This vulnerability allows an attacker to disclose arbitrary files on the target system. By exploiting the dl.php file in FireConfig v0.5, an attacker can traverse the directory structure and access sensitive files such as /etc/passwd.
The eToolz software version 3.4.8.0 is vulnerable to a Denial of Service (DoS) attack. By sending a specially crafted request, an attacker can cause the software to crash or become unresponsive, resulting in a denial of service for legitimate users.
The Arm Whois 3.11 software is vulnerable to a buffer overflow vulnerability that can lead to a SEH overwrite. By sending a specially crafted input to the software, an attacker can execute arbitrary code or cause a denial of service condition.
This module exploits a stack buffer overflow in fingerd on 4.3BSD. This vulnerability was exploited by the Morris worm in 1988-11-02. Cliff Stoll reports on the worm in the epilogue of The Cuckoo's Egg.
This module exploits an arbitrary file upload in the sample PHP upload handler for blueimp's jQuery File Upload widget in versions <= 9.22.0. Due to a default configuration in Apache 2.3.9+, the widget's .htaccess file may be disabled, enabling exploitation of this vulnerability. This vulnerability has been exploited in the wild since at least 2015 and was publicly disclosed to the vendor in 2018. It has been present since the .htaccess change in Apache 2.3.9. This module provides a generic exploit against the jQuery widget.
This is a proof-of-concept exploit for a remote buffer overflow vulnerability in GOM Player's GomWeb Control component. By passing more than 506 characters to the OpenUrl method, an attacker can trigger a buffer overflow and potentially execute arbitrary code.
This module exploits sendmail's well-known historical debug mode to escape to a shell and execute commands in the SMTP RCPT TO command. This vulnerability was exploited by the Morris worm in 1988-11-02.
There is a heap corruption vulnerability in VCPDecompressionDecodeFrame which is called by FaceTime. This bug can be reached if a user accepts a call from a malicious peer.
The crash is caused due to a NULL pointer dereference access violation inside the 'Tree::Notify_InvalidateDisplay' function while parsing malformed DOM elements. The issue was discovered using the Domato fuzzer.
The WebVet 0.1a application is vulnerable to SQL injection through the 'id' parameter in the client.php file. An attacker can exploit this vulnerability to execute arbitrary SQL queries in the database.