=====================================IE for Windowse Mobile Denial of Service=====================================#Tested on:Firefox 5,IE8,IE for Windowse Mobile# Author: Iman Halavati# Verified: yes##Greets To: My Laptop all My Friends(Sina Yazdanm
# Exploit Title : Opera Web Browser 11.50 DoS# Software : http://www.opera.com/download/# Version : 11.50# Tested on : Windows Vista SP1# Date : 20/08/2011# Author : X-h4ck# Website : http://www.pirate.al , http://theflashcrew.blogspot.com# Email :
# Exploit Title:Zen Media Player (.pls) Local Crash Poc# Date: 20/8/2011# Author: Angel Injection# home Page: http://www.club-h.co.cc , http://www.sec-krb.org# Email: Angel-Injection[at]hotmail.com# Category:: [ dos / poc ]# Tested on: Windows Xp Sp
## # $Id: ams_hndlrsvc.rb 13591 2011-08-19 18:35:29Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information o
## # $Id: ams_xfr.rb 13591 2011-08-19 18:35:29Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on lic
## # $Id: hp_easy_printer_care_xmlsimpleaccessor.rb 13593 2011-08-20 00:11:22Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework w
#Apache httpd Remote Denial of Service (memory exhaustion) #By Kingcope #Year 2011 # # Will result in swapping memory to filesystem on the remote side # plus killing of processes when running out of swap space. # Remote System becomes unstable. # us
## # $Id: struts_code_exec.rb 13586 2011-08-19 05:59:32Z bannedit $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more inf
Exploit title: Contrexx Shopsystem Blind SQL Injection ExploitExploit PoC: index.php?section=shopproductId=[VALID productid] and [YOUR BLIND SQL CODE]Exploit tested on: Debian 6, Ubuntu Linux 11.04Exploit found and written by: PenguinVersion: = 2.2