This exploit demonstrates the exploitability of the sock_sendpage() NULL pointer dereference vulnerability on ppc and ppc64 architectures. It utilizes the SELinux and mmap_min_addr issues to exploit the vulnerability on Red Hat Enterprise Linux 5.3 and CentOS 5.3. The vulnerability affects Linux kernel versions from 2.4.4 to 2.4.37.4, and from 2.6.0 to 2.6.30.4.
The Modern Script 5.0 index.php file is vulnerable to a remote SQL injection attack. By manipulating the 's' parameter in the URL, an attacker can execute arbitrary SQL queries on the database.
Exploit for IIS 5.0 FTPd that allows remote root access. Targets Windows 2000 SP4. Affects IIS 6 with stack cookie protection. Metasploit shellcode is used to add the user 'winown:nwoniw'.
The vulnerability allows remote attackers to execute arbitrary commands via the index.cgi script, related to improper shell metacharacter handling in the art parameter.
This exploit takes advantage of a buffer overflow vulnerability in the Yager game version 5.24. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted packet. The exploit targets the binkw32.dll library in Windows XP Pro SP1 GER.
This exploit allows remote attackers to execute arbitrary code via a long string in a request to the HTTPS service.
This exploit allows an attacker to execute arbitrary code or crash the ProShow Producer and ProShow Gold versions 4.0.2549 by creating a specially crafted .psh file. The vulnerability is caused by a buffer overflow in the parsing of the file header.
The validation of some ftp commands are not made by the server. This leads to a DoS.
Bug is present in <= 2.6.31-rc7, but the impact is limited to <= 2.6.24.4 as AF_LLC sockets have been restricted to CAP_NET_RAW since then. Only 5 bytes of uninitialized kernel stack are leaked via AF_LLC's getsockname().
This exploit is for Media Jukebox 8 (.M3U) which is a universal local buffer overflow vulnerability. It exploits a SEH (Structured Exception Handling) vulnerability in the program. The exploit uses a combination of NOP sled and shellcode to gain control of the program's execution flow.