#!/bin/sh #### Pwnnel Blicker #### # for kids # # # # zx2c4 # # # ######################## # This is another exploit for Tunnel Blick. # Other exploits for Tunnel Blick are available here: # http://git.zx2c4.com/Pwnnel-Blicker/tree/ echo [+] Making
/* * ==== Pwnnel Blicker ==== * = = * = zx2c4 = * = = * ======================== * * Tunnel Blick, a widely used OpenVPN manager for OSX * comes with a nice SUID executable that has more holes * than you care to count. It's a treasure chest of local
Larry W. Cashdollar8/6/2012Here is another symlink attack with temp file creation using process id in Solaris 10 patch cluster. You can over write the contents of root owned files with the contents of inetd.conf. In patches/137097-01/SUNWcsr/reloc/l
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/c
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
Oracle Business Transaction Management Server 12.1.0.2.7 FlashTunnelService Remote File Deletion tested against: Microsoft Windows Server 2003 r2 sp2 Oracle WebLogic Server 12c (12.1.1) Oracle Business Transaction Management Server 12.1.0.2.7 (Produ
Oracle Business Transaction Management Server 12.1.0.2.7 FlashTunnelService WriteToFile Message Remote Code Execution Exploit tested against: Microsoft Windows Server 2003 r2 sp2 Oracle WebLogic Server 12c (12.1.1) Oracle Business Transaction Manage
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
#!/usr/bin/ruby # Exploit for CoolPlayer+ Portable 2.19.2 # # Based on exploit by Blake and Dhruval. # Vulnerability found by Securityxxxpert # Original: http://www.exploit-db.com/exploits/20262/ # # This one by Robert Larsen robert@the-playground.d
AOL Products downloadUpdater2 Plugin SRC Parameter Remote Code Execution tested against: Microsoft Windows Vista sp2 Microsoft Windows Server 2003 r2 sp2 Mozilla Firefox 14.0.1 download url: http://client.web.aol.com/toolbarfiles/Prod/downloads/down
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
# Buffer overflow that bypasses ASLR by using a non-aslr module # Tested against CoolPlayer Portable version 2.19.2 on Windows Vista Business 32 bit # Written by Blake patched by Dhruval( dhruval1987@gmail.com ) # Originally found by Securityxxxpert