#!/usr/bin/python # Exploit Title: Vestel TV Denial of Service (DoS) Attack # Exploit Author: HackerSofi - hackersofi@gmail.com # Date: 12/09/2013 # CVE Number: # Vendor Homepage: http://www.vestel.com/ # Description: Some TV's Has Communication Por
/* more detials: https://labs.mwrinfosecurity.com/blog/2013/09/06/mwr-labs-pwn2own-2013-write-up-kernel-exploit/ this poc is written by 0xBigBan */ #include windows.h #define __NtUserMessageCall 0x11ea //on win7 sp1 x86 void SystemCall( DWORD ApiNum
#!/usr/bin/python ''' Author: loneferret of Offensive Security Date: 22-08-2013 Product: eM Client for Windows Version: 5.0.18025.0 (previous versions and other platforms may be vulnerable) Vendor Site: http://www.emclient.com/ Software Download: ht
Watchguard Server Center v11.7.4 wgpr.dll Insecure Library Loading Local Privilege Escalation Vulnerability RCE Security Advisory http://www.rcesecurity.com 1. ADVISORY INFORMATION ----------------------- Product: Watchguard Server Center Vendor URL:
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
Title: SEH BUFFER OVERFLOW IN WINARCHIVER V.3.2 Severity: Critical History: 24.Apr.2013 Vulnerability reported Authors: Josep Pi Rodriguez, Pedro Guillen Nuez , Miguel Angel de Castro Simon Organization: RealPentesting URL: http://www.realpentesting
Title: SEH BUFFER OVERFLOW IN FUZEZIP V.1.0 Severity: High History: 16.Apr.2013 Vulnerability reported Authors: Josep Pi Rodriguez, Pedro Guillen Nuez , Miguel Angel de Castro Simon Organization: RealPentesting URL: http://www.realpentesting.blogspo
# Exploit Title: Green Browser 6.4.0515 Heap Overflow # Date: 31-08-2013 # Exploit Author: The Black Devils Asesino04 # Vendor Homepage: http://www.morequick.com/indexen.htm # Version: 6.4.0515 # Tested on: [ Windows XP SP2] html body table style=ta
Title: User Mode Write Access Violation in Wiz 5.0.3 Severity: Medium History: 16.Apr.2013 Vulnerability reported Authors: Josep Pi Rodriguez, Pedro Guillen Nuez, Miguel Angel de Castro Simon Organization: RealPentesting URL: http://www.realpentesti
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
# Exploit Title: jetAudio Version 8.0.16.2000 Plus VX - (.wav) - Crash POC # Date: 03-09-2013 # Exploit Author: ariarat # Software Link: http://www.jetaudio.com/download/ # Version: 8.0.16.2000 (Probably old version of software and the LATEST version