PowerCHM 5.7 is vulnerable to a local stack overflow (SEH) vulnerability. By supplying a long URL, an attacker can overwrite the SEH chain and execute arbitrary code.
Aqua CMS v1.1 is vulnerable to authentication bypass and SQL injection. An attacker can bypass authentication by sending a POST request with a username and password set to any value. An attacker can also inject SQL by sending a cookie with a userSID set to a malicious value. This can allow an attacker to gain access to sensitive information such as usernames and passwords.
GuestCal 2.1 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable application. This can allow an attacker to include arbitrary files from the web server's file system, such as the BOOTSECT.BAK file, which can be used to gain access to the system.
This exploit sends a malformed ICMPv6 Router Advertisement packet to the victim, causing a denial of service. The exploit is written in Python and uses the Scapy library.
This exploit sends a malicious POST request with a negative Content-Length header to the target host, causing the Steamcast 0.9.75 beta server to crash.
Mongoose 2.4 (win) webserver is vulnerable to directory traversal. An attacker can exploit this vulnerability to gain access to sensitive files on the server.
This exploit is a stack overflow vulnerability in Easy RM to MP3 Converter. It is triggered when a specially crafted .pls file is opened. The exploit overwrites the EIP register with a universal address and then executes a shellcode.
Revista is a simple spanish PHP magazine editor. It suffers from multiple vulnerabilities, including Remote File Inclusion, SQLi, Credentials Bypass, and XSS. Remote File Inclusion can be exploited by sending a malicious URL to the 'adodb' parameter. SQLi can be exploited by sending malicious SQL queries to the 'id_temas', 'cadena', 'id_autor', 'email', and 'id_articulo' parameters. Credentials Bypass can be exploited by sending a malicious URL to the 'ID_ADMIN' and 'SUPER_ADMIN' parameters. XSS can be exploited by sending malicious code to the 'cadena' and 'email' parameters.
Attacker can inject SQL code in events_view.php vulnerable parametr eid and events_clndr_view.php vulnerable parametr id. Stored XSS vulnerability found in script blogs_full.php. Linked XSS vulnerabiliies found in groups_profile.php and adv_cat.php.
Steamcast is vulnerable to a remote buffer overflow exploit when a maliciously crafted HTTP request is sent to the server. This exploit uses a Structured Exception Handler (SEH) overwrite to gain control of the program flow. The exploit was discovered by Luigi Auriemma and tested on Windows XP SP2 (FR).