## # $Id: mini_stream.rb 14155 2011-11-04 08:20:43Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more informatio
#!/usr/bin/perl# DreamBox DM800 = 1.5rc1 Remote File Disclosure Exploit## Author: Todor Donev# Email: todor.donev@@gmail.com# Type: Hardware# Vuln Type: Remote###### Product summary: DreamBox DM800 is Powerful receiver # for digital TV and Radio pro
#!/bin/sh ########################################### # .70-Calibrer Assault Mount # # by Dan Rosenberg (@djrbliss) and zx2c4 # ########################################### #############################################################################
## # $Id: lifesize_room.rb 14143 2011-11-02 19:40:05Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more informat
Hi80sec report this bug on wooyun,PhpMyadmin use a simplexml_load_stringfunction to read xml from user input,this may be exploied to read filesfrom the server or networkin libraries/import/xml.php,some code like this/** * Load the XML string * * The
#!/bin/sh ####################################### # .50-Calibrer Assault Mount # # by zx2c4 # ####################################### ################################################################################ # Calibre uses a suid mount helper
Oracle Hyperion Financial Management TList6 ActiveX Control Remote Code Execution Vulnerability tested against: Internet Explorer 8 Microsoft Windows Server 2003 r2 sp2 download url: http://www.oracle.com/technetwork/middleware/epm/downloads/index.h
/** hackerial.c** Dovalim z knajpy a cumim ze Wojta zas nema co robit, kura.* Gizdi, tutaj mate cosyk na hrani, kym aj totok vykeca.* Stejnak je to stare jak cyp a aj jakesyk rozbite.** Linux vmsplice Local Root Exploit* By Hackeri-AL UAHCrew** Linu
?php /* Oracle DataDirect ODBC Drivers HOST Attribute arsqls24.dll Stack Based Buffer Overflow PoC (*.oce) by rgod found a local vector for this: http://retrogod.altervista.org/9sg_oracle_datadirect.htm http://www.exploit-db.com/exploits/18007/ This
#!/usr/bin/python # Title: GFI Faxmaker Fax Viewer v10.0[build 237] DoS (Poc). # From: The eh?-Team || The Great White Fuzz (we're not sure yet) # Found by: loneferret # Home: http://www.kioptrix.com # Manifacturer's link: http://www.gfi.com # Date
Author: vladz vladz@devzero.fr (new on twitter @v14dz!)Description: Xorg permission change vulnerability (CVE-2011-4029)Product: X.Org (http://www.x.org/releases/)Affected: Xorg 1.4 to 1.11.2 in all configurations. Xorg 1.3 and earlier if built with