##################################################################################### Application: Novell Groupwise Platforms: Windows Version: 8.0.2 HP3 and 2012 Secunia: SA50622 {PRL}: 2012-28 Author: Francis Provencher (Protek Research Lab's) Web
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'r
/* dzug.c CVE-2012-3524 PoC (C) 2012 Sebastian Krahmer * * Trivial non-dbus root exploit. (Yes, it is 2012!) * * The underlying bug (insecure getenv() by default) has been * reported ages ago, but nobody really cared. Unless you have an * exploit...
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
# Exploit Title: [WIS Coldfusion Exploit]# Date: [9-9-2012]# Author: [Noxxie]# Vendor or Software Link: [ http://www.wis.nl/Onze_klanten ] (link that also shows customers , gives an idea of inpact)# Version: [All versions with search form are affect
Source: http://www.securityfocus.com/bid/55471/info Oracle VM VirtualBox is prone to a local denial-of-service vulnerability. Attackers can exploit this issue to cause denial-of-service conditions. /** This software is provided by the copyright owne
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Title : CAS Modbus RTU Parser Buffer Overflow SEH Author : Senator of Pirates Founder : Marshall Webb Link Software : http://www.chipkin.com/technical-resources/cas-modbus-rtu-parser/ FaceBook : /SenatorofPiratesInfo Marshall's FaceBook : /lulznet Da
=== intro ===TP-LINK TL-WR340G is a SOHO router with integrated IEEE 802.11b/g AP. Now it's marked End-of-Life.Transmitting crafted frames in proximity of working router cause device to malfunction. Wireless communication stops, existing clients don
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
#!/usr/bin/env python# mcrypt = 2.6.8 stack-based buffer overflow poc# http://mcrypt.sourceforge.net/# (the command line tool, not the library)## date: 2012-09-04# exploit author: _ishikawa# tested on: ubuntu 12.04.1# tech: it overflows in check_fil