This exploit is successfully work when magic_quotes_rpc off. It allows an attacker to execute arbitrary commands on the vulnerable system.
This exploit allows an attacker to delete any file type from the directory in which the Internet Access Manager is installed. The attacker must have valid credentials to the FTP server in order to exploit this vulnerability.
This exploit allows an attacker to remotely execute commands on a vulnerable system running man2web, man2html, or man-cgi cgi-scripts. It was found and coded by tracewar (darklogic team) for educational purposes only.
This exploit is a buffer overflow vulnerability in the FREE SMTP Spam Filter software. It allows an attacker to send malicious code to the server, which can be used to execute arbitrary code on the server. The exploit is triggered by sending a specially crafted email with a malicious payload to the server. The malicious payload contains a JavaScript code that will be executed when the user hovers over a link in the email.
This exploit is used to cause a denial of service (DoS) attack on the P2P Pro software. It sends a malicious packet to the target system which causes the system to crash. The malicious packet contains a string of characters which are not recognized by the system and causes it to crash.
This program is for educational purposes only! SimplePHPBlog as a few vulnerability which this perl script demonstrates via an exploit.
A buffer overflow vulnerability can be exploited remotely by an unauthenticated attacker who can access the DameWare Mini Remote Control Server. By default (DameWare Remote Control Server) DWRCS listens on poort 6129/TCP. The vulnerability is caused due to a boundary error within the handling of the 'DAMEWARE-BROWSER-REQUEST' packet. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted packet to the affected service. Successful exploitation may allow execution of arbitrary code with SYSTEM privileges.
The Internet Gopher Client is based on the UMN Gopher/Gopherd 2.3.1 code. Gopher is an Internet technology that predates the Web. It presents information as a virtual network-wide filesystem. Modern browsers such as Konqueror can display gopherspace as if it contained files on your local machine (trees, drag and drop, etc.), but the difference is that each file or folder in that tree may be on a different machine. This client contains a remotely exploitable buffer overflow in the processing of “+VIEWS:” information, located in SRC/object/VIews.c in the VIfromLine() function. This is a stack overflow that can be exploited immediately upon the client's connection to an untrusted gopher server.
Adobe Version Cue's VCNative program allows un-privileged local users to load arbitrary libraries('bundles') while running setuid root. This is done via the '-lib' command-line option. An attacker can exploit this vulnerability by listening to an arbitrary local port and using the localhost('127.0.0.1') to connect to.
FakeP is a tool used to detect the TCP/IP fingerprinting of a remote host. It is written in C and is vulnerable to a buffer overflow vulnerability due to improper bounds checking when handling user-supplied input. This can allow an attacker to execute arbitrary code on the vulnerable system.