首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Abhimanyu Infotech (show_news.php id) SQL Injection Exploit
  日期:2010-10-05 11:17:36 点击:51 评论:0
#!/usr/bin/env python #-*- coding:utf-8 -*- ''' 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_
SnackAmp 3.1.3B Malicious SMP Buffer Overflow Vulnerability (SEH - DEP BYPASS)
  日期:2010-10-05 11:11:01 点击:79 评论:0
# Exploit Title: SnackAmp 3.1.3B Malicious SMP Buffer Overflow Vulnerability (SEH - DEP BYPASS) # Date: 09/24/10 # Author: Muhamad Fadzil Ramli - mind1355 [AT] gmail [DOT] com # Credit/Bug Found By: james [AT] learnsecurityonline [DOT] com # Softwar
FreeBSD 'pseudofs' NULL Pointer Dereference Local Privilege Escalation Vulnerabi
  日期:2010-10-05 11:10:14 点击:61 评论:0
/* * Source: http://www.securityfocus.com/bid/43060/info * 18.08.2010, babcia padlina * FreeBSD 7.0 - 7.2 pseudofs null ptr dereference exploit * * * to obtain SYSENT8_SYCALL_ADDR, run: * $ kgdb /boot/kernel/kernel * (kgdb) print sysent[8].sy_call *
win32/xp pro sp3 (EN) 32-bit - add new local administrator 113 bytes
  日期:2010-10-05 11:09:14 点击:142 评论:0
/* Title: win32/xp pro sp3 (EN) 32-bit - add new local administrator 113 bytes Author: Anastasios Monachos (secuid0) - anastasiosm[at]gmail[dot]com Method: Hardcoded opcodes ( kernel32.winexec@7c8623ad , kernel32.exitprocess@7c81cafa ) Tested on: Wi
generic win32 - add new local administrator 326 bytes
  日期:2010-10-05 11:08:16 点击:84 评论:0
/* Title: generic win32 - add new local administrator 326 bytes Author: Anastasios Monachos (secuid0) - anastasiosm[at]gmail[dot]com Method: Dynamic opcode, encoded shellcode Tested on: WinXP Pro SP3 (EN) 32bit - Build 2600.100427-1636 and Build 260
Cilem Haber v1.4.4 (Tr) Database Disclosure Exploit (.py)
  日期:2010-10-05 11:07:06 点击:30 评论:0
#!/usr/bin/env python #-*- coding:cp1254 -*- ''' # Title : Cilem Haber v1.4.4 (Tr) Database Disclosure Exploit (.py) # Down. Script : http://www.aspindir.com/indir.asp?id=3287sIslem=%DDndir # Proof : http://img718.imageshack.us/img718/7993/cilem.jpg
kernel-2.6.18-164 2010 Local Root Exploit
  日期:2010-10-03 18:40:29 点击:745 评论:0
# Author: Hackeri-AL # Email : h-al [at] hotmail [dot] it # Group : UAH / United ALBANIA Hackers # Web : uah1.org.uk # Greetz: LoocK3D - b4cKd00r ~ -------------------------------------------- /* Diagnostic test for CVE-2010-3081 public exploit Greg
MySql version 5.2 Change password length shell
  日期:2010-10-03 18:37:49 点击:136 评论:0
I know I know it's been a while, I've been that much into xss and forget about the rest.. Mad respect Inj3ct0r, please do not remove the comment that says Note: None is allowed to post this to exploit-db.com /* MySql version 5.2 Change password lengt
AudioTran 1.4.2.4 SafeSEH + SEHOP Exploit
  日期:2010-10-03 18:37:16 点击:89 评论:0
# Exploit Title: AudioTran SafeSEH+SEHOP all-at-once attack method exploit # Date: 2010.10.1 # Author: x90c # Software Link: http://www.exploit-db.com/application/14961/ # Version: 1.4.2.4 # Tested on: - MS Win xp sp3 pro ko ( SafeSEH ) - MS Win xp s
Hanso Player Version 1.3.0 (.m3u) Denial of Service Vulnerability
  日期:2010-10-03 18:33:09 点击:35 评论:0
# Exploit Title: Hanso Player Version 1.3.0 (.m3u) DoS # Date: 10/02/2010 # Author: xsploited security # Software Link: http://www.hansotools.com/downloads/hanso-player-setup.exe # Version: 1.3.0 # Tested on: Windows XP Pro SP3 # CVE : N/A #########
FileApp < 2.0 for iPhone, iPad and iPod FTP Remote Denial of Service Exploit
