/* [+] Vulnerability:PlayMeNow Malformed M3U Playlist File Buffer Overflow [+] Product:PlayMeNow - media player. [+] Versions affected:Tested with 7.3 and 7.4 [+] Tested on:Windows XP Professional with Service Pack 2 [+] Author:Gr33nG0bL1n [+] Softw
#!/usr/bin/env python # This vuln is already owned by Muts , # but i want to add the second methode # Note: we don't have more space for shellcode or Skape egghunter (23 bytes only) after SEH option # I used the jump_back because is the best and eas
################ Model - Tested on 3Com OfficeConnect ADSL Wireless 11g Firewall Router 3CRWDR100A-72 and 3CRWDR100Y-72# Software Version - Tested on 2.06T13 (Apr 2007, last version for these routers)# Attacker - Tested from GNU/Linux (Sidux and Ubu
============================================= INTERNET SECURITY AUDITORS ALERT 2009-013 - Original release date: December 7th, 2009 - Last revised: December 16th, 2009 - Discovered by: David Eduardo Acosta Rodriguez - Severity: 4/10 (CVSS Base Score
====[ SYNOPSIS ]===================================================== VideoCache is a Squid URL rewriter plugin written in Python for bandwidth optimization while browsing video sharing websites. Version 1.9.2 allows a user with the privileges of th
Connection of the HackTalk team recently found a buffer overflow in the Picasa software by Google. Below is the write up. Pentest Information: ==================== Connection has discovered a Buffer Overflow in Picasa 3.5 created by Google. An attac
#Monkey HTTP Daemon is prone to a denial-of-service vulnerability. #Remote attackers can exploit this issue to cause the application to crash, denying service to legitimate users. #Versions prior to Monkey HTTP Daemon 0.9.3 are vulnerable. #!/usr/bi
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
#name: win xp sp2 PEB ISbeingdebugged shellcode #Author: Teo Manojlovic #Contact: teo.manojlovic@skole.hr #Date: 14.12.2009. here is the ASM code made using masm32 if program is being run under debugger the shellcode wil start beeping :D ///////////
require 'msf/core' class Metasploit3 Msf::Exploit::Remote include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::Seh include Msf::Exploit::Egghunter def initialize(info = {}) super(update_info(info, 'Name' = 'Xenorate 2.50(.xpl) universal Lo
html title SAP GUI for Windows sapirrfc.dll (Accecpt) Activex Overflow /title center h1 www.Abysssec.com Public Exploit h1 /center object classid='clsid:77F12F8A-F117-11D0-8CF1-00A0C91D9D87' id='target' / script /* Application: SAP GUI for Windows,