首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Microsoft Visual Studio 6.0 (VCMUTL.dll) 0day Unicode ActiveX Buffer Overflow
  日期:2010-07-28 10:40:29 点击:55 评论:0
######################################################################################## # _ # # .-----.--.--.--.----.----.-.---| | # # | _ | | | | | -__| _ | # # | __|________|__|__|_____|_____| # # |__| By MadjiX # # Sec4ever.com # ###############
IE6 / 7 Remote Dos vulnerability
  日期:2010-07-28 10:38:58 点击:36 评论:0
# Exploit Title: IE6 / 7 Remote Dos vulnerability # Date: 27/07/2010 # Author: Richard leahy # Version: 6 / 7 # Tested on: Windows Xp Sp3 #category Remote Dos, might lead to code execution. # The vulnerability is caused due to specifying a large val
PunBB <= 1.3.4 and Pun_PM <= v1.2.6 Remote Blind SQL Injection Exploit
  日期:2010-07-28 10:37:23 点击:58 评论:0
#!/usr/bin/perl # [0-Day] PunBB = 1.3.* Package: Pun_PM = v1.2.6 Remote Blind SQL Injection Exploit # Author/s: Dante90, WaRWolFz Crew # Created: 2009.07.30 after 0 days the bug was discovered. # Crew Members: 4lasthor, Andryxxx, Cod3, Gho5t, HeRtZ,
QQPlayer smi File Buffer Overflow Exploit
  日期:2010-07-28 10:36:27 点击:60 评论:0
#!/usr/bin/env python ################################################################# # # Title: QQPlayer smi File Buffer Overflow Exploit # Author: Lufeng Li of Neusoft Corporation # Vendor: www.qq.com # Platform: Windows XPSP3 Chinese Simplified
Media Player Classic Heap Overflow/DoS Vulnerability
  日期:2010-07-27 10:05:56 点击:72 评论:0
Tested on: Media Player Classic - Home Cinema Build number: 1.3.1333.0 MPC Compiler: VS 2008 FFmpeg Compiler: GCC 4.4.1 ###################CRASH REPORT START################## ModLoad: 77be0000 77bf5000 C:WINDOWSsystem32MSACM32.dll ModLoad: 77bd0
Chrome Spoofing
  日期:2010-07-26 10:47:36 点击:59 评论:0
在Chrome 5.0.375.99下测试成功。 POC: htmlhead meta http-equiv=content-type content=text/html; charset=gb2312 titleDemo/title /head body div id=sH onmouseover=document.location='http://www.baidu.com'; style=border: 0px none ; background: rgb(0, 0, 0)
Mediacoder v0.7.3.4682 (.m3u) File Universal Buffer Overflow Exploit
  日期:2010-07-26 10:44:03 点击:47 评论:0
#!/usr/bin/perl ################################################################### #Exploit Title : Mediacoder v0.7.3.4682 (.m3u) File Universal Buffer Overflow Exploit #tested on windows xp SP 2 (FR) #Date:24/07/2010 #download : http://www.dodownl
DM Filemanager 3.9.11 Arbitrary File Upload Vulnerability
  日期:2010-07-26 10:43:09 点击:63 评论:0
?php /* ----------------------------------------------------------------- DM Filemanager (fckeditor) Remote Arbitrary File Upload Exploit ----------------------------------------------------------------- Vendor: www.dutchmonkey.com Download : http://
IBM AIX 5l FTPd Remote DES Hash Exploit
  日期:2010-07-26 10:42:22 点击:71 评论:0
/* * IBM AIX 5l FTPd Remote DES Hash Exploit -- Advanced 'Datacenter' Edition : * * Should work on IBM AIX 5.1,5.2,5.3! probably on 4.X too * * bug found exploited by Kingcope * * Version 2.0 - July 2010 * -------------------------------------------
Ubuntu 10.04 LTS - Lucid Lynx ftp Client v0.17-19build1 ACCT Buffer Overflow
  日期:2010-07-26 10:41:44 点击:86 评论:0
#Exploit Title:Ubuntu 10.04 LTS - Lucid Lynx ftp Client v0.17-19build1 ACCT Buffer Overflow #Date:23/07/2010 #Author:d0lc3d0lc3x[at]gmail[dom]com #Software Link: http://packages.ubuntu.com/ #Version:0.17-19build1 #Tested on:Linux ubuntu32 2.6.32-23-
