首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Authentium SafeCentral <= 2.6 shdrv.sys local kernel ring0 SYSTEM POC
  日期:2010-01-18 10:25:22 点击:28 评论:0
/* safecentral-unharden.c * * Copyright (c) 2009 by mu-b@digit-labs.org * * Authentium SafeCentral = 2.6 shdrv.sys local kernel ring0 SYSTEM POC * by mu-b - Tue 1 Sep 2009 * * - Tested on: shdrv.sys 2.0.0.128 * * Compile: MinGW + -lntdll * * - this
Apple iTunes 8.1.x (daap) Buffer overflow remote exploit (CVE-2009-0950)
  日期:2010-01-15 10:11:29 点击:105 评论:0
/* iTunes-CVE09-s36.c * * Apple iTunes 8.1.x (daap) Buffer overflow remote exploit (CVE-2009-0950) * * Coded By : * .:: [ Simo36 ] ::. * * Contact : Overflows@hotmail.commailto:Overflows@hotmail.com * His0k4.hlm@gmail.commailto:His0k4.hlm@gmail.com
Winamp 5.05-5.13 .ini local stack buffer overflow poc
  日期:2010-01-14 12:44:05 点击:100 评论:0
/*Winamp 5.05-5.13 .ini local stack buffer overflow poc The problem is in the skin field when a long string is writen it causes the buffer overflow. All u have to do is replace this file with the initial one. -snipp-- [Winamp] visplugin_name=vis_avs
NPlayer (.dat Skin File) Local Heap Overflow PoC
  日期:2010-01-14 12:07:35 点击:49 评论:0
#!/usr/bin/perl #Exploit Title:NPlayer (.dat Skin File) Local Heap Overflow PoC #Date:13/01/2010 #Author:Vulnerability Discovered By Rehan Ahmed ( rehan@rewterz.com ) #Tested On: WinXP SP2 ############################################################
Nemesis Player (NSP) Local Denial of Service (DoS) Vulnerability
  日期:2010-01-14 12:07:08 点击:29 评论:0
#!/usr/bin/perl #Exploit Title: Nemesis Player (NSP) Local Denial of Service (DoS) Vulnerability #Author:Vulnerability Discovered By Rehan Ahmed ( rehan@rewterz.com ) #Vendor:http://www.nsplayer.org #Version:1.1 Beta/2.2 #Tested On: WinXP SP2 my $bo
TurboFTP Server 1.00.712 Remote DoS
  日期:2010-01-14 12:00:50 点击:65 评论:0
# Exploit Title : TurboFTP Server 1.00.712 Remote DoS # Date : 30 december 2009 # Author : corelanc0d3r (corelanc0d3r[at]gmail{dot}com) # Bug found by : corelanc0d3r (corelanc0d3r[at]gmail{dot}com) # Software Link : http://www.tbsoftinc.com/download
Ofilter Player (skin.ini) Local Crash PoC
  日期:2010-01-14 11:51:29 点击:34 评论:0
#!/usr/bin/perl #Exploit Title: Ofilter Player (skin.ini) Local Crash PoC #Author:Vulnerability Discovered By Rehan Ahmed ( rehan@rewterz.com ) #Tested On: WinXP SP2 my $boom=x41 x 5000; my $file=skin1.ini; #C:Program FilesOfilterPlayerskin open
SwiFTP v1.11 Overflow Dos PoC
  日期:2010-01-14 10:27:31 点击:65 评论:0
# Exploit Title: SwiFTP v1.11 Overflow Dos PoC # Software Link: http://swiftp.googlecode.com/files/SwiFTP_1.11.apk # Version: v1.11 # Tested on: Android OS G1 Rogers / Rooted (CyanogenMod-4.0.4) #!/usr/bin/perl ############ # # Simple Dos Crap for t
Sun Directory Server 7.0 core_get_proxyauth_dn DoS
  日期:2010-01-13 11:22:03 点击:76 评论:0
Web servers such as Zeus Web Server , Sun Web Server (pre-authentication buffer overflows) Databases, including Mysql (buffer overflows), IBM DB2 (local root vulnerability), Lotus Domino and Informix Directory servers, such as Novell eDirectory , Su
Apple Iphone/Ipod Udisk FTP basic edition Remote pre-auth DOS vulnerability
  日期:2010-01-13 11:18:27 点击:37 评论:0
|------------------------------------------------------------------|| __ __ || _________ ________ / /___ _____ / /____ ____ _____ ___ || / ___/ __ / ___/ _ / / __ `/ __ / __/ _ / __ `/ __ `__ || / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_
