首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Catalog Manager Database Disclosure Exploit
  日期:2010-10-12 13:05:29 点击:35 评论:0
#!/usr/bin/perl -w## Catalog Manager Database Disclosure Exploit ## Found Coded: indoushka## Home: http://www.hack-r1z.com/cc/##Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===============
Beta Asp - Anket Database Disclosure Exploit
  日期:2010-10-12 13:05:05 点击:23 评论:0
#!/usr/bin/perl -w## Beta Asp - Anket Database Disclosure Exploit ## Found Coded: indoushka## Home: http://www.hack-r1z.com/cc/##Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ==============
xweblog.2.2 Database Disclosure Exploit
  日期:2010-10-12 13:04:04 点击:37 评论:0
#!/usr/bin/perl -w # # xweblog.2.2 Database Disclosure Exploit # # Found Coded: indoushka # # Date: 25/07/2010 # # Home: http://www.hack-r1z.com/cc/ # # Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meh
AoA Audio Extractor v2.x ActiveX ROP exploit
  日期:2010-10-12 13:03:20 点击:63 评论:0
html p centerAoA Audio Extractor v2.x ActiveX ROP exploitbr / Hadji Samir - s-dz|AT|hotmail.fr mr_me - mr_me|AT|net-ninja.netbr //center /p !-- some notes about the exploit: - Tested working on a fully patched windows XP sp3 IE8 VM Last update was d
Sync Breeze Server v2.2.30 Remote Buffer Overflow Exploit
  日期:2010-10-12 13:02:49 点击:102 评论:0
#!/usr/bin/python # Exploit Title: Sync Breeze Server v2.2.30 Remote BOF Exploit # Date: 10/10/2010 # Author: Xsploited Security [aka xsploitedsec] # URL: http://www.x-sploited.com/ # Contact: xsploitedsecurity [at] x-sploited.com # Software Link: h
FoxPlayer 2.3.0 (.m3u) Buffer Overflow Vulnerability
  日期:2010-10-11 09:55:29 点击:23 评论:0
#!/usr/bin/perl ########################################################################### #Title: FoxPlayer Version 2.3.0 (.m3u) Local BOF PoC #Download: http://www.foxmediatools.com/products/foxplayer.html #Tested on WinXP Pro SP2 #Author: Anastas
AlZip v7.4 DLL Hijacking Exploit (ieframe.dll)
  日期:2010-10-09 09:34:22 点击:59 评论:0
$ Program: AlZip $ Version: 7.4 $ Download: http://www.altools.com/ Found by Pepelux pepelux[at]enye-sec.org http://www.pepelux.org eNYe-Sec - www.enye-sec.org Tested on: Windows XP SP2 Windows XP SP3 Extensions: .rar .r00 ... .r99 .zoo How to use :
MySQl 5.1 DLL Hijacking Exploit (lPK.dll)
  日期:2010-10-09 09:33:52 点击:175 评论:0
/* Exploit Title: MySQl 5.1 DLL Hijacking Exploit (lPK.dll) Date: Octobre 6, 2010 Author: Mu$lim redouan@live.ma Version: 5.1 Tested on: Windows XP SP3 fr Vulnerable Files: - mysqld.exe - MySQLInstanceConfig.exe - mysql.ex - mysql_upgrade.exe - mysql
Apache 2.2.15 DLL Hijacking Exploit (lPK.dll)
  日期:2010-10-09 09:33:26 点击:261 评论:0
/* Exploit Title: Apache 2.2.15 DLL Hijacking Exploit (lPK.dll) Date: Octobre 6, 2010 Author: Mu$lim redouan@live.ma Version: 2.2.15 Tested on: Windows XP SP3 fr File Vulnerable: - httpd.exe - ApacheMonitor.exe - htpasswd.exe - htdigest.exe - htdbm.e
My Vacation Tracker DLL Hijacking Exploit (svctaglib.dll)
  日期:2010-10-09 09:32:37 点击:32 评论:0
/*#My Vacation Tracker DLL Hijacking Exploit (svctaglib.dll)#Author : anT!-Tr0J4n#Greetz : Dev-PoinT.com ~ inj3ct0r.com ~ All Dev-poinT members and my friends#Email : D3v-PoinT[at]hotmail[d0t]com C1EH[at]Hotmail[d0t]com#Software Link:http://www.myva
xWeblog v2.2 (arsiv.asp tarih) SQL Injection Exploit
