This exploit targets a vulnerability in MailEnable 1.8 that allows for a format string denial of service attack. It was discovered by Mati Aharoni and coded by Tal Zeltzer.
This exploit takes advantage of a buffer overflow vulnerability in the code. By overflowing the buffer with a series of 0x58 (X) characters, it can potentially overwrite important memory addresses and execute arbitrary code.
This is a proof-of-concept (PoC) for the Apple QuickTime Image Description Atom Sign Extension Vulnerability. The vulnerability allows an attacker to execute arbitrary code by exploiting a sign extension issue in the Image Description Atom of QuickTime.
The vulnerability allows for arbitrary file inclusions. It can be exploited by manipulating the GLOBALS[] parameter.
This script is a remote Denial of Service (DoS) exploit against PlatinumFTP version 10.1.18. It takes advantage of a vulnerability in the FTP server to crash it. The exploit works by repeatedly creating new FTP connections to the server and attempting to login with a specific username. By doing this, the server becomes overwhelmed and crashes, resulting in a denial of service for legitimate users.
This is a blind SQL injection exploit for the Online Grades & Attendance v-3.2.6 CMS. It allows an attacker to inject SQL queries into the application's database without the application providing any visible error messages. This can be used to extract sensitive information from the database or to modify its contents.
iPool 1.6.81 discloses passwords to local users. The exploit allows an attacker to retrieve passwords stored in the MyDetails.txt file.
The Unclassified NewsBoard 1.6.4 (and maybe lower) CMS is affected by multiple remote vulnerabilities, including remote SQL injection, logs file disclosure, local file inclusion/remote command execution, and full path disclosure.
iSnooker 1.6.8 discloses passwords to local users.
The vulnerability exists in the ICQ 6.5 URL Search Hook/ICQToolBar.dll .URL file processing in Windows Explorer. By placing a specially crafted .URL file on the desktop or in a network folder, an attacker can cause the explorer.exe process to exit with code 1282, resulting in a denial-of-service condition. This vulnerability can also affect Internet Explorer.