The vulnerability exists in the id parameter of Microsoft Outlook Web Access (OWA) version 8.2.254.0. Attackers can exploit this vulnerability to disclose sensitive information.
This code is for educational/testing purposes by authorized persons on networks systems setup for such purposes. The code crashes services.exe on the target, effectively bringing down the target against which it's run.
The Open&Compact Ftp Server 1.2 is vulnerable to a remote denial of service attack. By sending a specially crafted "PORT" command, an attacker can cause the server to crash, resulting in a denial of service condition.
The Spaw Editor versions 1.0 and 2.0 are vulnerable to remote file upload. The exploit allows attackers to upload arbitrary files to the server. This can lead to remote code execution or unauthorized access to sensitive information.
This is an exploit for SyncBack Freeware V3.2.20.0. It utilizes a SEH vulnerability.
This PoC will crash the Ethereal due to a buffer overflow in the SLIMP3 dissector. The vulnerability was discovered by the vendor and coded by Sowhat. It affects versions 0.9.1 to 0.10.12 of Ethereal.
This is a format string exploit for Vertias Netbackup on Win32 systems. The exploit code overwrites either the PEBFastlock or SEH depending on the target system. The exploit is designed for Windows 2000 and Windows XP pre-SP2 for the PEBFastlock overwrite, and Windows XP SP2 for the SEH overwrite. The exploit code is available at the website digitalmunition.com.
The Joomla Component com_crowdsource is vulnerable to SQL Injection. An attacker can exploit this vulnerability to execute arbitrary SQL commands on the underlying database.
This is an exploit for a format string vulnerability in VERITAS NetBackup on Linux/x86. The exploit allows for remote code execution with root privileges. The vulnerability was discovered by kf_lists[at]digitalmunition[dot]com and the exploit was developed by johnh[at]digitalmunition[dot]com. The exploit works by sending a specially crafted request to the target server, triggering the format string vulnerability and executing the provided shellcode.
This exploit allows an attacker to execute remote commands on a system running e107 version 0.617. The attacker can inject SQL queries and execute arbitrary code on the target system.