/* */ /* Vulnerability Conky 1.8.0 on Linux */ /* Tested on: Linux with kernel 2.6.32.1-smp */ /* Found: by Arturo D'Elia */ /* Date found: 12 Dec 2010 */ /* Fix: No Fix */ /* Contacts: arturo.delia@libero.itSCRIPT type=text/javascript /* ![CDATA[ *
##################################################################################### Application: Microsoft Office XP Remote code Execution Platforms: Windows Vista Exploitation: Remote code execution CVE Number: Microsoft Bulletin: {PRL}: 2011-07
Greetings, There is a DOS condition on windows media player when the klite codec pack is installed. # Exploit Title: Windows Media Player with klite codec pack DOS Poc # Date: 14/06/2011 # Author: Nicolas Krassas , www.twitter.com/dinosn # Version:W
html body iframe src='about:blank' id='bo0om' style=width:0px;height:0px;border:0px none;/iframe script type=text/javascript language=javascript /* * * Opera 11.11 Remote Crash * Software link: http://www.opera.com/download/ * Tested on: Win32 xp hom
# Microsoft WinXP sp2/sp3 local system privilege escalation exploit # # Platform: Windows XP SP2/SP3 # Type: local # Exploit Author: Todor Donev [todor.donev][@][gmail.com] # # Good luck and Have fun!! # Kind regards to so sweet baby Tsvetelina Emirs
/* * DEC Alpha Linux = 3.0 local root exploit * by Dan Rosenberg (@djrbliss) * * Usage: * $ gcc alpha-omega.c -o alpha-omega * $ ./alpha-omega * * Notes: * -Payload specific to = 2.6.28 (no cred struct, modify as needed) * -Socket trigger tested on
### $Id: ibm_tivoli_endpoint_bof.rb 12925 2011-06-12 00:04:55Z bannedit $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more in
## # $Id: igss9_igssdataserver_rename.rb 12886 2011-06-09 06:04:04Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for
on error resume next Set objArgs = WScript.Arguments dim my_http dim my_path dim fjhgx print_r() if objArgs.length = 0 then quit_print() End if if objArgs(0) = null then quit_print() Else my_http = objArgs(0) End if if objArgs(1) = null then quit_pr
TITLE VLC Media Player XSPF Local File Integer overflow in XSPF playlist parser AFFECTED VERSIONS VLC media player 1.1.9 down to 0.8.5 VENDOR VideoLAN Organisation CLASS Denial of Service (DoS) RESOURCES http://www.videolan.org/security/sa1104.html