A Design Flaw in Windows Kernel API can Lead to privilege escalation. -------------------------readme.txt----------------------- ======================================================================== CONSOLE APPLICATION : poc Project Overview ====
### $Id: realwin_scpc_txtevent.rb 11125 2010-11-24 13:44:46Z mc $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more informatio
### $Id: foxit_title_bof.rb 11096 2010-11-22 17:43:42Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information o
### $Id: java_basicservice_impl.rb 10488 2010-09-26 23:55:03Z egypt $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more inform
# Exploit Title: Free CD to MP3 Converter 3.1 Buffer Overflow Exploit (Bypass DEP + SEH) # Origianl exploit by C4SS!0 G0M3Shttp://www.exploit-db.com/exploits/15483/ # Modified by riuskskhttp://riusksk.blogbus.com # Test on Windows XP SP3 CN # Data20
Native Instruments Service Center 2.2.5 Local Privilege Escalation Vulnerability Vendor: Native Instruments GmbH Product web page: http://www.native-instruments.com Affected version: 2.2.5 (R596) Summary: The NI Service Center is a service used for
### $Id: freenas_exec_raw.rb 11015 2010-11-12 23:14:46Z jduck $###### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
### $Id: realwin_10.rb 11067 2010-11-18 23:45:40Z mc $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licens
?php /** * Mosets Tree 2.1.6 (Joomla) Template Overwrite CSRF * 3 October 2010 * jdc * * How it works - admin template form has no nonce * How to exploit - get a logged in admin to click the wrong link ;) * Patched in 2.1.7 */ // change these $target