#!/usr/bin/env python # # # Serva 3.0.0 HTTP Server Module Remote Denial of Service Exploit # # # Vendor: Patrick Masotta # Product web page: http://www.vercot.com # Affected version: 3.0.0.1001 (Community, Pro, 32/64bit) # # Summary: Serva is a ligh
!-- Source: http://blog.skylined.nl/20161209001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. I did not investigate this vulnerability thoroughly, so I cannot speculate on t
!-- Source: http://blog.skylined.nl/20161208001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. I did not investigate this vulnerability thoroughly, so I cannot speculate on t
!-- Source: http://blog.skylined.nl/20161207001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. I did not investigate this vulnerability thoroughly, so I cannot speculate on t
# Exploit Title: TP-LINK TD-W8951ND - Denial of Service # Date: 2016-12-07 # Exploit Author: Persian Hack Team # Discovered by : Mojtaba MobhaM # Tested on: Windows AND Linux # Demo Construction : https://youtu.be/7mv_rW3mtVE #!/usr/bin/python import
# Title : Dual DHCP DNS Server 7.29 Buffer Overflow (Dos) # Date : 07/12/2016 # Author : R-73eN # Tested on: Dual DHCP DNS Server 7.29 on Windows 7 SP1 (32bit) # Vendor : http://dhcp-dns-server.sourceforge.net/ # Software : https://sourceforge.net/pr
!-- Source: http://blog.skylined.nl/20161206001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Internet Explorer 9. A pointer set up to point to certain data on the stack can be used after that d
Source: http://blog.skylined.nl/20161205001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge. I did not investigate this vulnerability thoroughly, so I cannot speculate on the potential impact
!-- Source: http://blog.skylined.nl/20161202001.html Synopsis A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 9. I did not investigate this vulnerability thoroughly, so I cannot speculate on the
Source: http://blog.skylined.nl/20161201001.html Synopsis A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge. I did not investigate this vulnerability thoroughly, so I cannot speculate on the potential impact
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=952 There is an info leak in JSON.parse. If this function is called with a reviver, and the reviver modifies the output object to contain a native array, the Walk function assumes
#!/usr/bin/python import socket,os,time #SEH Stack Overflow in GET request #DiskBoss Enterprise 7.4.28 #Tested on Windows XP SP3 Windows 7 Professional #For educational proposes only host = 192.168.1.20 port = 80 #badchars x00x09x0ax0dx20 #msfve
#!/usr/bin/python #Open the DupScout client and click on Tools click on Connect Network Drive type the content of boom.txt in the User Name field. The payload is sent to the DupScout server (port 9126) #SEH based stack overflow in DupScout server #Te