This script performs a Denial of Service (DoS) attack on the SPECTral Personal SMTP Server. It sends multiple requests to the server, overloading it and causing it to become unresponsive. The attack is performed by sending specially crafted SMTP commands to the server.
This exploit takes advantage of the invscout bug reported by Idefense labs. It allows an attacker to gain root access by exploiting a vulnerability in the invscout software. The exploit script automates the process of gaining root access. The exploit involves copying the ksh binary to /tmp, changing its ownership to root:system, giving it execute and setuid permissions, and then executing it. This allows the attacker to gain root access. The exploit was coded by ri0t and can be found on www.ri0tnet.net.
There are three vulnerabilities in the fuzzylime cms version <= 3.03a. The first vulnerability (LFI) can be exploited by accessing the confirm.php file and using the 'e' and 'list' parameters to include arbitrary files. The second vulnerability (LFI) can be exploited by accessing the display.php file and using the 'template' parameter to include arbitrary files. The third vulnerability (LFC) can be exploited by accessing the display.php file and using the 'usecache' and 's' parameters to corrupt local files.
This exploit allows anonymous users to gain administrator rights by placing the exe file in the Firefox profile directory and browsing a site with phpbb. It replaces a specific string in the cookies.txt file to modify user privileges. If something goes wrong, clearing cookies is recommended.
The exploit is a stack overflow vulnerability in Apple QuickTime CRGN Atom. It can be triggered by sending a specially crafted payload to the application. The vulnerability allows an attacker to execute arbitrary code on the target system.
This is a local root exploit for MacOS X that exploits a vulnerability in the CF_CHARSET_PATH. It allows an attacker to gain root privileges on the system. The exploit takes advantage of a buffer overflow in the /usr/bin/su binary. The user must press ENTER at the "Password: " prompt for the exploit to work.
This exploit targets a vulnerability in the sys_uselib function in Linux 2.4 and 2.6, allowing local users to gain root privileges. The exploit involves creating fake vma structures and utilizing multiple threads to manipulate memory mappings and files.
The TBDev software is vulnerable to Cross Site Scripting and HTML Injection attacks. The 'returnto' parameter is not properly sanitized in several pages, allowing an attacker to inject malicious scripts or redirect users to a different website. The 'Info' field and 'Avatar' field are also vulnerable to HTML Injection attacks. These vulnerabilities can be exploited by sysops, mods, and even end users who need to log in. Internet Explorer 6 and 7 are affected by the HTML Injection vulnerability.
This code is a fuzzer for the udp IAX protocol. It is used to test the protocol for vulnerabilities and exploits. The code creates a socket and sends various IAX frame types to the target host and port.
The exploit allows an attacker to bypass the login process and gain administrative access by using a specially crafted login string. The vulnerability was tested on version 1.2.5.