This is a remote exploit for Apache web server with mod_jk module. It allows an attacker to execute arbitrary code on the target system.
The vulnerability is caused due to the usage of vulnerable collection of libraries that are part of DCMTK Toolkit, specifically the parser for the DICOM Upper Layer Protocol or DUL. Stack/Heap Buffer overflow/underflow can be triggered when sending and processing wrong length of ACSE data structure received over the network by the DICOM Store-SCP service. An attacker can overflow the stack and the heap of the process when sending large array of bytes to the presentation context item length segment of the DICOM standard, potentially resulting in remote code execution and/or denial of service scenario.
The NetClassifieds application is vulnerable to multiple injection vulnerabilities including SQL injection, XSS, and full path disclosure. These vulnerabilities allow an attacker to execute arbitrary SQL commands, inject malicious scripts, and disclose sensitive system information, respectively.
Launch program and enter the license code in the "Register" window. Copy&Paste the "license" from poc.txt.
SQL injection in Joomla extension "DT Register" allows remote unauthenticated attacker to execute arbitrary SQL commands via the cat parameter.
The vulnerability allows an attacker to include remote files into the application, which can lead to remote code execution or information disclosure.
The vulnerability is caused by the HTML (httpd) module and how it handles TCP requests. This can be exploited to cause a denial of service attack resulting in application crash.
This is a remote file inclusion exploit for POWL version 0.94. The vulnerable file is htmledit.php located in the plugins/widgets/htmledit/ directory. By manipulating the _POWL[installPath] parameter, an attacker can include malicious scripts from a remote server.
This is a remote root exploit for the x86/bsd telnetd vulnerability. It allows an attacker to gain root access to a system running the vulnerable telnetd service. The exploit has been tested against various versions of BSD/OS, NetBSD, and FreeBSD.
Remote unauthenticated user can negotiate ChaCha20-Poly1305 cipher suites and send a message of sufficient length with a bad MAC to trigger the vulnerable code to zero out the heap space and force the vulnerable OpenSSL instance to crash.