This module exploits a remote command execution vulnerability found in some distributions of UnrealIRCd that contain a backdoor and installs an agent into the target host. The backdoor is present on the file Unreal3.2.8.1.tar.gz that was maliciously replaced on certain mirrors. The vulnerable file has the following MD5 checksum: 752e46f2d873c1679fa99de3f52a274d.
This exploit sends messages of 256 bytes to "cam.exe" service in order to fill all target memory with the exploit code. The last message forces a buffer overflow and executes the code sent embedded in the previous messages.
This vulnerability allows remote attackers to execute arbitrary code on a server running Mini HTTPD. The vulnerability is caused due to a boundary error within Mini HTTPD when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. Authentication is not required to exploit this vulnerability.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro OfficeScan Corporate Edition. The vulnerability is caused due to a boundary error within Trend Micro OfficeScan Corporate Edition when processing passwords with cgiChkMasterPwd.exe vulnerable module. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to this module.
Local File Inclusion vulnerability in admin/index.php in TinyWebGallery 1.7.6 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include local files via the lang parameter, which leads to execute arbitrary PHP code by injecting data into the log files.