#!perl # Wserve HTTP Server 4.6 Version (Long Directory Name) Buffer Overflow - Denial Of Service # Type : # Buffer Overflow - Denial of Service # Release Date : # {2007-04-05} # Product / Vendor : # Wserve HTTP Server # http://sourceforge.net/projec
#!/usr/bin/php -q -d short_open_tag=on ? echo phpMyNewsletter = 0.8 (beta5) Multiple Vuln Exploit by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista.org Thanks to rgod for the php code and Marty for the Love ; if ($argc3) { echo Usage:
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titlephpBB mutant 0.9.2 (phpbb_root_path) Remote File Inclusion Exploit/title script language=JavaScript //'Bug found and Exploit coded by bd0rk //'Vendor: http://ie.archi
#!/usr/bin/perl # POC exploit for Mercury Quality Center Spider90.ocx ProgColor Overflow # credit to Skylined, Trirat Puttaraksa, HDM Skape and the rest of the # metasploit crew. This exploit is just a cut and paste of thier code they # deserve the c
/** version 0.5* Copyright (c) 2007 devcode***^^ D E V C O D E ^^** Windows .ANI LoadAniIcon Stack Overflow For Hardware DEP XP SP2* [CVE-2007-1765]*** Description:* A vulnerability has been identified in Microsoft Windows,* which could be exploited
#!/usr/bin/php?phperror_reporting(E_ALL ^ E_NOTICE);# http://www.milw0rm.com/exploits/2012# They corrected (not all) a lot of SQL requests which use the ipaddress, with $db-escape_string.# They don't corrected the function (this is a choice ... the
#!/usr/bin/perl#******************************************************************# HP Mercury Quality Center runQuery exploit.# Run whatever SQL you want on there db - without SQL injection.# Problem is client can do RunQuery command os we write pr
#!/usr/bin/perl -w#Wordpress 2.1.2 SQL Injection POC#Credits: sid@notsosecure.com#Thanks to ferruh (ferruh@mavituna.com)for improving my exploitation skills#website:www.notsosecure.com#Wordpress version 2.1.2 is vulnerable to sql injection. This POC
/*************************************************************************** * IrfanView 3.99 .ANI File Buffer Overflow * * * * * * IrfanView is vulnerable to a buffer overflow when opening a crafted .ani * * file. The overflow occurs while it is cre
/*************************************************************************** * MS Windows .ANI File Local Buffer Overflow * * * * * * Credits go to Trirat Puttaraksa cause his PoC inspired this source. * * devcode's exploit didnt work for me, so I ma
/**************************************************************************** * Ipswitch WS_FTP 5.05 Server Manager Local Site Buffer Overflow * * * * * * There's a buffer overflow in iftpmgr.exe that can be triggered by * * registering a long site c
#usr/bin/python print ------------------------------------------------------------------------- print Mozilla Firefox 2.0.0.3 and Gran Paradiso 3.0a3 Denial of Service print author: shinnai print mail: shinnai[at]autistici[dot]org print site: http://
? /* Autor: Kacper Contact: kacper1964@yahoo.pl Homepage: http://www.rahim.webd.pl/ Irc: irc.milw0rm.com:6667 #devilteam Pozdro dla wszystkich z kanalu IRC oraz forum DEVIL TEAM. Picture-Engine = V1.2.0 Remote SQL Injection Exploit script homepage/do
#!/usr/bin/python # # Computer Associates (CA) Brightstor Backup Mediasvr.exe Remote Code Exploit # (Previously Unknown) # # There seems to be an design error in the handling of RPC data with xdr procedures # across several .dll's imported by Mediasv