I-Mall Commerce is susceptible to remote arbitrary command execution due to a lack of variable sanity checking.
cd734bed599af590e464cefdd5cc450f07f8a31d358c4f4b7e79813d99e7670e
Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux. Updates: More targets have been added and this version of the exploit also attempts to download the ptrace exploit, compile, and execute it in an attempt to gain root privileges.
a47755378b773f335a74bb7a4b40dcd8af408322961e6a3c7e5252d068998e50
Yabase v1.5.0 remote exploit to spawn bash shell with Apache uid.
58656cc32a0af4370be32b024340a8b698195d4cb03ac29dfab328c01e3fb61e
Remote exploit for Webcart v8.4 that will spawn a bash shell with the webserver uid.
9f3b471eb2039d0f0de8bb0d68e591d5438e2f29acfb6467664919a7a3b3517a
Hassan Consulting Shopping Cart Version 1.x remote exploit that will spawn a bash shell with the webserver uid.
dea6448742f595a7fb941c5c76e95b1b84e045870de595c28a05c9048dcfd2fa
Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux.
3a5210e98085c90e9f463fc1ab409702683f014b9cd595a3baf694c9a429a289
Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver.
ca9f2885c908445eb60e8177358c48d394aa727280a6bb55d5f86eff26d45bb7
Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver. Windows version. Warning: Use this binary at your own risk.
6b94af34f927331d86b03d701534fcd53fc85dcaded9fca70821ecfdfa6e7123