### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
# Exploit Title: Windows Movie Maker Version 2.1.4026.0 (.wav) - Crash POC # Date: 16-07-2013 # Exploit Author: ariarat # Vendor Homepage: http://www.microsoft.com # Software Link: included in windows xp sp2 and sp3 # Version: 2.1.4026.0 # Tested on:
# Title : Microsoft Office PowerPoint 2007 Crash PoC # Date: 2013-01-12 # Software Link: http://office.microsoft.com/ # Author: Asesino04 # Tested on: Windows XP SP2 # Special Thanks To : Ness Oum El Bouaghi # Bug Description: when you insert a soun
/* * $FILE: bug-mangle.c * * Comment: Proof of concept * * $VERSION$ * * Author: Hector Marco hecmargi@upv.es * Ismael Ripoll iripoll@disca.upv.es * * $LICENSE: * This program is free software; you can redistribute it and/or modify * it under the te
#Squid Crash PoC#Copyright (C) Kingcope 2013#tested against squid-3.3.5#this seems to be the patch for the vulnerability:# http://www.squid-cache.org/Versions/v3/3.3/squid-3.3.8.patch #The squid-cache service will respawn, looks like a kind of asser
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
# -*- coding: binary -*- ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metaspl
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/c
# Exploit Title: Tri-PLC Nano-10 DoS # Date: 07/11/2013 # Exploit Author: Sapling # Vendor Homepage: www.tri-plc.com # Version: Firmware Version r81 and prior # CVE : CVE-2013-2784 # ICSA: ICSA-13-189-02 /* The vulnerability exists due to a flaw in t
#nginx 1.3.9/1.4.0 x86 brute force remote exploit # copyright (c) 2013 kingcope #---------------------------- #fix for internet exploitation, set MTU: #ifconfig interface mtu 60000 up # ### # !!! WARNING !!! # this exploit is unlikely to succeed when
#!/usr/bin/python print [+]Judul Ledakan:Jolix Media Player (.m3u) Denial of Service Exploit [+]Celah versi: Version 1.1.0 [+]Mengunduh produk: http://www.jolixtools.com/downloads/jolix-media-player-setup.exe [+]Hari Tanggal Tahun: 09.07.2013 [+]Penu