Real Player ActiveX remote buffer overflow poc
  日期:2010-01-12 11:47:18 点击:30 评论:0
Exploit title :[Real Player ActiveX remote buffer overflow poc] Date: [2010/01/11] Author: [D3V!L FUCKER] Software Link: [http://www.real.com] Version: [12.0.0.343] Tested on: [win XP sp2] object classid='clsid:CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA'
HTMLDOC 1.9.x-r1629 local .html buffer overflow(win32) exploit
  日期:2010-01-12 11:45:37 点击:119 评论:0
/*HTMLDOC 1.9.x-r1629 local .html buffer overflow(win32) exploit download: http://www.htmldoc.org/software.php?VERSION=1.9.x-r1629FILE=htmldoc/snapshots/htmldoc-1.9.x-r1629.tar.bz2 [header] 19 bytes [junk] 268 bytes [EIP register] 4 bytes [NOP SLEED
Audiotran 1.4.1 (PLS File) Stack Overflow (meta)
  日期:2010-01-12 11:45:01 点击:26 评论:0
require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::Seh def initialize(info = {}) super(update_info(info, 'Name' = 'Audiotran 1.4.1 (PLS File) Stack Overflow.',
Nuked KLan <= 1.7.7 & <= SP4 DOS
  日期:2010-01-12 11:44:04 点击:39 评论:0
#!/bin/bash # Nuked KLan = 1.7.7 = SP4 DOS # Copyright 2009 ; Hamza 'MizoZ' N. mizozx[at]gmail[dot]com # # Needs : cURL # This is a DOS issue for Nuked Klan = 1.7.7 = SP4 , # it uses multiple requests on the search page . # # Tested on Windows Sv 20
VLC Player v0.8.6i ActiveX DoS PoC
  日期:2010-01-11 11:06:08 点击:32 评论:0
html exploit:[vlc ActiveX remote buffer overflow poc] Author :[D3V!L FUCKER and germaya_x] soft :[vlc player] version:[o.8.6i] tested :[win xp sp2] Greetz [2] : WwW.v99x.CoM we miss you ,his0k4 object classid='clsid:9BE31822-FDAD-461B-AD51-BE1D1C159
YPOPS! v0.9.7.3 Buffer Overflow (SEH)
  日期:2010-01-11 11:02:13 点击:42 评论:0
# Version:0.9.7.3 # Tested on: Windows XP SP3 #!/usr/bin/python # All modules are SafeSEH protected in service pack 3. import socket, sys print n ======================================== print YPOPS! v 0.9.7.3 Buffer Overflow (SEH) print Proof of C
Soritong v1.0 Universal BOF-SEH (META)
  日期:2010-01-11 11:01:14 点击:36 评论:0
# Exploit Title: [Soritong v1.0 Universal BOF-SEH (META)] # Software Link: #[http://www.exploit-db.com/downloads/a1def037869c831496bda3d81b0d06f5-soritong10.exe] # Version: [V1.0] # Tested on: [windows xp 2] ## #Metasploit version by FB1h2s,Orginal
Real Player Local Crash Poc
  日期:2010-01-11 11:00:48 点击:33 评论:0
#!/user/bin/perl # Exploit Title: [Real Player Local Crash Poc] # Date: [2010/01/09] # Author: [D3V!L FUCKER] # Software Link: [http://www.real.com] # Version: [12.0.0.343] # Tested on: [windows XP sp2] # Code : $boom= http://.A x 8000000; open(myfi
Audiotran 1.4.1 Win XP SP2/SP3 English Buffer Overflow
  日期:2010-01-11 11:00:00 点击:24 评论:0
#!/usr/bin/ruby # # Exploit Title : Audiotran 1.4.1 Win XP SP2/SP3 English Buffer Overflow # Date : January 9th, 2010 # Author : Sbastien Duquette # Software Link : http://www.e-soft.co.uk/Audiotran.htm # Version : 1.4.1 # OS : Windows # Tested on :
Windows Live Messenger 2009 ActiveX DoS Vulnerability
  日期:2010-01-11 10:57:50 点击:22 评论:0
Product: Windows Live Messenger 2009 (Build 14.0.8089.726) ************************************************************************ ******** Vulnerability: ActiveX - Denial of Service *****************************************************************
共637页/12733条记录 首页 上一页 [398] [399] [400] 401 [402] [403] [404] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved