Plain vanilla stack overflow in the PASS command
Google's chrome browser suffers from a remote denial of service vulnerability when trying to follow a href link of the following form: <a href="/crash/crash/crash/.../crash/crash">crashme</a>. Please note that the dots stand for a lot of "/crash/" subdirectories. When hovering the mouse above the link or trying to click on it, it will result in an immediate crash with all opened tabs.
Remote exploit for MailCarrier that allows for buffer overflow.
This is a remote buffer overflow exploit for MiniShare, a file sharing web server. The exploit allows an attacker to gain unauthorized access to the server.
This Perl script is designed to crash a secure network messenger by flooding it with empty packets. It prompts the user to enter the host to crash and establishes a TCP connection on port 6144. It then sends a series of empty packets to the target host, causing it to crash. The script attempts to establish the connection 15 times.
This exploit targets Sun Solaris 8, 9, 10, and OpenSolaris versions prior to snv_96. It allows an attacker to execute arbitrary commands on the target system by exploiting a vulnerability in the snoop command. The vulnerability was discovered by Gael Delalleau and is documented in SecurityFocus BID 30556.
A vulnerability exists in an unchecked buffer located in the project files (.mx4) for Acoustica Mixcraft4. The buffer should contain the file name of an image located in "C:Program FilesAcoustica Mixcraft 4mixrezicons" on a default install of Mixcraft, and would be used as the icon for a specific "track" or "instrument" in Mixcraft.
This exploit targets a buffer overflow vulnerability in the Microsoft Visual Studio (Msmask32.ocx) ActiveX control. It allows an attacker to execute arbitrary code on a remote system.
This is a remote SQL injection vulnerability in the forum mybb <= 1.2.11. The vulnerability allows an attacker to execute arbitrary SQL queries through the 'message' parameter in the 'private.php' page. The exploit uses the 'options[disablesmilies]' parameter to inject the SQL query.
The K-Rate application is vulnerable to SQL-injection and both active and passive XSS attacks. The SQL-injection vulnerability is present in the 'dele_cpac.php', 'payment_received.php', 'functions.php', and 'chat.php' files. The XSS vulnerability can be exploited through various URLs, as mentioned in the text.