This PHP script exploits a vulnerability in the PHP FFI extension to bypass the safe_mode restriction. It allows an attacker to execute arbitrary commands on the target system by passing the command as a parameter in the URL. The script checks if the FFI extension is loaded and then proceeds to execute the command using the WinExec function from the kernel32.dll library. The output of the command is stored in a temporary file, which is read and displayed on the web page. The temporary file is then deleted.
This vulnerability allows an attacker to inject SQL commands (without authentication) in 'friend_index' GET parameter.
The Joomla Component BibTeX version 1.3 and below is vulnerable to remote blind SQL injection. An attacker can execute arbitrary SQL queries by manipulating the 'afilter' parameter in the 'adminForm' form action. This can lead to unauthorized access, data leakage, and potential compromise of the Joomla website.
This exploit takes advantage of a buffer overflow vulnerability in the AIM (AOL Instant Messenger) software. By sending a specially crafted away message, an attacker can overflow a buffer and execute arbitrary code on the target system. The exploit has been modified from metasploit shellcode to operate in stealth mode and can be used on any NT type OS, like Windows 2000, Windows NT, and Windows XP.
The Joomla Component EventList version 0.8 and below is vulnerable to a remote blind SQL injection. The vulnerability allows an attacker to inject malicious SQL code through the 'did' parameter in the 'details' function of the 'com_eventlist' module. An example exploit is provided in the text.
This exploit allows an attacker to perform a blind SQL injection attack in the Joomla Component Nice Talk version 0.9.3 or earlier. By injecting malicious SQL code into the 'tagid' parameter of the component, an attacker can retrieve sensitive information from the database.
The Joomla Component RSfiles version 1.0.2 and below is vulnerable to remote file download. An attacker can exploit this vulnerability by sending a specially crafted request to the target server. This allows the attacker to download files from the server.
This code has been created for educational purposes only, to raise awareness on software security, and it's harmless by intention (the PoC runs calc.exe). Please do not change the code behaviour to malicious
The Mambo Component RemoSitory (cat) is vulnerable to a remote SQL injection attack. The vulnerability allows an attacker to execute arbitrary SQL commands on the target system.
A null pointer dereference vulnerability is triggered when sending an operation to ioctls 0x80002010 or 0x80002054. This is due to input buffer being NULL or the input buffer size being 0 as they are not validated.