### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
#!/usr/bin/python# Exploit Title: Sami FTP Server 2.0.1 PUT Command Buffer overflow (DEP Bypass)# Date: 17 Mar 2013# Exploit Author: ne0z# Vendor Homepage: http://www.hatsecure.com# Version: Sami FTP Server 2.0.1# Tested on: Windows XP Professional
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.#http://metasploit.com/framework/##
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
---| overviewVulnerability: Chrome Null Pointer in InspectDataSource::StartDataRequestDate: 03/14/2012Author: @HeyderAndrade (heyder.andrade[at]gmail[dot]com)Chrome Version: = 21.0.1180.57 stableOperating System Tested: Win XP SP2, WIN7, Mac OS X 10
MiniMagic ruby gem remote code execution 3/12/2013https://github.com/hcatlin/mini_magickA ruby wrapper for ImageMagick or GraphicsMagick command line.Tested on both Ruby 1.9.2 and Ruby 1.8.7.If a URL is from an untrusted source, commands can be inje
Ruby gem fastreader-1.0.8 remote code exec3/6/2013https://rubygems.org/gems/fastreaderif the url contains any ; characters code will be executed as the user when a web browser is launched.for example if fastreader is fed http://www.g;id;.com id will
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
/* * quick'n'dirty poc for CVE-2013-1763 SOCK_DIAG bug in kernel 3.3-3.8 * bug found by Spender * poc by SynQ * * hard-coded for 3.5.0-17-generic #28-Ubuntu SMP Tue Oct 9 19:32:08 UTC 2012 i686 i686 i686 GNU/Linux * using nl_table-hash.rehash_time,