Source: http://www.protekresearchlab.com/index.php?option=com_contentview=articleid=26Itemid=26 ##################################################################################### Application: IBM Tivoli Directory Server SASL Bind Request Remote C
Source: http://www.abysssec.com/blog/2011/04/exploiting-adobe-flash-player-on-windows-7/ Adobe Flash player Action script type confusion exploit (DEP+ASLR bypass) advisory text : Here is another reliable windows 7 exploit . the main method used for
## # $Id: wireshark_packet_dect.rb 12364 2011-04-19 07:53:58Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more
#!/usr/bin/env python # Vulnerable app: Wireshark 1.4.1-1.4.4 # Author: sickness # Download : # OS: Tested it on Windows XP SP2 and SP3 but it should work on every Windows with DEP off (still working on a ROP exploit) # DATE : 17.04.2011 # Fixed in
# FiSH IRC encryption evil ircd PoC exploit. # Abuses CVE-2007-1397 # Bad ircd, nasty bnc provider, nicknames over 100 char -- ruin. # Runs arbitrary code which which in this case shuts down irssi. # Tested on my own compiled FiSH with irssi/fedora/
## # $Id: adobe_flashplayer_flash10o.rb 12330 2011-04-16 02:09:33Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for
# Exploit Title: Format string vulnerability in Nedit = 5.5. # Date: 04/13/2011 # Author: Tosh (The bug was already patched when I'd found the vuln) # Email: tosh@tuxfamily.org # Patch: http://nedit.cvs.sourceforge.net/viewvc/nedit/nedit/source/pref
#!/usr/bin/perl# ---------# Winamp =5.6.1 (.au) Denial of Service Exploit# Author : KedAns-Dz ked-h@hotmail.com || ked-h@exploit-id.com# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team# ---------# Tested in Windows XP sp3
#!/usr/bin/perl# ---------# Media Player Classic v6.4.9.1 (.au) Proof Of Concept Exploit# Author : KedAns-Dz ked-h@hotmail.com || ked-h@exploit-id.com# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team# ---------# Tested in
#!/usr/bin/perl# ---------# Xilisoft Video Converter Ultimate (.au) Proof Of Concept Exploit# Author : KedAns-Dz ked-h@hotmail.com || ked-h@exploit-id.com# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team# ---------# Tested
# Exploit Title : TinyBB 1.4 Sql Injection + Path Disclosure# Google Dork : Proudly powered by TinyBB# Date : 7 April 2011# Author : swami# Contact : flavio[dot]baldassi[at]gmail[dot]com# Version : 1.4# Tested on : Centos 5.5 with magic_quotes_gpc o