This is a proof-of-concept exploit for a SQL injection vulnerability in phpBB version <=2.06. By manipulating the search_id parameter, an attacker can execute arbitrary SQL statements. The exploit retrieves the MD5 hash for a user with a specific user_id.
This exploit allows remote code execution in Mozilla Firefox version 1.04 and below. It takes advantage of a vulnerability in the InstallVersion->compareTo function.
This module exploits a SQL injection flaw in the Lyris ListManager software for Microsoft SQL Server. This flaw allows for arbitrary commands to be executed with administrative privileges by calling the xp_cmdshell stored procedure. Additionally, a window of opportunity is opened during the ListManager for MSDE install process; the 'sa' account is set to the password 'lminstall' for a 5-10 minute period. After the installer finishes, the password is permanently set to 'lyris' followed by the process ID of the installer (a 1-5 digit number).
This exploit allows an attacker to bypass the login functionality in Website Baker version 2.6.0 and execute remote commands. It works when magic_quotes_gpc is turned off. The attacker needs to launch the exploit from Apache, fill in the requested fields, and then execute the commands.
This exploit targets eZ versions 3.3 to 3.5. It exploits a vulnerability in the Cryptso.dll file, which contains a 'static' jmp esp instruction. The exploit jumps to esp and then jumps backward to reach the shellcode. The shellcode provides a reverse remote shell. The exploit uses the PEB technique for the universal shellcode.
This exploit allows an attacker to perform blind SQL injection and execute remote commands on a Zen-Cart <= 1.2.6d website. It works regardless of whether magic_quotes_gpc is enabled or not.
The exploit code provided in the text is a proof of concept for a memory corruption vulnerability. The code attempts to write a pointer to a specific memory location, but due to the limitations of the controlled length, it chooses a different memory address. The code has been tested on multiple systems, with a success rate of only 5 out of 10+. The author mentions that this vulnerability can be avoided, but triggers a segfault instead.
The crafted metafile (WMF) crashes Windows Explorer when viewed. The issue occurs when the 'mtNoObjects' field in the Metafile header is set to 0x0000. This code was tested on Windows 2000 server SP4 and does not occur with the hotfix for GDI (MS05-053) installed.
This is a proof of concept exploit for the MSDTC (Microsoft Distributed Transaction Coordinator) vulnerability. It allows remote attackers to execute arbitrary code on a vulnerable Windows system.
This exploit allows an attacker to overwrite global variables in Mambo version 4.5.2, leading to remote command execution. The exploit was coded by rgod and can be launched from Apache. The attacker needs to fill in the requested fields before executing the exploit.