This exploit targets a bug in the DHCPd service in Ubuntu 6.06, which allows remote attackers to cause a denial of service (crash) via a crafted DHCP request. This vulnerability is identified by CVE-2007-5365.
This exploit takes advantage of a buffer overflow vulnerability in PassFab RAR Password Recovery. By providing a specially crafted input, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the application.
This exploit takes advantage of a buffer overflow vulnerability in Nsauditor software. By sending a specially crafted payload, an attacker can overwrite the SEH (Structured Exception Handler) and gain control of the program. This can lead to remote code execution and potentially compromise the system. The exploit has been tested on Windows XP SP3.
This exploit allows an attacker to remotely crash the mt-dappd/Firefly media server. The attacker can send a specially crafted HTTP GET request to the server, causing it to crash and become unresponsive. This vulnerability was discovered by nnp and reported on the website unprotectedhex.com.
This exploit allows an attacker to remotely execute arbitrary code on Kerio MailServer 5.6.3. It requires valid authentication details, but can be used to enumerate valid accounts using the 'RCPT TO' command. A dictionary attack can be used to obtain a large number of accounts with weak passwords.
This module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The JIT region is then replaced with shellcode which loads the second stage. The second stage exploits a logic error in libxpc, which uses command execution via the launchd's "spawn_via_launchd" API (CVE-2018-4404).
The Ax Developer CMS version 0.1.1 is vulnerable to local file inclusion. An attacker can exploit this vulnerability by manipulating the 'module' parameter in the index.php file to include arbitrary local files, such as sensitive system files like /etc/passwd. This can lead to unauthorized access to sensitive information.
Fortify SSC (Software Security Center) REST-API contains Insecure direct object references (IDOR) allowing reading arbitrary details of other user's Fortify projects via GET method
This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in Zortam MP3 Media Studio Version 24.15. By creating a specially crafted payload and pasting it into the select text field, an attacker can gain a shell on port 4444.
An arbitrary file read vulnerability exists in Responsive FileManager version 9.13.4. This vulnerability can be exploited by an attacker to read sensitive files on the server by using a path traversal technique. By manipulating the 'path' parameter in the 'get_file' action of ajax_calls.php, an attacker can traverse directories and access files outside of the intended directory. This can lead to unauthorized access to sensitive information such as configuration files or user credentials.