首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Internet Download Accelerator 5.8 Remote Buffer Overflow PoC
  日期:2010-09-08 10:40:25 点击:34 评论:0
!--========================== ================================================== Internet Explorer ver 7.0.5730.13 Tested On Windows SP2 Inj3ct0r team yogyacarderlink team Bug discovered by eidelweiss Affected Software: idaiehlp.dll BHO: IE 4.x-6.x B
QQPlayer 2.3.696.400p1(.wav) Denial of Service Vulnerability
  日期:2010-09-08 10:39:09 点击:54 评论:0
#!/usr/bin/python # ########################################################################################### # Exploit Title: QQPlayer 2.3.696.400p1(.wav) Denial of Service Vulnerability # Date: 07-09-2010 # Author: Hadji Samir , s-Dz[at]hotmail[
ColdUserGroup 1.06 Blind SQL Injection Exploit
  日期:2010-09-08 10:38:07 点击:47 评论:0
#!/usr/bin/python # ColdGen - coldusergroup v1.06 0day Remote Blind SQL Injection Exploit # Vendor: http://www.coldgen.com/ # Found by: mr_me # ----------------------------------------------- # Script provided 'as is', without any warranty. # Use fo
ColdCalendar 2.06 SQL Injection Exploit
  日期:2010-09-08 10:37:10 点击:47 评论:0
#!/usr/bin/python # ColdGen - coldcalender v2.06 Remote 0day SQL Injection Exploit # Vendor: http://www.coldgen.com/ # Found by: mr_me # ----------------------------------------------- # Script provided 'as is', without any warranty. # Use for educa
Java Bridge v. 5.5 Directory Traversal Vulnerability
  日期:2010-09-08 10:36:22 点击:31 评论:0
/*Title: PHP/Java Bridge 5.5 Date : Sep 6, 2010 Author: Saxtor {Location: South America (Guyana)} Email: admin@saxtorinc.com Category::nbsp; Web Applicationsnbsp; Verison: 5.5 suffers a directory traversal vulnerability.nbsp; This vulnerability coul
Novell Netware NWFTPD RMD/RNFR/DELE Argument Parsing Buffer overflow
  日期:2010-09-08 10:35:42 点击:55 评论:0
''' __ __ ____ _ _ ____ | / |/ __ / | | | | _ | / | | | | / | | | | |_) | | |/| | | | |/ / | | | | _ Day 7 - (Binary Analysis) | | | | |__| / ____ |__| | |_) | |_| |_|____/_/ _____/|____/ http://www.exploit-db.com/moaub-7-novell-ne
win32/vista sp1 ING. (cmd.exe) shellcode 26 bytes
  日期:2010-09-07 10:33:38 点击:48 评论:0
/* Author : KnocKout Tnx: DaiMon,Barcod3 Contact : knockoutr@msn.com Tested on : Vista SP1 ING. */ #include windows.h #include winbase.h unsigned char hellcodenet[]= x8bxecx55x8bxec x68x65x78x65x2F x68x63x6dx64x2e x8dx45xf8x50xb8
phpcrs <= 3.Za / Local File Inclusion Vulnerability
  日期:2010-09-07 10:32:54 点击:28 评论:0
# Author: Pepelux pepelux[at]enye-sec.org # Software Link: http://sourceforge.net/projects/phpcrs/ # Version: = 3-Za - Release Date: 2010-01-02 # Category:: webapps # Google dork: # Tested on: windows linux Debian #! /usr/bin/perl # -=-=-=-=-=-=-=-=-
IZArc DLL Hijacking (ztv7z.dll) Exploit
  日期:2010-09-07 10:31:38 点击:104 评论:0
/* Exploit Title: IZArc DLL Hijacking Exploit (ztv7z.dll) Date: 01/09/2010 Author: Anastasios Monachos (secuid0) - anastasiosm[at]gmail[dot]com Software Version: IZArc 4.1.2.2012 Vendor Site: http://www.izarc.org/ Vulnerable Extensions: rar, zip, jar
HP OpenView NNM webappmon.exe execvp_nc Remote Code Execution
  日期:2010-09-07 10:31:15 点击:53 评论:0
''' __ __ ____ _ _ ____ | / |/ __ / | | | | _ | / | | | | / | | | | |_) | | |/| | | | |/ / | | | | _ | | | | |__| / ____ |__| | |_) | |_| |_|____/_/ _____/|____/ ''' ''' Title : HP OpenView NNM webappmon.exe execvp_nc Remote Code E
Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit
