/* * CVE-2014-0160 heartbleed TLS/DTLS information leak exploit * ========================================================== * This exploit uses OpenSSL to create an encrypted connection * and trigger the heartbleed leak. The leaked information is *
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT def in
source: http://www.securityfocus.com/bid/24832/info Sun Java Runtime Environment is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input before copying it to an insufficiently sized mem
#!/usr/bin/python # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optp
MacOSX/XNU HFS Multiple VulnerabilitiesMaksymilian Arciemowiczhttp://cxsecurity.com/http://cifrex.org/===================On November 8th, I've reported vulnerability in hard links for HFS+(CVE-2013-6799)http://cxsecurity.com/issue/WLB-2013110059The
#!/usr/bin/perl## Title: Google Voice private/unknown numbers disclosure# Author: Simo Ben youssef# Contact: Simo_at_Morxploit_com# Discovered: March 24 2014# Reported: March 28 2014# Published: April 04 2014# MorXploit Research# http://www.MorXploi
/* MA Lighting Technology grandMA onPC v6.808 Remote Denial of Service Exploit Vendor: MA Lighting Technology GmbH Product web page: http://www.malighting.com Affected version: grandMA series 1 onPC Software 6.808 (6.801) Summary: The grandMA onPC s
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class Metasploit4 Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post:: File include Msf::Exploit::File
Found the below on a printer a couple of years ago, sent to Kyocera butnever heard anything back...Changing the 'Ready' message on a printer is quite a well known prank (Andmuch fun was had with this yesterday!) but also an interesting avenue forinj