This exploit is used to gain access to the Joomla com_ijoomla_archive component. It uses a blind SQL injection vulnerability to gain access to the password of the user with the given ID. The exploit works by sending a request to the server with the given user ID and a boolean expression. If the expression is true, the length of the response will be different than if the expression is false. By comparing the length of the response, the exploit can determine the value of the boolean expression and thus gain access to the password.
A denial-of-service vulnerability exists in the fts_*() functions of multiple vendors, which could allow an attacker to cause a denial-of-service condition. The vulnerability is due to an error in the fts_open() function, which can be used to traverse a file hierarchy. By supplying a specially crafted path to the fts_open() function, an attacker can cause a denial-of-service condition.
This exploit is a Universal Seh Overwrite Exploit which is used to exploit a vulnerability in Media Commands (m3u File). It was founded by Hakxer and exploited by His0k4 and Stack. It was tested on Windows XP Pro SP2 Fr.
This vulnerability allows a guest to view username and password list, view reserved information of any user and bypass authentication.
This exploit allows remote code execution by using the PackageFiles() method of the SupportSoft DNA Editor Module (dnaedit.dll v6.9.2205). The exploit injects a file path into msinfo.htm, which can be used to execute arbitrary code.
This exploit is for a local buffer overflow vulnerability in Media Commands .m3l. The vulnerability is caused due to a boundary error when handling user supplied data. This can be exploited to cause a stack-based buffer overflow by sending an overly long string to the affected application. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the application.
A vulnerability in Easy Web Password V1.2 allows an attacker to cause a denial of service (DoS) condition by overwriting the EDX register with 0x41414141. This can be exploited by an attacker to cause a denial of service condition by sending a specially crafted .ewp file to the victim.
A vulnerability exists in Easy File Sharing Web Server 4.8 which allows an attacker to view the contents of any file on the server. This is done by sending a specially crafted HTTP request to the server. The request contains a parameter 'vfolder' which is used to specify the file to be viewed. By using a relative path, an attacker can view any file on the server.
This exploit is based on the code found by str0ke in the wild for MS09-002. It is tested using Internet Explorer 7.0.5730.11 on Windows XP SP2. The exploit uses a win32_exec payload to execute a calc.exe command. It uses a heap spray technique to spray the heap with the payload and execute it.
A SQL injection vulnerability exists in Jogjacamp JProfile Gold, which allows an attacker to execute arbitrary SQL commands via the 'id_news' parameter in a 'news.detail' action to the 'index.php' script.