. It is important to note that automating this exploit may be challenging due to the cookie used by xmalloc() and xfree(). The alignment may vary each time the exploit is triggered. There may be more reliable ways to exploit this vulnerability by analyzing the code further. The exploit requires the following command line arguments: <host> <padding> <retloc> <retaddr>.
This vulnerability allows an attacker to execute arbitrary code by exploiting a format string vulnerability in the OP_SERVERMESSAGE feature of eMule, xMule, and LMule. By sending a specially crafted message, an attacker can cause a crash or potentially execute arbitrary code on the vulnerable system.
This exploit tool is used to test networks for a known vulnerability in Apache 2.x. It causes a memory leak in the Apache server. The impacts of this vulnerability vary between different ports of the server. Non-Unix ports are most adversely affected as the child process of Apache doesn't terminate normally unless the parent process stops. This means that leaks and any performance loss hang around until Apache is restarted. Unix/mpm_prefork offers the most protection against successful exploitation as its processes exit at the end of the request. Unix/other MPMs utilize multiple Apache processes for multiple Apache requests, which can be used to the advantage of a potential attacker depending on the MPM in use and the traffic rates of the server. If multiple different Apache processes are utilized, an attacker can spread the substantial leak between processes to dodge resource limits imposed on httpd's UID.
The PHPMyAdmin application is vulnerable to a directory traversal attack. An attacker can exploit this vulnerability to access files outside the web root directory and potentially obtain sensitive information.