  日期:2010-10-09 09:27:00 点击:48 评论:0
#!/usr/bin/env python #-*- coding:utf-8 -*- ''' # Title : xWeblog v2.2 (arsiv.asp tarih) SQL Injection Exploit (.py) # Proof : http://img408.imageshack.us/img408/7624/sqlm.jpg # Script Down. : http://www.aspdunyasi.com/goster.asp?id=19 # Tested : Wi
LPC 0day
  日期:2010-10-09 09:22:59 点击:218 评论:0
#include windows.h #include stdio.h //#include ntdll.h //#pragma comment(lib,ntdll.lib) #pragma comment(lib,advapi32.lib) typedef enum _PROCESSINFOCLASS { ProcessDebugPort=7// 7 Y Y } PROCESSINFOCLASS; typedef struct _UNICODE_STRING { USHORT Length;
Joomla Component com_clubmanager Exploit
  日期:2010-10-08 09:16:29 点击:36 评论:0
#!/usr/bin/perl -w ######################################## #[~] Author : Fl0riX #[!] Script Name: Joomla com_clubmanager ######################################## print tt nn; print tt Fl0rix | Bug Researchers nn; print tt nn; print tt
Multiple Vendors libc/glob(3) Resource Exhaustion (+0day remote ftpd-anon)
  日期:2010-10-08 09:15:45 点击:88 评论:0
Source: http://securityreason.com/securityalert/7822 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [ Multiple Vendors libc/glob(3) resource exhaustion (+0day remote ftpd-anon) ] Author: Maksymilian Arciemowicz http://netbsd.org/donations/ http://sec
HP Data Protector Manager v6.11 / NULL Pointer Dereference DoS
  日期:2010-10-08 09:14:58 点击:65 评论:0
# Bug: NULL Pointer Dereference Remote Denial of Service Vulnerabilities # # Software: http://www.hp.com # Date: 06/10/2010 # Author: Pepelux - pepelux[AT]enye-sec[DOT]com # http://www.enye-sec.org - http://www.pepelux.org # # Vulnerable file: Progra
FreeBSD 2010 8.*, 7.* Local Root Exploit
  日期:2010-10-08 09:13:21 点击:67 评论:0
/* freebsd mbufs() sendfile cache poisoning-priv escalation x86/x64 local root xpl v2 by Hackeri-AL 2010 -- tested on: 8.1-RC1, 8.0-RELEASE, 7.3-RELEASE and 7.2-RELEASE-p8 (xd personally did 7.2 test) poisons /bin/sh to contain shellcode which does t
Microsoft IIS FTP Server NLST Response Overflow(meta)
  日期:2010-10-07 11:48:46 点击:122 评论:0
### $Id: ms09_053_ftpd_nlst.rb 10558 2010-10-05 23:39:14Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more informatio
HP Data Protector Media Operations NULL Pointer Dereference Remote DoS
  日期:2010-10-07 11:44:32 点击:35 评论:0
#!/usr/bin/python import socket,struct,sys,os SIGN=0x04030201 cmd=0x01000000 def main(): if len(sys.argv)!=2: printn[x] Usage: python +sys.argv[0]+ ip_server n sys.exit(0) else: host=sys.argv[1],19813#default port TCP/19813 if sys.platform==win32:
ASP.NET Padding Oracle Vulnerability (MS10-070)
  日期:2010-10-07 11:43:17 点击:308 评论:0
# Source: http://blog.mindedsecurity.com/2010/10/breaking-net-encryption-with-or-without.html #!/usr/bin/perl # # # Webconfig Bruter - exploit tool for downloading Web.config # # FOr use this script you need Pudbuster. # Padbuster is a great tool an
Adobe Acrobat and Reader Array Indexing Remote Code Execution Vulnerability
  日期:2010-10-07 11:42:15 点击:52 评论:0
nSense Vulnerability Research Security Advisory NSENSE-2010-001 --------------------------------------------------------------- Affected Vendor: Adobe Affected Product: Adobe Reader 9.3.4 for Macintosh Platform: OS X Impact: User assisted code execu
共637页/12733条记录 首页 上一页 [327] [328] [329] 330 [331] [332] [333] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved