This exploit targets a blind SQL injection vulnerability in PhpWebGallery version 1.3.4. By exploiting this vulnerability, an attacker can extract sensitive information from the database. The exploit uses a brute force technique to guess the characters in the database.
This script exploits a buffer overflow vulnerability in the DMS POP3 Server for Windows 2000/XP version 1.5.3 build 37. By sending a long string of 'A' characters as the username, it crashes the server and potentially allows for remote code execution. The exploit attempts to kill the DMS POP3 service by sending the malicious username and then checks if the service is still running. This vulnerability was discovered in 2004.
This exploit demonstrates a buffer overflow vulnerability in a mail server.
This is a proof of concept for a TWiki vulnerability that allows remote code execution. The vulnerability was discovered and exploited by RoMaNSoFt in 2004. The exploit allows an attacker to execute arbitrary commands on the target system.
This exploit allows an attacker to bypass the security features of Windows XP SP2 by using the execCommand 'SaveAs' function. By tricking a user into downloading a malicious executable file masquerading as an HTML document, the attacker can bypass the 'File Download - Security Warning' and 'Open File - Security Warning' prompts.
The live-tv-script has an SQL Injection vulnerability that allows an attacker to extract sensitive information from the database.
This exploit targets a vulnerability in Compressed (zipped) Folders in Microsoft Windows. It allows an attacker to execute arbitrary code by creating a malicious zip file and tricking the user into opening it. The vulnerability was discovered by Tarako and was first reported in an advisory by eEye Digital Security. This exploit was tested on Windows XP SP0 Spanish/English.
This exploit allows an attacker to execute arbitrary code remotely by exploiting a buffer overflow vulnerability in the winsock2.h library. The exploit uses a specially crafted payload to overwrite memory and gain control over the target system.
The /inc/inc_statistics.php script accepts unfiltered $_COOKIE's, ($_COOKIE['stats_res']) which later goes to MySQL request. This exploit tries to create a shell in /uploads/media/defined.php.
This exploit launches calc.exe by taking advantage of a buffer overflow vulnerability in Numark Cue 5.0 rev 2. The buffer overflow occurs when processing a .M3U file, with a 500-byte buffer causing the exception. The exploit has been tested on Windows XP Pro SP3, compiled with Dev-C++ 4.9.9.2.