This exploit allows bypassing the remote login functionality in the al3jeb script. It only works when magic_quotes_gpc is turned off. The vulnerability exists in the login.php file, where user input is not properly sanitized before being used in a SQL query, allowing an attacker to log in without a valid username and password combination.
Modified 1360. byte to 44, 1361. to 43, 1362. 42, 1363.byte to 41 of a sample swf file, ran it and crash occurred.
This exploit targets SlimFtpd version 3.15 and 3.16. It allows an attacker to execute arbitrary code on a vulnerable system by sending a specially crafted request to the FTP server. The exploit takes advantage of a buffer overflow vulnerability in the LIST command handling code of the server. By sending a long string as the argument to the LIST command, an attacker can overwrite the return address on the stack and gain control of the program execution flow. This exploit includes a payload that launches a shell on the target system.
This is a local buffer overflow vulnerability in Audiotran v1.4.1. The exploit allows an attacker to execute arbitrary code by overwriting the return address with a JMP ESP instruction from USER32.DLL.
The Joomla Component com_pc is vulnerable to Local File Inclusion. An attacker can exploit this vulnerability by manipulating the 'controller' parameter in the URL to include arbitrary files from the server, such as sensitive system files like '/etc/passwd'.
This exploit takes advantage of a stack buffer overflow vulnerability in the JPEG processing code of a specific application. By controlling the size field of a certain data structure, an attacker can overwrite the stack content and potentially execute arbitrary code.
The RoseOnlineCMS version <= 3 B1 is vulnerable to a remote login bypass exploit. This exploit works only when the magic_quotes_gpc setting is turned off.
This exploit allows remote attackers to bypass the login functionality in MoME CMS version 0.8.5. It works only when magic_quotes_gpc is turned off. The vulnerability is discovered by cr4wl3r and the code snippet provided shows how the exploit works.
This exploit targets a buffer overflow vulnerability in Apple iTunes 8.1.x (daap). The vulnerability is identified as CVE-2009-0950. The exploit is coded by Simo36 and His0k4. It allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted daap:// URL. The exploit sends a malicious packet to the target and opens a connection on port 4444. The target system is then compromised and can be accessed remotely.
The application Help Desk Php Script is vulnerable to XSRF. An attacker can change the admin cookies.