This exploit allows an attacker to gain system privileges on BulletProof FTP Server v2.4.0.31. The attacker can execute arbitrary commands with system-level privileges.
The OpenSiteAdmin 0.9.7 BETA version is vulnerable to remote file inclusion. An attacker can exploit this vulnerability by injecting a malicious file path in the 'path' parameter of the 'pageHeader.php' file. This allows the attacker to include and execute arbitrary files on the server.
This exploit takes advantage of a remote buffer overflow vulnerability in Quiksoft EasyMail 6. The vulnerable method is AddAttachment. The latest version of the software does not support this method. The exploit was created out of boredom and interest sparked by a similar post. For more details, refer to the advisory at http://www.bmgsec.com.au/advisory/48/.
This is a Proof of Concept (POC) for a stack buffer overflow vulnerability in Notepad++ version 5.4.5. The vulnerability allows an attacker to overwrite the stack and potentially execute arbitrary code.
This exploit takes advantage of a format string vulnerability in the Snmppd SNMP proxy daemon. The vulnerability allows an attacker to hijack the Global Offset Table (GOT) entry of the strdup function. The exploit is successful on the third attempt.
This is a scanner program written in C that is used to scan for the second dcom vulnerability (MS03-039). It is based on the work of buildtheb0x, kid, and farp, and also on packet sniffs of MS's dcom2 scanner.
This exploit allows an attacker to gain remote root access by exploiting a stack overflow vulnerability in Golden FTPd. The exploit code binds port 4444 on the remote machine. If the return address is not correct, the FTPd will crash and the administrator will have trouble restarting it. The code must be executed, and the FTPd must be restarted or shutdown for it to work.
This is a buffer overflow exploit for SAP player 0.9 (.pla) that allows for arbitrary code execution. It exploits a vulnerability in the software's handling of .pla files, triggering a stack-based buffer overflow. By crafting a malicious .pla file, an attacker can overwrite the SEH (Structured Exception Handler) and gain control of the program's execution flow.
This exploit allows an attacker to execute arbitrary code on a vulnerable Golden FTP Server Pro version 2.5.0.0 and prior. By sending a specially crafted overflow string to the server, an attacker can gain a shell on port 4444. The exploit has been tested on Windows XP SP1 and SP2. Restarting the server is required after the exploit is successful. The workaround is to upgrade to a newer version or use another FTP server.
The exploit is used to run the Golden FTP Server Pro v2.52. After running the exploit, a bind shell is opened on port 4444.