This module uses a documented security weakness to execute arbitrary commands on any system running distccd.
This is a remote heap overflow vulnerability in the Bakbone Netvault software. It was tested on the demo version of the software. The exploit allows an attacker to trigger a heap overflow and gain remote code execution.
The exploit allows an attacker to execute arbitrary code on a remote system running Pine version 4.56 or earlier. The exploit can be achieved using two methods: 1) standard shellcode and 2) ret to libc. The details of the exploit can be found in the iDefense advisory: http://www.idefense.com/advisory/09.10.03.txt. The exploit requires the distance from a variable to the EIP/EBP register, which can be bruteforced to achieve a high success rate. The exploit can be used to create a worm or gain control over the target system.
This exploit takes advantage of a buffer overflow vulnerability in MiniShare HTTP Server 1.5.5. It allows an attacker to execute arbitrary code on the targeted system.
This exploit allows an attacker to retrieve the admin MD5 hash and username from a PhotoPost application by sending a specially crafted HTTP request.
When downloading files through Firefox and choosing the "Open with" option, Firefox will create a temporary file in the form of RANDOM.part. When the download completes, Firefox saves the completed file in the "/tmp" directory as its original filename and opens it with the program's handler. However, if there is already a file with an identical filename in the temporary file directory, Firefox saves and opens the newly downloaded file using a naming scheme that appends a dash and the next available number in order. This vulnerability allows local users to write a malicious file with the same name as the intended file and have Firefox open it instead.
This exploit is a Denial of Service (DoS) attack that targets a server's remote file manager. It sends a specially crafted request to the server, causing it to crash or become unresponsive.
By sending a crafted GET request [GET /AUX HTTP/1.1] to the server, the server crashes!
Cherokee Web Server <= 0.5.4 is vulnerable to remote directory traversal attack by accessing files outside of the webroot directory.
This exploit utilize two ways for exploiting vulnerability present into Hosting Controller. This exploit create new user with relative passwd and registered your host with mail server into Hosting Controller software.