NetCat versions 3.12 and lower are vulnerable to multiple remote vulnerabilities. These vulnerabilities include:1. Multiple File Including Vulnerabilities: Due to direct access to certain files, it is possible to redefine internal variables that are passed as arguments in the include() function. Examples of vulnerable files include /netcat/modules/netshop/post.php?system=../../../../.htaccess%00.2. Blind SQL Injection Vulnerabilities: Examples of vulnerable files include /netcat/modules/auth/password_recovery.php?=1'SQL_code.3. Multiple Cross-site Scripting Vulnerabilities: Examples of vulnerable files include /netcat/admin/siteinfo/iframe.inc.php?path=http://ha.ckers.org/scriptlet.html".4. HTTP Response Splitting: Examples of vulnerable files include /netcat/modules/auth/index.php?logoff=1&redirect=http://www.google.com.5. CRLF injection: This vulnerability exists when setting the value %0a in COOKIE variables. It has been found in the file /netcat/add.php.
This proof-of-concept demonstrates the existence of the vulnerability reported by iDEFENSE (iDEFENSE Security Advisory 01.14.05). It allows an attacker to execute arbitrary code on a vulnerable system. The exploit has been tested against exim-4.41 under Debian GNU/Linux.
This exploit targets the psi jabber client running on port 8010/tcp. It sends a specific payload that causes the client to crash, resulting in a denial of service. The exploit works on both Windows and Linux systems. The exploit was created by sha0[at]badchecksum.net. More details can be found on the author's blog at http://jolmos.blogspot.com.
The Joomla component com_volunteer is vulnerable to SQL injection. An attacker can exploit this vulnerability by manipulating the job_id parameter in the URL to execute arbitrary SQL queries. This can lead to unauthorized access, data leakage, and potential remote code execution.
This is a SQL injection exploit for ITA Forum 1.49. It uses one character brute force to extract information from the database. The exploit can be used to retrieve the username and password of a target user.
The Joomla Component com_tophotelmodule(id) is vulnerable to blind SQL-injection. An attacker can exploit this vulnerability to extract sensitive information from the database.
This is a proof of concept exploit for a stack overflow vulnerability in Internet Exploiter 3 v0.2. The exploit takes advantage of a vulnerability in the .ANI file format to overwrite the stack and potentially execute arbitrary code. The exploit works by placing a specially crafted .ANI file in the BODY of an HTML document. The vulnerability was discovered by Yuji Ukai of eEye Digital Security. Microsoft has released a patch for this vulnerability, which can be found at the provided link.
The 'auth.php' file in Gobbl CMS 1.0 does not properly validate user input, allowing an attacker to set the 'auth' cookie to 'ok' and gain unauthorized access to the admin panel. The exploit involves using a JavaScript code to set the cookie and then accessing the 'menu.php' file in the admin directory.
This exploit targets the sp_replwritetovarbin() function in Microsoft SQL Server. It allows for a heap overflow vulnerability. The exploit has been tested on Win2k SP4 with MSSQL 2000. The shellcode used is a modified metasploit reverse shell. This exploit requires a valid SQL account, but can also be used through SQL Injection.
Remote stack overflow vulnerability in VERITAS Backup Exec v9.1.4691.SP1, v9.1.4691.SP0, and v8.5.3572 allows remote attackers to execute arbitrary code via a crafted packet to the Agent Browser Service.