/* * Title: arm-bind-listen * Brief: Bind a shell to port 0x1337 on any local address and * wait for connections * Author: Daniel Godas-Lopez gmail account dgodas */ /* soc_des = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); */ mov %r0, $2/* AF_INET */
#!/usr/bin/python # Pwn And Beans by Mighty-D and 7eK presents: # Winamp 5.5.8.2985 (in_mod plugin) Stack Overflow # A Script Kiddie Friendly Production # WINDOWS XP SP3 FULLY PATCHED - NO ASLR OR DEP BYPASS... yet # Bug found by http://www.exploit-
#!/usr/bin/perl #AnyDVD = 6.7.1.0 Denial Of Service Vulnerability #By Havok, from France. (c'est les vacances o/. Mais y a plus d'essence :(. Rime de leet spotted :P). #23/10/2010 #Tested on Windows XP SP3. #Software still available here at the mom
from: http://marc.info/?l=full-disclosurem=128776663124692w=2 The GNU C library dynamic linker will dlopen arbitrary DSOs during setuid loads ------------------------------------------------------------------------------- Cze, This advisory describe
#Exploit Title : Spider Player Denial of Service Vulnerability #Software : Spider Player #Software link : http://spider-player.com/spider/files/Spider_Player_2.4.5_Setup.exe #Autor : ABDI MOHAMED #Email : abdimohamed@hotmail.fr #greetz: net_own3r , s
Vendor: Microsoft Product: Windows Mobile (6.1 and 6.5) Vulnerability: Double Free Denial of Service Tested vulnerable versions: Windows Mobile 6.1 and 6.5 Tested on : HTC Touch (WM 6.1), HTC Touch2 (WM 6.5) CREDITS: Celil nver from SecurityArchitec
Abysssec Inc Public Advisory 1) Advisory information Title : Adobe Shockwave player rcsL chunk memory corruption Version : Adobe Shockwave player 11.5.8.612 (latest on writing time) Discovery : http://www.abysssec.com Vendor : http://www.adobe.com I
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://corelabs.coresecurity.com/ LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form 1. *Advisory Information* Title: LibSMI smiGetN
#!/usr/bin/python # Pwn And Beans by Mighty-D presents: # Winamp 5.5.8.2985 (in_mod plugin) Stack Overflow # WINDOWS XP SP3 FULLY PATCHED - NO ASLR OR DEP BYPASS... yet # Bug found by http://www.exploit-db.com/exploits/15248/ # POC by fdisk # Exploi
### $Id: fatplayer_wav.rb 10764 2010-10-20 11:53:12Z mc $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on lic
#Exploit Title :MASS PLAYER 2.1 Denial of service vulnerability #Software : MASS PLAYER 2.1 #Software link :http://sourceforge.net/projects/massmusicplayer/ #Autor : Sweet #Email : charif38@hotmail.fr #Date : 19/10/2010 #Software version : 2.1 #Teste