This exploit is a Denial of Service (DoS) attack that targets a server's remote file manager. It sends a specially crafted request to the server, causing it to crash or become unresponsive.
By sending a crafted GET request [GET /AUX HTTP/1.1] to the server, the server crashes!
Cherokee Web Server <= 0.5.4 is vulnerable to remote directory traversal attack by accessing files outside of the webroot directory.
This exploit utilize two ways for exploiting vulnerability present into Hosting Controller. This exploit create new user with relative passwd and registered your host with mail server into Hosting Controller software.
This HTML page includes a JavaScript file from a GitLab repository. The specific JavaScript file is 986.js (also known as 05072005.js) and it is loaded using the script tag. The purpose and functionality of this script are unknown as the code is not provided in the given text. The author of this HTML page is mentioned as 'str0ke'.
There is an interesting vulnerability in the code of ajaxfilemanager/ajax_save_name.php. The vulnerability allows for the disclosure of the admin password.
The SMB dissector in Ethereal versions 0.9.0 to 0.10.10 could cause a segmentation fault and throw assertions, leading to a denial of service.
The com_tupinambis component in Mambo/Joomla is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a malicious request to the verproyecto function, allowing them to extract sensitive information from the database.
Avast's aswMon2.sys Driver does not sanitize user supplied input IOCTL, leading to a kernel memory corruption that propagates on the system with a BSOD and potential risk of Privilege Escalation.
The DataTrac Activity Console is vulnerable to a Denial of Service (DoS) attack. This exploit sends a malicious procedure to the server, causing it to become unresponsive and effectively denying service to legitimate users. The exploit code is written in C and uses the winsock2 library for network communication. It resolves the host, establishes a connection, and sends the bad procedure, resulting in the server being DoS'ed.