This exploit is used to launch a Denial of Service (DoS) attack against a Remote Control Server. It is tested on Windows 2000 SP4 (Win NT). The exploit is built using a socket connection and sending a malicious payload to the server. The payload contains a shellcode which is used to crash the server.
A buffer overflow vulnerability exists in Windows Winsock error handling due to improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted packet to the target system, resulting in a denial of service or the execution of arbitrary code.
This vulnerability allows an attacker to cause a denial of service (DoS) condition on a vulnerable system. The vulnerability is due to an error in the handling of certain parameters passed to the 'VCConnectionManagerEnumConnection' interface of the 'Netman' service, which is hosted by the 'svchost.exe' process. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable system. This will cause the 'svchost.exe' process to crash, resulting in a denial of service condition.
This exploit allows an attacker to steal cookies from a vulnerable website. The attacker can create a malicious file, such as cookies.php, and upload it to the vulnerable website. The attacker can then use the steal.php file to access the cookies.txt file and steal the cookies from the website.
The 'Set As Wallpaper' dialog takes the image url as a parameter without validating it, allowing to execute javascript in chrome and to run arbitrary code. By using absolute positioning and the moz-opacity filter an attacker can easily fool the user to think he is setting a valid image as wallpaper.
This exploit is a denial of service attack against the Remote File Explorer service. It sends a malicious procedure to the server, which causes it to crash. The exploit was tested on Windows 2000 SP4.
Hosting Controller is an application to manage a host. An authenticated user can change his/her credit and buy some services by exploiting the AccountActions.asp vulnerability. The exploit code to proof is provided in the text.
This exploit allows an attacker to inject malicious JavaScript code into a vulnerable web application. The malicious code is executed when a user visits the vulnerable page. This exploit targets PhpBB 2.0.16, a popular open source forum software. The malicious code is injected into the application using a specially crafted URL.
AnalogX SimpleServer WWW 1.05 is vulnerable to a Denial of Service attack. Sending a GET request with a large amount of data (4500 bytes) will cause the server to crash.
This exploit is used to launch a Denial of Service (DoS) attack against a PrivaShare TCP/IP server. The exploit sends a malicious packet containing a list of contacts and a string of 'DOS ATTACK!' messages to the server, which causes the server to crash. The exploit has been tested on Windows 2000 SP4.