  日期:2010-10-03 18:32:41 点击:145 评论:0
# Title : FileApp 2.0 FTP Denial of Service for iPhone,iPod,iPad # Date : 02/10/2010 # Author : m0ebiusc0de # Software : http://www.digidna.net/products/fileapp/download # Version : FileApp v.2.0, iPad 3.2.2 (jailed) # Tested on : Windows XP PRO SP3
FileApp < 2.0 for iPhone, iPad and iPod Touch Directory Traversal Vulnerability
  日期:2010-10-03 18:31:55 点击:594 评论:0
# Title : FileApp 2.0 directory traversal for iPhone,iPod,iPad # Date : 02/10/2010 # Author : m0ebiusc0de # Software : http://www.digidna.net/products/fileapp/download # Version : FileApp v.2.0, iPad 3.2.2 (jailed) # Tested on : Windows XP PRO SP3 [
AudioTran 1.4.2.4 SafeSEH+SEHOP Exploit
  日期:2010-10-03 18:30:49 点击:92 评论:0
# Exploit Title: AudioTran SafeSEH+SEHOP all-at-once attack method exploit # Date: 2010.10.1 # Author: x90c # Software Link: http://www.exploit-db.com/application/14961/ # Version: 1.4.2.4 # Tested on: - MS Win xp sp3 pro ko ( SafeSEH ) - MS Win xp
Bka Haber v1.0 (Tr) File Disclosure Exploit
  日期:2010-10-03 18:29:58 点击:32 评论:0
#!/usr/bin/env python #-*- coding:cp1254 -*- ''' # Title : Bka Haber v1.0 (Tr) File Disclosure Exploit (.py) # Desc. : its not Database # Down. Script : http://www.scriptci.com/modules.php?name=Downloadsd_op=getitlid=475 # Proof : http://img822.imag
Trend Micro Internet Security Pro 2010 ActiveX extSetOwner() Remote Code Executi
  日期:2010-10-02 12:41:10 点击:34 评论:0
### trendmicro_extsetowner.rb## Trend Micro Internet Security Pro 2010 ActiveX extSetOwner() Remote Code Execution exploit for the Metasploit Framework## Exploit successfully tested on the following platforms:# - Trend Micro Internet Security Pro 20
win32/xp sp3 (Tr) cmd.exe Shellcode 42 bytes
  日期:2010-10-02 12:34:15 点击:102 评论:0
# Title : win32/xp sp3 (Tr) cmd.exe Shellcode 42 bytes # Proof : http://img36.imageshack.us/img36/1183/cmdm.jpg # Plat. : win32 / windows # Author : ZoRLu / http://inj3ct0r.com/author/577 # mail-msn : admin@yildirimordulari.com # Home : http://z0rlu.
iGaming CMS <= 1.5 Blind SQL Injection
  日期:2010-10-02 12:30:17 点击:39 评论:0
#!/usr/bin/env perl =pod iGaming CMS = 1.5 Blind SQL Injection Author: plucky Email: io.plucky@gmail.com Web Site: http://plucky.heliohost.org Crew : WarWolfZ Usage: perl exploit.pl website user_id Example: perl exploit.pl http://website.net/iGaming
MP3 Player Utilities 3.57 (AMVTools-SrcCount.dll) Remote BOF Exploit
  日期:2010-10-01 18:27:53 点击:159 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
win32 9x/NT/2k/XP Generic cmd.exe Shellcode 159 bytes
  日期:2010-10-01 18:26:57 点击:74 评论:0
; Windows 9x/NT/2k/XP Generic cmd.exe Shellcode ; 159 bytes ; ; free of null bytes (x00), spaces (x20), tabs (x09), quotes (x22) ; ; by Pepelux - pepeluxx[at]gmail[dot]com ; http://www.pepelux.org - http://www.enye-sec.org ; ; 33 C0 64 8B 40 30 8
win32/xp sp3 (Tr) About Box Shellcode 77 bytes
  日期:2010-10-01 18:23:00 点击:81 评论:0
# Title : win32/xp sp3 (Tr) About Box Shellcode 77 bytes # Proof : http://img707.imageshack.us/img707/2276/infoja.jpg # Plat. : win32 # Author : ZoRLu / http://inj3ct0r.com/author/577 # mail-msn : admin@yildirimordulari.com # Home : http://z0rlu.blog
共637页/12733条记录 首页 上一页 [328] [329] [330] 331 [332] [333] [334] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved