This exploit is a denial of service attack against Microsoft IIS servers. It sends a malformed HTTP request to the server, which causes the server to crash. The exploit is triggered by sending a specially crafted HTTP request with a range header containing a byte range that is out of bounds. The exploit is triggered by sending a specially crafted HTTP request with a range header containing a byte range that is out of bounds.
This exploit allows an attacker to execute arbitrary commands on a vulnerable server running PhpDocumentor <= 1.3.0 rc4. The attacker can send a malicious payload to the vulnerable server and execute arbitrary commands on the server.
This is a simple Denial of Service attack against Internet Explorer 6.0.2900.2180.xpsp_sp2. When a user visits a malicious web page, the browser will crash.
This code snippet provides a header file used for managing errors in Windows. It supports socket and errno too.
This module exploits a vulnerability in the GDI library included with Windows XP and 2003. This vulnerability uses the 'Escape' metafile function to execute arbitrary code through the SetAbortProc procedure. This module generates a random WMF record stream for each request.
This exploit allows an attacker to execute arbitrary commands on a vulnerable server running PHPGedView 3.3.7 or earlier. The attacker must have access to the Apache web server in order to launch the exploit. The exploit requires the attacker to fill in the requested fields, after which the attacker can execute arbitrary commands on the vulnerable server.
Passing a malformed URL to an executable directory a few times can cause inetinfo.exe to crash.
This exploit is a remote root exploit for Mercury Mail Transport System 4.01b. It is a 316-byte shellcode that is sent to the target system via the HELO command. The exploit is triggered when the target system attempts to process the malicious command.
This PoC exploits a buffer overflow vulnerability in Windows 2000 Server SP4. It sets up a fake web server and when the server is scanned with AppScan QA, either in Interactive or Manual mode, a 'You are vulnerable!' popup is displayed.
This module exploits a stack overflow in the authorization code of the Oracle 9i HTTP XDB service. David Litchfield, has illustrated multiple vulnerabilities in the Oracle 9i XML Database (XDB), during a seminar on 'Variations in exploit methods between Linux and Windows' presented at the Blackhat conference.