## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
#!/usr/bin/env python #POC Memory disclosure/ Denial Of Service #HP Data protector 4.00-sp1 43064 #Tested for Windows Version Only ''' Buggy code @dpwinsup module of dpwingad process running at 3817/TCP port dpwinsup.10275F80 100DDE89 8B15 54A72210 M
#!/usr/bin/python # # ------- Zen Cart 1.3.8 Remote SQL Execution # http://www.zen-cart.com/ # Zen Cart Ecommerce - putting the dream of server rooting within reach of anyone! # A new version (1.3.8a) is avaible on http://www.zen-cart.com/ # # BlackH
#!/usr/bin/php ?php # # ------- Zen Cart 1.3.8 Remote Code Execution # http://www.zen-cart.com/ # Zen Cart Ecommerce - putting the dream of server rooting within reach of anyone! # A new version (1.3.8a) is avaible on http://www.zen-cart.com/ # # Bla
?PHP /* Someone decided to contact mybb's staff informing about this vulnerability with the obvious result that this will not work anymore. Fucking moron. I'm releasing a non-finished version of the exploit. No help, PoC and with the necessity of --
?php /* DOS for the vulnerbility at http://isc.sans.org/diary.html?storyid=6601 I wrote it in PHP because I find it funny to make PHP attack apache... I set it at 200 processes and it kill my test servers pretty quick. have fun kiddiez... greetz: m1
/*netbsd/x86 kill all processes shellcodeauthor Teo Manojlovic contact teo.manojlovic@skole.hrthis shellcode is using syscall number 37 or 0x2537 STD { int sys_kill(int pid, int signum); }here is assembler code using intel syntaxe and NASM----------
Released since Apple published the iPhone 3.0 security fixes.Vulnerability Report--- BEGIN ADVISORY ---Manufacturer: Apple (www.apple.com)Device: iPhone 3G (iPhone 1st Gen)Firmware: 2.1 (possible earlier versions)Device Type: smart phoneSubsystems:
[PHP safe_mode bypass with exec/system/passthru] Once againphp public new version :php5.2.10 ,and it fix lots of bugs, like this :Bug #45997[safe_mode bypass with exec/system/passthru] incorrect fixphp5.2.10... b = strrchr(cmd, PHP_DIR_SEPARATOR);#i
#!/usr/bin/python# This was written for educational purpose only. Use it at your own risk.# Author will be not responsible for any damage!# !!! Special greetz for my friend sinner_01 !!!# !!! Special thanx for d3hydr8,low1z and rsauron who inspired
Edraw PDF Viewer Component ActiveX Remote code execution vulnerability By Jambalaya of Nevis Labs Date: 2009.06.16 Vender: EdrawSoft Affected: Edraw PDF Viewer Component 3.2.0.126 *other version may also be affected Overview: Edraw PDF Viewer Compone
/* deslock-dlpcrypt.c * * Copyright (c) 2009 by mu-b@digit-labs.org * * DESlock+ 4.0.2 local kernel SYSTEM exploit * by mu-b - Thu 18 Jun 2009 * * - Tested on: dlpcrypt.sys 0.1.1.27 * * .text:0001BB2E: 'what do ya want for nothing?' * - hmmm, somethi