This exploit is for Windows 7 IIS7.5 FTPSVC. It allows an unauthenticated attacker to cause a denial of service (DOS) by sending a specially crafted payload to the FTP server.
The vulnerability allows an attacker to download files from the disk of the server through directory traversal attacks. The exploit involves sending a specially crafted request to the server with a manipulated file path.
The Joomla component com_xgallery version 1.0 is vulnerable to local file inclusion. An attacker can exploit this vulnerability by accessing the img.php file with a specially crafted file parameter, allowing them to include arbitrary local files.
This exploit targets Serv-U FTPD versions 3.x, 4.x, and 5.x. It takes advantage of a remote overflow vulnerability in the "MDTM" command. The code is written in C and was developed by Sam and bkbll. It includes shellcode for both connecting back and rebinding a shell. The exploit has been tested on Serv-U versions 4.0, 4.1, and 4.2.
This exploit takes advantage of a buffer overflow vulnerability in MP3 CD Converter Professional. It allows an attacker to execute arbitrary code on the target system.
This exploit allows an attacker to perform SQL injection in the Virtual Store Open <= 3.0 software.
This vulnerability allows an attacker to inject SQL queries into the login form, potentially gaining unauthorized access to the system. The vulnerability was discovered by DeadLy DeMon.
AYDrvNT.sys create a device called 'AYDrvNT_ALYAC' and handles the device io control code = 0x223e2c, which can overwrite the system service descriptor table entry with arbitrary address.
This exploit is for a buffer overflow vulnerability in Altarsoft Audio Converter version 1.1. It allows an attacker to execute arbitrary code by sending a specially crafted file. The vulnerability is triggered when the program tries to handle a long file name.
The Ruby HTTP server is vulnerable to HTTP response splitting attacks. This vulnerability allows an attacker to manipulate the HTTP response headers and inject malicious content. This can lead to various attacks, such as cross-site scripting (XSS) and cache poisoning.