Log in with username Administrator'/* from admin/index.php page.
The exploit allows an attacker to retrieve sensitive information from the MyPHP Forum database, such as the administrator's name and password hash.
This exploit targets Prozilla version 1.3.7.3 and takes advantage of a format string vulnerability. The vulnerability allows an attacker to execute arbitrary code or crash the application by providing a specially crafted format string as input. The exploit is not reliable as the previous stack overflow exploit. The Gentoo security team and Prozilla developers failed to spot this vulnerability. More information can be found at the website www.siyahsapka.org or deicide.siyahsapka.org.
This exploit allows an attacker to gain remote shell access to ELOG versions up to 2.5.6. It is a fully automated filling mechanism that steals and decodes base_64 ELOG write passwords. By targeting a specific memory address, the exploit determines the version of ELOG and adjusts its attack accordingly. Note that the buffer length may vary depending on the Linux distribution. It is recommended to perform a port scan to identify the ELOG port, especially on hosts using ELOG daemon under Apache mod_proxy module. If the write password for a logbook cannot be obtained, other logbooks should be tried. The exploit currently supports up to 10 attributes/options in a logbook.
This exploit allows for remote extraction of admin credentials, file disclosure, and remote command execution via SQL Injection in the Bloggeruniverse v2Beta web application. The vulnerability exists in the '/editcomments.php?id=[sql_string]' parameter.
This exploit allows an attacker to retrieve local user passwords from DelphiTurk FTP v1.0. The exploit uses a vulnerability in the application to read the password data from the 'profile.dat' file.
The webframe 0.76 script is vulnerable to Rfi/Lfi attacks. The vulnerabilities are present in the following files: /mod/admin/doc/index.php (line 3), /mod/index.php (lines 5, 7, 9, 11, 13), and /mod/base/menu.php (line 17). These vulnerabilities allow an attacker to include and execute arbitrary files from the server.
This exploit creates a new admin with a specified password and allows the attacker to gain administrative control of the webPortal. The exploit is for phpNUKE v7.4. References: http://www.osvdb.org/9563. Coded by Silentium of Anacron Group Italy on 07/02/2005. Contact: anacrongroupitaly[at]autistici[dot]org. Developed under GPL license.
This is a buffer overflow exploit for the Oracle XDB FTP Service. The exploit allows an attacker to gain control of the Oracle system.
This exploit allows an attacker to execute arbitrary code on a vulnerable Seti@Home application. It takes advantage of a vulnerability discovered by SkyLined. The exploit requires the use of a DNS spoofing utility.