Sending between 40-1000 requests to nonexisting pages on the HTTP server (httpsv1.6.2) will cause the process to crash.
This is an exploit for the Traidnt UP v2.0 script that allows for SQL injection. The exploit was discovered and written by Jafer Al-Zidjali. The vulnerability occurs when the magic_quotes_gpc setting is turned off. The author has been notified and a public patch has been released for this vulnerability.
This exploit takes advantage of a heap overflow vulnerability in Microsoft Exchange, specifically in the X-LINK2STATE chunk. It allows an attacker to execute arbitrary code on a vulnerable system.
Exploit allows remote code execution through a buffer overflow vulnerability in the Playlistmaker application. The exploit takes advantage of a vulnerable SEH chain to gain control of the program.
This vulnerability allows an attacker to inject SQL queries into the application's database, potentially gaining unauthorized access or modifying data.
This is a buffer overflow exploit for the PMSoftware Simple Web Server. It allows an attacker to execute arbitrary code on the target system.
The WheresJames Webcam Publisher Beta 2.0.0014 is vulnerable to a buffer overflow. The exploit allows an attacker to overwrite the SEH handler and execute arbitrary code.
The Firelinking - Proof-of-Concept is a proof-of-concept exploit designed for Firefox 1.0.2. It takes advantage of a bug in bugzilla #290036 to execute arbitrary JavaScript code in the context of the user's browser.
This is a proof of concept exploit for the vulnerability in VLC Media Player version 1.0.0 and 1.0.1. It exploits a remote stack overflow vulnerability in the handling of smb:// URIs. By sending a specially crafted URI, an attacker can cause a stack overflow and potentially execute arbitrary code on the target system.
This exploit targets the FTPShell Client version 4.1 RC2 on Windows XP SP3. It exploits a stack overflow vulnerability in the 'Name Session' feature of the program. The exploit code contains a shellcode for executing the 'calc.exe' program. The exploit is coded by 'zec' and can be contacted at zec@bsdmail.com.