## # South River Technologies WebDrive Service Bad Security Descriptor Local Privilege Escalation. # # This module exploits a privilege escalation vulnerability in South River Technologies WebDrive. # Due to an empty security descriptor, a local att
#!/usr/bin/python # # Title: AIC Audio Player 1.4.1.587 Local Crash PoC # Date: 01-26-2010 # Author: b0telh0 # Link: http://www.aic-media.com/Download/Setup_AICAudioPlayer.exe # Tested on: Windows XP SP3 # I couldn't even debug it. There's some anti
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Exploit Title : status2k Remote Add Admin Exploit Author: alnjm33 Software Link: it cost 24.95 / y Script Site : http://www.status2k.com/buynow.html Version: 1 Test
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Exploit Title : status2k Remote Add Admin Exploit Author: alnjm33 Software Link: it cost 24.95 / y Script Site : http://www.status2k.com/buynow.html Version: 1 Test
## # aol_phobos_bof.rb # # AOL 9.5 Phobos.Playlist 'Import()' Stack-based Buffer Overflow exploit for the Metasploit Framework # # Tested successfully on the following platforms: # - AOL 9.5 (Revision 4337.155) on Internet Explorer 7, Windows XP SP3
# Tested on: WinXP SP3 De #!/usr/bin/perl # Still learning, having some fun... # Greetz to _-Sid-_ Roadkill Jess Dawn Linki # Special greetz do Debug, even i dont know you. Nice find man. # Exploit has something around 70% chance of success. print
# IntelliTamper 2.07/2.08 (SEH) Remote Buffer Overflow # Based on PoC: http://www.exploit-db.com/exploits/11217 # Author: loneferret # Big thanks to: dookie # Tested on WinXP SP3 English # Just copy the resulting html file on a web server, and point
# Exploit Title : SOMPL Player Buffer Overflow # Date : 20 January 2010 # Author : Rick2600 (ricks2600[at]gmail{dot}com) # Bug found by : Rick2600 (ricks2600[at]gmail{dot}com) # Software Link : http://www.softpedia.com/progDownload/SOMPL-Download-14