#!/usr/bin/perl #[+] Bug : Destiny Media Player 1.61 (.pls) Universal Buffer overflow (SEH) #[+] Author : ThE g0bL!N #[+] Greetz : ma 3labaliche :D #[+] Use : open the pls file directly :) #[+] Note: His0k4 Merci jamais Raditni #####################
#!/usr/bin/python import socket, time #########################################INFO################################################ # NT_Naming_Service.exe (License Manager 2005 for SAP Business One 2005-A) is # # vulnerable to a stack-based buffer
/* Title: Google SketchUp Pro 7.0 Model File Handling Remote Stack Overflow PoC Vendor: Google Inc. ( http://www.google.com ) Product Web Page: http://www.sketchup.com http://sketchup.google.com Current Version: 7.0.10247 Summary: Google SketchUp Pro
#!/usr/bin/perl #[0-Day] PunBB Reputation.php Mod = v2.0.4 Local File Inclusion Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew #register_globals = On #magic_quotes_gpc = On use LWP::UserAgent; use HTTP::Cookies;
------- EPSON Status Monitor 3 local privilege escalation vulnerability -------- by Nine:Situations:Group::bruiser site: http://retrogod.altervista.org/ -------------------------------------------------------------------------------- After that pyro
/* VLC Media Player 'smb://' URI Handling Remote Buffer Overflow Vulnerability Exploit * Reference: http://www.securityfocus.com/bid/35500 * * Tested on VLC media player 0.8.6f on WinXP SP3 * * Coded by Pankaj Kohli * http://www.pank4j.com * */ #incl
/* ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC Based on: http://www.securityfocus.com/data/vulnerabilities/exploits/35848.txt by kingcope - this is basically a rewrite of the above, lame i know, but fun enough for the [zone] argume
# # Winmod 1.4 (.lst) Local Stack Overflow Exploit (RET overwrite+SEH) # http://www.software112.com/products/winmod+download.html # # Exploit for Windows XP SP3 (en) # # by corelan - c0d3r # Greetings to Saumil and SK # my $sploitfile = c:\program
#!/usr/bin/perl #[0-Day] PunBB Reputation.php Mod = v2.0.4 Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew use strict; use LWP::UserAgent; use HTTP::Cookies; use HTTP::Request::Common; u