This exploit allows a remote attacker to execute arbitrary commands on a vulnerable WIKEPAGE <= V2006.2a Opus 10 system. The attacker sends a malicious HTTP request containing a crafted User-Agent header with PHP code to the vulnerable server. The code is then written to the server's log file, which is then executed by the attacker.
This exploit allows an attacker to execute arbitrary commands on a vulnerable server running VistaBB version 2.x or lower. The exploit sends a malicious POST request to the vulnerable server, which contains a malicious cookie that points to a malicious PHP shell. The malicious PHP shell then executes the command sent in the POST request.
This exploit allows an attacker to execute arbitrary commands on a vulnerable server. It is done by sending a specially crafted HTTP POST request to the vulnerable server, which contains a malicious cookie. The malicious cookie contains a URL to a PHP shell, which is then executed by the server.
SpiderZ ForumZ Security exploit allows an attacker to inject malicious SQL commands into vulnerable phpBB versions 2.0.x - 2.0.21. The attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains malicious SQL commands that are executed in the context of the vulnerable application.
This exploit allows an attacker to inject malicious SQL code into the MercuryBoard <= 1.1.4 application. This can be used to gain access to the application and escalate privileges.
This PoC makes an evil_request and sends it to the server, when the server processes it, the request causes the modem to reset.
A heap overflow vulnerability exists in Mdaemon POP3 preauth. An attacker can send a specially crafted USER command with a large number of '@' characters followed by a 'B' character to trigger the overflow. This can allow the attacker to execute arbitrary code on the vulnerable system.
This exploit is a denial of service vulnerability in FTP servers. It sends a specially crafted payload to the FTP server, which causes it to crash. The payload consists of a series of FTP commands, such as USER, PASS, and QUIT, followed by a series of 0x0D and 0x0A characters. When the server receives this payload, it crashes.
A vulnerability exists in Simple Machines Forum (SMF) version 1.1.RC2 and earlier. The vulnerability is due to an error in the 'lock' parameter when handling a topic. This can be exploited to delete arbitrary keys or indexes from the Zend Hash Table, resulting in a denial of service.
A security vulnerability in the "/usr/ucb/ps" (see ps(1B)) command may allow unprivileged local users the ability to see environment variables and their values for processes which belong to other users (Sun Alert ID: 102215).