|
|
Mocha LPD v1.9 Remote Buffer Overflow DoS PoC
|
|
日期:2010-04-15 10:36:10
点击:34 评论:0
|
#!/usr/bin/python # ################################################################# # Mocha LPD v1.9 Remote Buffer Overflow DoS PoC # Author: mr_me # Software Link: http://mochasoft.dk/lpd.htm # Version: 1.9 # Tested on: Windows XP SP3 # Advisory: |
|
|
Book Library v1.4.162 Local Dos .bkd File
|
|
日期:2010-04-15 10:35:49
点击:62 评论:0
|
# Exploit Title: Book Library Local Dos .bkd file # Date: April 14, 2010 # Software Link: [http://wensoftware.com/] # Version: v1.4.162 # Tested on: Windows XP SP3 # Author: chap0 # Email: chap0x90[at]gmail[dot]com # Site: [www.setfreesecurity.com] |
|
|
MovieLibrary v1.4.401 Local Dos .dmv File
|
|
日期:2010-04-15 10:34:44
点击:46 评论:0
|
# Exploit Title: MovieLibrary Local Dos .dmv file # Date: April 14, 2010 # Software Link: [http://wensoftware.com/] # Version: v1.4.401 # Tested on: Windows XP SP3 # Author: chap0 # Email: chap0x90[at]gmail[dot]com # Site: [www.setfreesecurity.com] |
|
|
55 bytes SLoc-DoS shellcode by Magnefikko
|
|
日期:2010-04-15 10:33:36
点击:52 评论:0
|
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com Promhyl Studies :: http://promhyl.oz.pl Subgroup: #PRekambr Name: 55 bytes SLoc-DoS shellcode Platform: Linux x86 unlink(/etc/shadow); execve(poweroff, 0, 0); gcc -W |
|
|
6 bytes DoS-Badger-Game shellcode
|
|
日期:2010-04-15 10:32:37
点击:32 评论:0
|
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 6 bytes DoS-Badger-Game shellcode Platform: Linux x86 pause() gcc -Wl,-z,execstack filename.c shellcode: x31xc0xb0x1dxcd |
|
|
25 bytes execve("/bin/sh") shellcode
|
|
日期:2010-04-15 10:31:56
点击:55 评论:0
|
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 25 bytes execve(/bin/sh) shellcode Platform: Linux x86 execve(/bin/sh, 0, 0); gcc -Wl,-z,execstack filename.c shellcode: xeb |
|
|
36 bytes chmod("/etc/shadow", 0666) shellcode
|
|
日期:2010-04-15 10:31:12
点击:40 评论:0
|
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 36 bytes chmod(/etc/shadow, 0666) shellcode Platform: Linux x86 chmod(/etc/shadow, 0666); gcc -Wl,-z,execstack filename.c she |
|
|
Aircrack-NG Tools svn r1675 Remote Exploit
|
|
日期:2010-04-15 10:28:38
点击:112 评论:0
|
========================================== Aircrack-NG Tools svn r1675 Remote Exploit ========================================== #!/usr/bin/env python # -*- coding: UTF-8 -*- ''' A remote-exploit against the aircrack-ng tools. Tested up to svn r1675. |
|
|
Bild Flirt <= version 1.0 SQL Injection Vulnerability Exploit
|
|
日期:2010-04-15 10:25:49
点击:45 评论:0
|
=============================================================Bild Flirt = version 1.0 SQL Injection Vulnerability Exploit=============================================================----------------------------Information---------------------------- |
|
|
微点主动防御 Mp110013.sys <= 1.3.10123.0 本地内核权限提升漏洞
|
|
日期:2010-04-14 10:36:55
点击:198 评论:0
|
漏洞涉及产品:微点主动防御100323.1.2.10581.0278.r1及以下版本 mp110013.sys = 1.3.10123.0 漏洞影响: 通过漏洞攻击者在最低系统权限下执行内核权限代码,从而可以突破任何存在的安全防护软件,包括沙盘、主动防御、杀毒软件、防火墙、HIPS、UAC和系统安全设置 漏洞 |
|
|
MagnetoSoft NetworkResources ActiveX NetShareEnum SEH Overwrite POC
|
|
日期:2010-04-14 10:35:41
点击:37 评论:0
|
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetShareEnum SEH Overwrite POC 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Discove |
|
|
MagnetoSoft NetworkResources ActiveX NetFileClose SEH Overwrite POC
|
|
日期:2010-04-14 10:35:06
点击:30 评论:0
|
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetFileClose SEH Overwrite POC 'Discovered by: s4squatch of SecureState RD Team 'Site: www.secure |
|
|
MagnetoSoft NetworkResources ActiveX NetSessionDel POC
|
|
日期:2010-04-14 10:34:35
点击:44 评论:0
|
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetSessionDel BOF 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Discovered: 02/11/10 |
|
|
MagnetoSoft SNTP ActiveX SntpSendRequest Crash POC
|
|
日期:2010-04-14 10:31:51
点击:27 评论:0
|
html object classid='clsid:A3010B66-C229-11D5-B7BA-00C0F02DFC67' id='target' //object script language='vbscript' 'Magneto Software SNTP ActiveX SntpSendRequest BOF POC 'Discovered by: s4squatch 'Site: www.securestate.com 'www: http://www.magnetosoft |
|
|
MagnetoSoft SNTP ActiveX SntpGetReply BOF
|
|
日期:2010-04-14 10:28:21
点击:35 评论:0
|
html object classid='clsid:A3010B66-C229-11D5-B7BA-00C0F02DFC67' id='target' //object script language='vbscript' 'Magneto Software SNTP ActiveX SntpGetReply BOF 'Discovered by: s4squatch 'Site: www.securestate.com 'File Name = SKSntp.ocx 'www: http: |
|
|
MagnetoSoft ICMP ActiveX AddDestinationEntry BOF
|
|
日期:2010-04-14 10:24:09
点击:32 评论:0
|
html object classid='clsid:3A86F1F2-4921-4C75-AF2C-A1AA241E12BA' id='target'/object script language='vbscript' 'Magneto Software ICMP ActiveX Control Buffer Overflow 'Discovered by: s4squatch 'website: www.securestate.com 'Date Discovered: 03/11/09 |
|
|
MagnetoSoft DNS ActiveX DNSLookupHostWithServer POC
|
|
日期:2010-04-14 10:23:26
点击:32 评论:0
|
html object classid='clsid:B5ED1577-4576-11D5-851F-00D0B7A934F6' id='target' //object script language='vbscript' 'Magneto Software ActiveX Control ICMP Crash POC 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Discovered: 02/11/10 'Vendor |
|
共637页/12733条记录 首页
上一页
[377]
[378]
[379]
380
[381]
[382]
[383]
下一页
末页
|
|
|
|
本月热点文章 |
|
|
|
|
|
本月推荐文章 |
|
|
|
|
|
相关分类 |
|
|
|
|