### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
#!/usr/bin/python### Exploit Title: Sami FTP Server RETR Denial Of Service# Date: 2013/6/09# Exploit Author: Chako# Vendor Homepage: http://www.karjasoft.com/old.php# Software Link: # Version: V2.0.1 (Doesn't work on V2.0.2)# Tested on: Windows XP S
/* * CVE-2013-2094 exploit x86_64 Linux 3.8.9 * by sorbo (sorbo@darkircop.org) June 2013 * * Based on sd's exploit. Supports more targets. * */#define _GNU_SOURCE#include string.h#include stdio.h#include unistd.h#include stdlib.h#include stdint.h#in
#!/usr/bin/env python# CVE-2003-0001 'Etherleak' exploit# =================================# Exploit for hosts which use a network device driver that pads # ethernet frames with data which vary from one packet to another, # likely taken from kernel
MobileIron Virtual Smartphone Platform Privilege Escalation Exploit 0day ======================================================================== The MobileIron Virtual Smartphone Platform is the first solution to combine data-driven smartphone and
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'r
require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking # # This module acts as an HTTP server # include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, 'Na
One of our expert team members (shachibista@gmail.com) who is assignedto do the security audit of ZPanel code has found the follwoingsecurity vulnerability with ZPanel 10.0.0.2 which will allow anyone toescalate the root accress and access the serve
#!/usr/bin/python# Exploit Title : KNet Web Server 1.04b Local Denial Of Service# Date: 6 Jun 2013# Exploit Author: ne0z# Vendor Homepage: http://www.hatsecure.com# Version: KNet Web Server 1.04b# Tested on: Windows XP Profesional SP3# Windows XP Pr
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c