?php //PHP 5.2.3 tidy_parse_string() local buffer overflow exploit (win) //by GaRY wofeiwo_at_gmail_dot_com //Based on http://www.milw0rm.com/exploits/4080 by rgod //Just change the shellcode ////Tested on xp Pro sp2 cn if (!extension_loaded(tidy))
?php //PHP = 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit //by GaRY wofeiwo_at_gmail_dot_com //Based on http://www.milw0rm.com/exploits/4204 by shinnai //Just change the shellcode //Tested on xp Pro sp2 cn if (!extension_loa
/* Attached and in-line is an exploit for a newly announced item on the WabiSabiLabi auction block. I hope this completely devalues the item so that the original finder dies of starvation. DON'T SELL BUGS THROUGH WABISABILABLA USE EXPLOITS TO HACK CO
?php //PHP 5.2.3 win32std extension safe_mode and disable_functions protections bypass //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp Pro sp2 full patched, worked both from the cli and on a
#!/usr/bin/perl ############################################################### # Bug Found By ::DeltahackingTEAM ## # Coded By Reza.Yavari (Dr.Pantagon) ## #Web Site::Www.Deltahacking.net And Www.DeltaSecurity.ir And Www.PersianWhois.com ## #Free Up
########################################################################################### # Lotus Domino IMAP4 Server Release 6.5.4 / Windows 2000 Advanced Server x86 Remote Exploit ##################################################################
?php //PHP = 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit //bug discovered by rgod //Original advisory: http://retrogod.altervista.org/php_446_snmpget_local_bof.html //[quote=rgod]more than 256 chars result in simple eip over
/* * AstKilla2.c * gcc -o astkilla2 astkilla2.c * ./astkilla2 -h 216.246.**.*** * In no event will the author of this source be liable for any loss or damage of a material or * immaterial nature arising from access to, use or non-use of published inf
?php //PHP 5.2.3 glob() Remote DoS Exploit //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp sp2, worked both from the cli (EIP overwrite) and on apache (Denial of Service) //Bug discovered wi
?php //PHP 5.2.3 bz2 com_print_typeinfo() Remote DoS Exploit //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp sp2, worked both from the cli and on apache //Bug discovered with Footzo (thanks