首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Easy Ftp Server v1.7.0.2 MKD Remote Post-Authentication BoF Exploit
  日期:2010-04-06 10:56:28 点击:44 评论:0
#include stdio.h #include stdlib.h #include string.h #include sys/socket.h #include netinet/in.h //************************************************************************* // Easy~Ftp Server v1.7.0.2 MKD Remote Post-Authentication BoF Exploit // (
Java Mini Web Server <= 1.0 Path Traversal and Cross Site Scripting
  日期:2010-04-06 10:55:44 点击:62 评论:0
# Exploit Title: Java Mini Web Server = 1.0 Path Draversal Cross Site Scripting. # Date: 20/03/10 # Author: cp77fk4r | empty0page[SHIFT+2]gmail.com http://gmail.com | www.DigitalWhisper.co.ilhttp://www.DigitalWhisper.co.il # Software Link: http://ww
ZipScan 2.2c SEH
  日期:2010-04-06 10:55:21 点击:44 评论:0
#!/usr/bin/perl # Software : ZipScan 2.2c (.zip) # Bug found by : Lincoln # Author : Lincoln corelanc0d3r # OS : Windows # Tested on : XP SP3 En (VirtualBox) # Type of vuln : SEH # Greetz to : Corelan Security Team # http://www.corelan.be:8800/index
Microsoft Internet Explorer Tabular Data Control ActiveX Remote Code Execution V
  日期:2010-04-06 10:54:06 点击:66 评论:0
# CVE : CVE-2010-0805 !-- .text:600058F7 and [ebp+pv], 0 .text:600058FE lea eax, [ebp+pv] .text:60005904 push eax ; unsigned __int16 ** .text:60005905 push dword ptr [ebx+10h] ; struct IOleClientSite * .text:60005908 call GetHostURL(IOleClientSite *
IncrediMail 2.0 ActiveX (Authenticate) bof PoC
  日期:2010-04-06 10:53:32 点击:67 评论:0
IncrediMail 2.0 activeX (Authenticate) bof poc # by d3b4g # Tested: incerdiMail 2.0 # Vendor url:http://www.incredimail.com/english/splash.aspx # Tested on windows XP SP3 # 1-03-2010 Debugging info -------------- Exception Code: ACCESS_VIOLATION Dis
DSEmu 0.4.10 (.nds) Local Crash Exploit
  日期:2010-04-06 10:53:07 点击:32 评论:0
#!/usr/bin/env python #DSEmu 0.4.10 (.nds) local crash #Author: l3D #Sites: http://xraysecurity.blogspot.com , http://nullbyte.org.il #IRC: irc://irc.nix.co.il #Email: pupipup33@gmail.com blah=open('crash.nds', 'w') blah.write('w00t'*12) blah.close(
Dualis 20.4 (.bin) Local Daniel Of Service
  日期:2010-04-06 10:52:39 点击:31 评论:0
?php # Dualis 20.4 (.bin) Local Daniel Of Service # Software Site: http://dualis.1emu.net/ # Software Download: http://dualis.1emu.net/files/dualis-20.4.zip # Author: Pr0T3cT10n pr0t3ct10n@gmail.commailto:pr0t3ct10n@gmail.com # Site: http://www.null
Zip Unzip v6 (.zip) 0day stack buffer overflow PoC exploit
  日期:2010-04-06 10:52:16 点击:47 评论:0
?php /* ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Zip Unzip v6 (.zip) 0day stack buffer overflow PoC exploit Author: mr_me - http://net-ninja.net/ Download: http://www.microviet.com/modules/freesoftware/ Platform:
linux x86 nc -lvve/bin/sh -p13377 shellcode
  日期:2010-04-06 10:51:30 点击:50 评论:0
linux x86 nc -lvve/bin/sh -p13377 shellcode This shellcode will listen on port 13377 using netcat and give /bin/sh to connecting attacker Author: Teo Manojlovic Site: http://chaossecurity.wordpress.com/ Here is code written in NASM /////////////////
Free MP3 CD Ripper 2.6 0 day
  日期:2010-04-06 10:48:00 点击:28 评论:0
# Exploit Title: Free MP3 CD Ripper 2.6 0 day # Date: 30/03/2010 # Author: Richard leahy # Reference: # http://www.exploit-db.com/exploits/11975 # Software Link: http://www.soft32.com/Download/Free/Free_MP3_CD_Ripper/4-250188-1.html # Version: 2.6 #
Google Chrome 4.1 OOB Array Indexing Bug