Easy FTP Server v1.7.0.11 LIST Command Remote BoF Exploit (Post Auth) - (meta)
  日期:2010-07-26 10:40:49 点击:29 评论:0
## # EDB-ID: 14400 # Date : July 5, 2010 # Discovered by : Karn Ganeshen # Version : 1.7.0.11 # Tested on : Windows XP SP3 Version 2002 # MFR VAS TEAM : just testing howto convert exploits to metasploit modules. ## require 'msf/core' class Metasploi
Multiple Web Browser Clickjacking Vulnerability (FF3.6.7/SM 2.0.6)
  日期:2010-07-26 10:39:42 点击:26 评论:0
htmlhead meta http-equiv=content-type content=text/html; charset=UTF-8 titleFF3.6.7/SM 2.0.6 ClickJacking Vulnerability/title /headbody div id=mydiv onmouseover=document.location='http://www.mozilla.org'; style=border: 0px none ; background: rgb(0,
ZipCentral (.zip) Buffer Overflow (SEH)
  日期:2010-07-22 10:22:21 点击:44 评论:0
# Author : Jiten Pathy # July 21 2010 #Thanks to the http://en.wikipedia.org/wiki/PKZIP page for heelping me understand zip file format #Thanks to corelanc0d3r for shredding light on these type of exploits at http://www.offensive-security.com/vulnde
QQPlayer cue File Buffer Overflow Exploit
  日期:2010-07-22 10:21:30 点击:59 评论:0
#!/usr/bin/env python ################################################################# # # Title: QQPlayer cue File Buffer Overflow Exploit # Author: Lufeng Li of Neusoft Corporation # Vendor: www.qq.com # Platform: Windows XPSP3 Chinese Simplified
QQPlayer asx File Processing Buffer Overflow Exploit
  日期:2010-07-22 10:19:28 点击:36 评论:0
################################################################# # # Title: QQPlayer asx File Processing Buffer Overflow Exploit # Author: Li Qingshan of Information Security Engineering Center,School of Software and Microelectronics,Peking Univers
Imagine-cms <= 2.50 SQL Injection Exploit Vulnerability
  日期:2010-07-22 10:18:40 点击:38 评论:0
#!/usr/bin/perl ########################################### # # Script Name : Imagine-cms 2.50 # # Version : 2.50 # # Bug Type : SQL Injection # # Found by : Metropolis # # Home : http://metropolis.fr.cr # # Discovered : 21/07/2010 # # Download app :
SapGUI BI v7100.1.400.8 Heap Corruption Exploit
  日期:2010-07-22 10:17:32 点击:51 评论:0
!-- Product: SapGUI BIFile: c:program filessapbusiness explorerbiwadmxhtml.dlVersion: 7100.1.400.8ClassID: 30DD068D-5AD9-434C-AAAC-46ABE37194EBRegKey Safe for Script: FalseRegKey Safe for Init: FalseImplements IObjectSafety: TrueIDisp Safe: Saf
Lithtech Engine Memory Corruption Vulnerability
  日期:2010-07-21 11:11:14 点击:57 评论:0
# Original Advisory: http://aluigi.org/adv/fearless-adv.txt # ####################################################################### Luigi Auriemma Application: Lithtech engine http://www.lithtech.com Games: any game should be affected, refer to ht
libpng <= 1.4.2 Denial of Service Vulnerability
  日期:2010-07-21 11:09:35 点击:110 评论:0
/* Exploit Title: libpng = 1.4.2 DoS Date: July 20, 2010 Author: kripthor Software Link: http://www.libpng.org/pub/png/libpng.html Version: all products that use libpng = 1.4.2 Tested on: Windows XP Pro SP3 Eng / Ubuntu 10 CVE :CVE-2010-1205 Notes:
SapGUI BI v7100.1.400.8 Heap Corruption Exploit
  日期:2010-07-21 11:08:44 点击:58 评论:0
!-- Product: SapGUI BI File: c:program filessapbusiness explorerbiwadmxhtml.dl Version: 7100.1.400.8 ClassID: 30DD068D-5AD9-434C-AAAC-46ABE37194EB RegKey Safe for Script: False RegKey Safe for Init: False Implements IObjectSafety: True IDisp Sa
共637页/12733条记录 首页 上一页 [352] [353] [354] 355 [356] [357] [358] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved