This exploit is a local buffer overflow exploit for ePSXe v1.*. It uses a stack pointer (ESP) to overwrite the return address of the function with the address of the shellcode. The exploit then executes the shellcode which gives the attacker a root shell.
This exploit show the MD5 crypted password of the user id you've chose.
Bitrix Site Manager is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
This exploit allows an attacker to bypass authentication in the PHPStat 1.5 web application. By sending a specially crafted HTTP request, an attacker can gain access to the application as the administrator.
Hosting Controller is an application to manage a host. An authenticated user can change other's profiles, email address and then use forgot password to recieve their password! Also he/she can gain administrator password by this way.
This exploit allows an attacker to bypass authentication and gain access to a user account without knowing the user's password. The exploit works by sending a specially crafted cookie to the server, which contains a malicious SQL query that will return the user's password. The attacker can then use the cookie to gain access to the user's account.
A remote user can inject his/her code in 'memKey' var and change other users password in password.asp. Exploit codes to proof are provided in the text.
WebMax Portal is vulnerable to a password reset vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable application. This will allow the attacker to reset the password of any user in the application.
This Xpl Change Admin's Pass in This Portal !! Discovered by: s d <irsdl@yahoo.com>
This exploit is used to get the hash of a user with a given userid from a Woltlab Burning Board version 2.3.1 or lower. It uses a POST request to the board with a malicious string to get the hash.