  日期:2010-04-06 10:47:30 点击:73 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Advisory: Google Chrome OOB Array Indexing Bug Advisory ID: TKADV2010-004 Revision: 1.0 Release Date: 2010/03/31 Last Modified: 2010/03/31 Date Reported: 2010/03/21 Author: Tobias Klein (tk at trapkit.de
uTorrent WebUI <= v0.370 Authorization header DoS Exploit
  日期:2010-04-06 10:46:09 点击:46 评论:0
#!/usr/bin/perl # Exploit Title: uTorrent WebUI = v0.370 Authorization header DoS Exploit # Date: 2010-04-01 # Author: zombiefx darkernet[at]gmail.com http://gmail.com # Version: Torrent 2.0 (build 18488) / WebUI =v0.370 # Tested on: Windows XP SP3
mplayer <= 4.4.1 NULL pointer dereference exploit poc
  日期:2010-04-06 10:42:33 点击:34 评论:0
# Exploit Title: mplayer = 4.4.1 NULL pointer dereference exploit poc 0 day # Date: 17/03/2010 # Author: Pietro Oliva # Software Link: # Version: = 4.4.1 # Tested on: ubuntu 9.10 but should work in windows too # CVE : #Program received signal SIGSEG
TugZip 3.5 0-day
  日期:2010-04-02 09:53:06 点击:66 评论:0
#!/usr/bin/perl # Software : TugZip 3.5 (.zip) # Author : Lincoln # Assisted by : corelanc0d3r # OS : Windows # Tested on : XP SP3 En (VirtualBox) # Type of vuln : SEH # Greetz to : Corelan Security Team # http://www.corelan.be:8800/index.php/securi
Kwik Pay Payroll v4.10.3 .zip DoS
  日期:2010-04-02 09:52:36 点击:51 评论:0
# Exploit Title: Kwik Pay Payroll .zip DoS # Date: April 1, 2010 # Tested on: Windows XP SP3 # Cost: 100.00 AU # Author: chap0 # Email: chap0x90[at]gmail[dot]com # Site: [http://www.setfreesecurity.com] # # File - Restore Database - Find # Locate zi
Kwik Pay Payroll v4.10.3 .mdb Crash PoC
  日期:2010-04-02 09:51:50 点击:38 评论:0
# Exploit Title: Kwik Pay Payroll .mdb Crash PoC # Date: April 1, 2010 # Version: 4.10.3 # Tested on: Windows XP SP3 # Cost: 100.00 AU # Author: chap0 # Email: chap0x90[at]gmail[dot]com # Site: [http://www.setfreesecurity.com] # # Usage: Run Script,
DAFFTIN Password Keeper 1.0.0.15
  日期:2010-04-02 09:50:37 点击:54 评论:0
# Exploit Title: DAFFTIN Password Keeper 1.0.0.15# Date: 01/04/2010# Author: Richard leahy# Software Link: http://www.soft32.com/download_222389.html# Version: 1.0.0.15# Platform Tested on: Windows Xp Sp3 Sp2#code!#/usr/bin/env rubytest = A * 800000
uTorrent WebUI versions 0.370 and below authorization header denial of service e
  日期:2010-04-02 09:48:45 点击:85 评论:0
#!/usr/bin/perl# Exploit Title: uTorrent WebUI = v0.370 Authorization header DoS Exploit# Date: 2010-04-01# Author: zombiefx darkernet[at]gmail.comhttp://gmail.com# Version: Torrent 2.0 (build 18488) / WebUI =v0.370# Tested on: Windows XP SP3#Code:#
Escape From PDF
  日期:2010-04-01 10:35:39 点击:174 评论:0
Title: Escape From PDF Author: Didier Stevens Date: 03/29/2010 Source: http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ This is a special PDF hack: I managed to make a PoC PDF to execute an embedded executable without exploiting any vulnera
OpenDcHub 0.8.1 Remote Code Execution Exploit
  日期:2010-04-01 10:34:18 点击:81 评论:0
#!/usr/bin/python # # OpenDcHub 0.8.1 Remote Code Execution Exploit # Pierre Nogues - http://www.indahax.com # # Description: # OpenDcHub is a direct connect hub for Linux # # OpenDcHub doesn't handle specially crafted MyINFO message which lead to a
共637页/12733条记录 首页 上一页 [380] [381] [382] 383 [384] [385] [386] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved