# # Author : Ahmed Obied (ahmed.obied@gmail.com) # # - Based on the code found by str0ke in the wild for MS09-002 # - Tested using Internet Explorer 7.0.5730.11 on Windows XP SP2 # # Usage : python ie_ms09002.py [port] # import sys, socket from BaseH
Curl/Libcurl Arbitrary File Access Release date: 03/Mar/2009 Last Modified: N/A Author: David Kierznowski http://withdk.com Application: cURL/libcURL Risk: HIGH CVE-2009-0037 Quote from: http://curl.haxx.se/libcurl/ : libcurl is a free and easy-to-us
HTML !-- EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability Version: 2.2 Date: Jan 11, 2007 Size:1519KB Download Easy Chat Server http://www.echatserver.com/ecssetup.exe By Mountassif Moad -- HEAD TITLEEFS Easy Chat Server (XSRF) Change Admi
#!usr/bin/perl -w ####################################################################################### # Yaws before 1.80 allows remote attackers to cause a denial of service (memory # consumption and crash) via a request with a large number of he
!-- Sopcast SopCore Control (sopocx.ocx 3.0.3.501) SetExternalPlayer() user assisted remote code execution poc by Nine:Situations:Group::surfista (IE7/8) our site: http://retrogod.altervista.org/ software site: http://www.sopcast.org/ Through the Set
#usage: exploit.py print ************************************************************************** print Media Commands (m3u File) local Seh Overwrite Exploitn print Founder: Hakxer print Exploited: His0k4 print Tested on: Windows XP Pro SP2 Frn p
#! /usr/bin/env python## Copyright (c) 2009 Mobile Security Lab www.mseclab.com## Permission is hereby granted, free of charge, to any person obtaining a copy# of this software and associated documentation files (the Software), to deal # in the Soft
#! /usr/bin/env python## Copyright (c) 2009 Mobile Security Lab www.mseclab.com## Permission is hereby granted, free of charge, to any person obtaining a copy# of this software and associated documentation files (the Software), to deal # in the Soft
script functiongb2utf8(data){ var glbEncode =[]; gb2utf8_data =data; execScript( gb2utf8_data = MidB (gb2utf8_data,1),VBScript); var t = escape (gb2utf8_data).replace(/%u/g,).replace(/(.{2})(.{2})/g,%$2%$1).replace(/%([A-Z].)%(.{2})/g,@$1$2); t t =t
Demium CMS, version 0.2.1 Beta, is prone to multiple remote vulnerabilities, because of insufficient security on it. Let's see them. In this advisory you can find vulnerabilities, afflicted source, and multiple Remote Exploit. Credits to : Giovanni B
#!/usr/bin/perl -w # Hex Workshop = v6 (.hex) File Local Code Execution # Discovred by : Security^Ghost # Exploited by : DATA_SNIPER # Exploit Tested on WindoZ XP SP2 FR. # for more information vist my blog:http://datasniper.arab4services.net/ # the