Marek Kroemeke

3 exploits Active since Oct 2009
CVE-2011-1938 EXPLOITDB php WORKING POC
PHP <5.3.7 - Buffer Overflow
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
CVE-2014-0226 EXPLOITDB text WRITEUP
Apache HTTP Server <2.4.10 - RCE
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
CVE-2009-3710 EXPLOITDB text WORKING POC
Riorey Rios - Credentials Management
RioRey RIOS 4.6.6 and 4.7.0 uses an undocumented, hard-coded username (dbadmin) and password (sq!us3r) for an SSH tunnel, which allows remote attackers to gain privileges via port 8022.