  日期:2010-09-07 10:30:37 点击:161 评论:0
#!/bin/bash # Exploit Title: Gantry Framework 3.0.10 (Joomla) Blind SQL Injection Exploit # Date: 4 September 2010 # Author: jdc # Software Link: http://www.gantry-framework.org # Version: 3.0.10 # Patched: 3.0.11 if [ $1 == ] then echo $0 usage: $0
myBB 1.0.6 Denial of Service Exploit
  日期:2010-09-07 10:29:37 点击:88 评论:0
# Date: [06.09.10] # Author: [BARCOD3] # Version: [1,0,6] # Category:: [WEBAPPS] # Google dork: [inurl:powered by mybb] # Tested on: [redhat] #!/usr/bin/perl use IO::Socket; print n+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+n; print + IPBoard
phpBB 3.0.7-PL1 - Denial Of Service PoC
  日期:2010-09-06 10:37:38 点击:416 评论:0
################################################ Author : KnocKout Thanks : DaiMon,BARCOD3 Say : Siz kovalayin, Biz sadece Keyfi takiliyoruz. Contact : knockoutr@msn.com Tested on : redhat LINUX ############################################## ########
SMF 2.0 RC3 - Denial Of Service Exploit(redhat)
  日期:2010-09-06 10:36:54 点击:410 评论:0
################################################ Author : KnocKout Thanks : DaiMon,BARCOD3 Say : Siz kovalayin, Biz sadece Keyfi takiliyoruz. Contact : knockoutr@msn.com Tested on : redhat LINUX ############################################## ########
Windows Media Player 11 DLL Hijacking Vulnerability
  日期:2010-09-06 10:36:00 点击:37 评论:0
/*Windows Media Player 11 DLL Hijacking Vulnerability ~Legion Of Xtremers and Hackers Garage~ Author: Prashant Uniyal Special greets to:vinnu and Secfence Team Greets to: b0nd,fb1h2s,AnArKi,d4rk357,d4rky Version: Windows Media Player 11.0.5721.5145 T
Trend Micro Internet Security Pro 2010 extSetOwner Code Execution
  日期:2010-09-06 10:35:01 点击:111 评论:0
Title : Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Version : UfPBCtrl.DLL 17.50.0.1366 (XP SP3) Analysis : http://www.abysssec.com Vendor : http://www.trendmicro.com Impact : Critical Contact : shahin [at] abysss
win32/xp Checksum Routine shellcode 122 bytes
  日期:2010-09-06 10:34:28 点击:50 评论:0
;Exploit Title: Shellcode Checksum Routine ;Date: Sept 1 2010 ;Author: dijital1 ;Software Link: http://www.ciphermonk.net/code/exploits/shellcode-checksum.asm ;Tested on: Omelet Hunter Shellcode in MSF ;|----------------------------------------------
Virtual DJ Trial v6.1.2 SEH Buffer Overflow Crash PcC
  日期:2010-09-06 10:25:05 点击:63 评论:0
#Virtual DJ Trail 6.1.2 SEH Buffer Overflow Crash POC #vulnerble application link http://www.virtualdj.com/download/trial.html #tested on XP SP2 #author abhishek lyall - abhilyall[at]gmail[dot]com #web - http://www.aslitsecurity.com/ #blog - http://
Linux/ARM - execve("/bin/sh", [0], [0 vars]) - 27 bytes
  日期:2010-09-06 10:24:10 点击:62 评论:0
/* Title: Linux/ARM - execve(/bin/sh, [0], [0 vars]) - 27 bytes Date: 2010-08-31 Tested on: ARM926EJ-S rev 5 (v5l) Author: Jonathan Salwan - twitter: @shell_storm shell-storm.org Shellcode ARM with not a 0x20, 0x0a and 0x00 Disassembly of section .t
FCrackZip 1.0 Local Buffer Overflow Proof of Concept
  日期:2010-09-06 10:23:18 点击:90 评论:0
# Exploit Title: FCrackZip Local Buffer Overflow PoC # Date: September 5th, 2010 # Author: 0x6264 # Software Link: http://oldhome.schmorp.de/marc/data/fcrackzip-1.0.tar.gz # Version: 1.0 # Tested on: Ubuntu 10.04 # CVE : None Software Description: f
共637页/12733条记录 首页 上一页 [337] [338] [339] 340 [341] [342] [343] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved