# Title : iRobosoft Internet Browser Memory Corruption# Date: 2013-02-18# Softwares Link: http://sourceforge.net/projects/internetbrowser/# phone : +447024073406# Author: The Black Devils# Tested on: Windows XP SP2 # Home: http://www.1337day.net# Gr
========================================================================= Polycom HDX Telnet Authorization Bypass== Vendor Website:= www.polycom.com== Affected Version:= Polycom HDX devices:= All releases prior to and including Commercial 3.0.5== Pu
require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::RopDb include Msf::Exploit::Remote::BrowserAutopwn autopwn_info({ :ua_name = HttpClients::IE, :ua_min
/* ms13-005-funz-poc.cpp - Drive a Medium IL cmd.exe via a Low ILprocess and message broadcasted Copyright (C) 2013 Axel 0vercl0k Souchet - http://www.twitter.com/0vercl0k This program is free software: you can redistribute it and/or modify it under
# Title : Microsoft Wuindows Movie Maker 5.1 Memory Corruption# Date: 2013-01-12# Software Link: http://windows.microsoft.com/fr-CH/windows-live/movie-maker-get-started# phone : +447024073406# Author: The Black Devils# Tested on: Windows XP SP2# Hom
VULNERABILITY DETAILSThe latest version of Google Chrome (Tested on Version 24.0.1312.57)fails to properly recognize HTTP Basic Authentication when injected invarious HTML tags. As a result of this behavior Chrome will not alertthe user when HTTP Ba
# Title : Windows Media Player 9.0.0 (.wav) Memory Corruption# Date: 2013-01-12# Software Link: http://windows.microsoft.com/fr-FR/windows/windows-media-player# phone : +447024073406# Author: The Black Devils# Tested on: Windows XP SP2# Home: www.ar
#Schneider Electric#Accutech Manager Server Heap Overflow PoC#RFManagerService - Port: 2537#I think this is the same vuln that ExodusIntel discovered. Credit also goes to Aaron Portnoy, ExodusIntel.#The patch has not been released yet.#Evren Yalcin,
# Title : RealPlayer 16.0.0.282 (.html) Memory Corruption # Date: 2013-02-18# Softwares Link: http://fr.real.com/realplayer/# phone : +447024073406# Author: The Black Devils# Tested on: Windows XP SP2 # Home: www.arab47.com # Greeting To : 3xp1r3 Cy
# Title : Windows Media Player 9.0.0 Local Proof Of Concept Exploit# Date: 2013-01-12# Software Link: http://windows.microsoft.com/fr-FR/windows/windows-media-player# phone : +447024073406# Author: The Black Devils# Tested on: Windows XP SP2# Home:
require 'msf/core'class Metasploit3 Msf::Exploit::RemoteRank = NormalRankinginclude Msf::Exploit::Remote::HttpServer::HTMLdef initialize(info={})super(update_info(info,'Name' = MS12-037 Internet Explorer Same ID Property Deleted Object Handling Memo
#!/usr/bin/python# D-LINK TOTAL FAIL# http://www.s3cur1ty.de/m1adv2013-003# Another Shit PoC by infodox# SHODANS BELOW# http://www.shodanhq.com/search?q=Server%3A+Linux%2C+HTTP%2F1.1%2C+DIR-300# http://www.shodanhq.com/search?q=Server%3A+Linux%2C+HT
# VLC Player 2.0.4 = Arbitrary Code Execution#!/usr/bin/perl# VLC Player 2.0.4 = ReadAV Arbitrary Code Execution# Vendor URI: http://www.videolan.org/vlc/# Vendor Description:# VLC is a free and open source cross-platform multimedia player# and fram
/* ms13-005-funz-poc.cpp - Drive a Medium IL cmd.exe via a Low IL process and message broadcasted Copyright (C) 2012 Axel 0vercl0k Souchet - http://www.twitter.com/0vercl0k This program is free software: you can redistribute it and/or modify it unde
cURL buffer overflowWed 06 February 2013Volema found remotely exploitable buffer overflow vulnerability in libcurl POP3, SMTP protocol handlers which lead to code execution (RCE). When negotiating SASL DIGEST-MD5 authentication, the function Curl_sa
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo