This is an exploit for UBB.Threads version 6.2.* - 6.3.*. It uses a one char brute technique.
Exploits a format string hole in mSQL.
This program attempts to utilize the vulnerabilities described in CAN-2004-0932 - McAfee, CAN-2004-0933 - Computer Associates, CAN-2004-0934 - Kaspersky, CAN-2004-0937 - Sophos, CAN-2004-0935 - Eset, CAN-2004-0936 - RAV. It scans a zip file and patches it according to the vulnerabilities.
A special string submitted to the server will cause an access violation. Poc included crash the server.
Fails to sanitize pointers sent from usermode with METHOD_NEITHER in hcmon.sys. This code can be reached by sending 0x8101232B IOCTL to \.hcmon device.
The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP, UDP, and ICMP packets.
This vulnerability in ESET Smart Security 3.0.667.0 allows an attacker to escalate privileges by exploiting a flaw in the easdrv.sys driver. By sending a specific IoControlCode to the device, an attacker can overwrite memory and execute arbitrary code in kernel mode. This can lead to a denial of service (BSOD) or potentially allow the attacker to take control of the affected system.
Sending a username and a buffer of 1500 bytes as a password to the WinFTP server version 1.6 will crash the server. The server will crash when it is not minimized on the target computer, or when it stops being minimized. If the exploit is used in a loop without ending, the server will be unable to restart. Most commands of the FTP service are vulnerable.
This exploit targets a vulnerability in FlashGet 1.9.0.1012 (FTP PWD Response) where a stack overflow can occur. The exploit code is written in Perl and uses a specially crafted payload to trigger the vulnerability. The exploit has been tested on Windows XP SP1 Hebrew. The victim needs to be linked to a file on a FTP server to trigger the exploit. The exploit includes a shellcode that executes arbitrary commands on the target system.
The code snippet is exploiting a vulnerability in the binfmt_elf executable file parser. It uses a combination of assembly instructions to manipulate memory and execute arbitrary code. This vulnerability allows an attacker to execute malicious code with the privileges of the process executing the vulnerable binary. The specific vulnerability being exploited is not mentioned in the code snippet.