Have you ever wondered if you could do house-by-house geolocation with google gears geolocation API? Yes you (and advertisers) can! Google is unlikely to fix this, since this is the same API mobile handsets use to locate themselves w/o GPS. Throttli
!-- Chilkat Software FTP2 ActiveX Component (ChilkatFtp2.DLL 2.6.1.1) Remote Code Execution poc by rgod tested against Internet Explorer 7 on Vista should also work with 8/9 ActiveX Settings: CLSID: {302124C4-30A0-484A-9C7A-B51D5BA5306B} Progid: Chi
### $Id: ms10_087_rtf_pfragments_bof.rb 11450 2010-12-29 20:30:50Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more i
#!/usr/bin/python # # TYPSoft FTP Server (v 1.10) RETR CMD Denial Of Service # # CVE-2005-3294 # OSVDB 19992 # # 12/23/2010 # (C) Emanuele Gentili emgent@backtrack-linux.org # # Notes: # I have wrote this exploit because the code published here (1)
#Digital Music Pad Version 8.2.3.4.8 SEH overflow #Author Abhishek Lyall - abhilyall[at]gmail[dot]com, info[at]aslitsecurity[dot]com #Web - http://www.aslitsecurity.com/ #Blog - http://www.aslitsecurity.blogspot.com/ #Vulnerable version DJ Studio Pr
# done by BraniX branix@hackers.org.pl # www.hackers.org.pl # found: 2010.08.18 # published: 2010.12.27 # tested on: Windows XP SP3 Home Edition # App: IrfanView 4.27 # DoS, Integer division by zero in module JPEG2000.dll # i_view32.exe MD5: 58150C1
?php /* Microsoft Windows Fax Services Cover Page Editor (.cov) Memory Corruption poc by Andrea Micalizzi aka rgod tested on: Microsoft Windows Server 2003 Standard Edition r2 sp2 all patched vulnerability: Microsoft Cover Page Editor (fxscover.exe,
Author:Michael Brooks (Rook)br Application:OpenClassifieds 1.7.0.3br download: http://open-classifieds.com/download/br Exploit chain:captcha bypass-sqli(insert)-persistant xss on front pagebr If registration is required an extra link in the chain is
### $Id: redmine_scm_exec.rb 11414 2010-12-25 14:43:13Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more informati
通用的linux kernel slub overflow攻击代码模板, 关于slub overflow的溢出研究请见下期webzine:) /* * Linux Kernel 2.6.36-rc1 CAN BCM Privilege Escalation Exploit * * by wzt wzt.wzt@gmail.com * * based on exploit by Jon Oberheide, the original code use R