### $Id: IntelliTamper.rb##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http:/
#!/usr/bin/perl# DJ Legend [.m3u / .pls File ] Local Heap Overflow Poc# www.djlegend.net/http://www.djlegend.net/# Found By : SkuLL-HacKeR# Msn : Wizard-skh@hotmail.commailto:Wizard-skh@hotmail.com####################################################
#Aouther : [SarBoT511] ( xs3@hotmail.com ) #Exploits title :[Windows Live Messenger 2009 ActiveX Heap Overflow PoC] #tested on :[windows 7 Vista Xp sp3] #Windows Live Messenger SkyDrive 2009 html object classid='clsid:C2828995-4A83-4100-A212-3024BA1
## # $Id: ca_igateway_debug.rb 6568 2009-05-19 13:20:32Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more informat
Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack ------------------------------------------------------------------------- CVE-2010-0232 In order to support BIOS service routines in legacy 16bit applications, the Windows NT
#!/usr/bin/env python Pidgin MSN = 2.6.4 file download vulnerability 19 January 2010 Mathieu GASPARD ( gaspmat@gmail.com ) Description: Pidgin is a multi-protocol Instant Messenger. This is an exploit for the vulnerability[1] discovered in Pidgin by
#!/usr/bin/perl -w # Author: Jacky # Version: 3.0.2.1 # Tested on: Windows XP SP2 #RM Downloader m3u Buffer Overflow (SEH) (Perl Edition ) #Discovered by :: Peter Van Eeckhoutte ( VERY BIG GREETZ TO HIM ) ;-) #Written by Jacky #All Greetz for Peter
#Exploits title :[Microsoft Windows Defender ActiveX Heap Overflow PoC] #tested on :[windows 7] #Microsoft Windows Defender html object classid='clsid:07DD3249-A591-4949-8F20-09CD347C69DC' id='target' /object script language='vbscript' targetFile =
Product: AOL 9.5 Vulnerability: ActiveX - Heap Overflow Discussion: Vulnerability is in Activex Control (CDDBControl.dll) Sending a string to BindToFile() , triggering the vulnerability. Successful exploitation allow remote attackers to execute arbi
## Author : Ahmed Obied (ahmed.obied@gmail.com)# Modify by: syniack (syniack@hotmail.com)# This program acts as a web server that generates an exploit to # target a vulnerability (CVE-2010-0249) in Internet Explorer. # The exploit was tested using I