This exploit takes advantage of a format string attack vulnerability in the minerCPP 0.4b software. It allows an attacker to calculate the master cookie and get the ESP of the current thread. However, due to the BOF being in another thread, the ESP obtained may not match the required ESP, making the exploit unstable. Code execution worked 10 out of 50 times.
This exploit targets the BS Auction script and allows for SQL injection through the 'id' parameter in the articlesdetails.php file. The exploit is written in Ruby and requires the host, path, and user ID as input. It was discovered by Easy Laster.
This exploit allows for a buffer overflow in the UFO: Alien Invasion game version 2.2.1 on Windows 7. By redirecting the victim's DNS to a specific IP and having them click on the multiplayer lobby, an attacker can execute arbitrary code. The exploit has been tested on Windows 7 Ultimate x64 ENG. There is a possibility that this exploit can work on a different Windows version by changing the last bytes of the exploit code.
The Veritas NetBackup Volume Manager Daemon module is vulnerable to a stack overflow. An attacker can exploit this vulnerability by sending specially crafted data to the daemon, which can lead to remote code execution.
The phpaaCms application is vulnerable to SQL injection through the 'id' parameter in the 'show.php' page. An attacker can inject malicious SQL code through this parameter and potentially gain unauthorized access to the database.
This exploit demonstrates a SEH overwrite vulnerability in Microsoft Windows XP SP3/IE7. It allows an attacker to gain control of the EIP register and execute arbitrary code. The exploit binds a shell to port 4444.
This exploit targets Sun Java Web Server version 7.0 update 7. It is a remote code execution vulnerability that allows an attacker to execute arbitrary code on the target system. The exploit uses a combination of payload encoding, stack buffer overflow, and shellcode execution to achieve code execution. The exploit was identified by Evgeny Legerov and developed by Dominic Chell. The exploit requires the target IP address, port, and directory as input parameters. It is recommended to apply the necessary patches and updates to mitigate this vulnerability.
This exploit allows an attacker to include local files in the Seyret component of Joomla. It was discovered by _mlk_ and is applicable to versions of Seyret on Linux, BSD, and Windows.
The exploit allows an attacker to execute arbitrary code on a vulnerable system by sending a specially crafted request to the getnnmdata.exe CGI script. This vulnerability is due to an invalid hostname check in the script, which can be bypassed to execute arbitrary code. The vulnerability has been assigned CVE-2010-1555.
This exploit allows remote attackers to execute arbitrary code via a crafted ICount parameter in a CGI request to getnnmdata.exe. The vulnerability exists in HP OpenView Network Node Manager (NNM) and allows an attacker to execute arbitrary code with the same privileges as the NNM server.