首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
PHP 5.2.12/5.3.1 symlink() open_basedir bypass
  日期:2009-12-21 14:17:32 点击:60 评论:0
?php /* PHP 5.2.12/5.3.1 symlink() open_basedir bypass by Maksymilian Arciemowicz http://securityreason.com/ cxib [ a.T] securityreason [ d0t] com CHUJWAMWMUZG */ $fakedir=cx; $fakedep=16; $num=0; // offset of symlink.$num if(!empty($_GET['file']))
PlayMeNow Malformed M3U Playlist File Buffer
  日期:2009-12-21 14:16:43 点击:37 评论:0
/* [+] Vulnerability:PlayMeNow Malformed M3U Playlist File Buffer Overflow [+] Product:PlayMeNow - media player. [+] Versions affected:Tested with 7.3 and 7.4 [+] Tested on:Windows XP Professional with Service Pack 2 [+] Author:Gr33nG0bL1n [+] Softw
Mozilla Firefox Location Bar Spoofing Vulnerability
  日期:2009-12-21 14:16:16 点击:81 评论:0
# Exploit Title: MOZILLA FIREFOX LOCATION BAR SPOOFING VULNERABILITY # Date: 2009-12-18 # Author: Jordi Chancel # Software Link: http://www.mozilla.org/security/announce/2009/mfsa2009-69.html # Version: Mozilla Firefox 3.0.15 3.5.5 # Tested on: Windo
TFTP SERVER Buffer Overflow remote exploit
  日期:2009-12-21 14:12:17 点击:35 评论:0
#!/usr/bin/env python # This vuln is already owned by Muts , # but i want to add the second methode # Note: we don't have more space for shellcode or Skape egghunter (23 bytes only) after SEH option # I used the jump_back because is the best and eas
3Com OfficeConnect ADSL Wireless 11g Firewall Router Remote DoS Exploit by HTTP
  日期:2009-12-21 14:10:57 点击:29 评论:0
################ Model - Tested on 3Com OfficeConnect ADSL Wireless 11g Firewall Router 3CRWDR100A-72 and 3CRWDR100Y-72# Software Version - Tested on 2.06T13 (Apr 2007, last version for these routers)# Attacker - Tested from GNU/Linux (Sidux and Ubu
Cisco ASA <= 8.x VPN SSL module Clientless URL-list control bypass
  日期:2009-12-18 10:19:46 点击:84 评论:0
============================================= INTERNET SECURITY AUDITORS ALERT 2009-013 - Original release date: December 7th, 2009 - Last revised: December 16th, 2009 - Discovered by: David Eduardo Acosta Rodriguez - Severity: 4/10 (CVSS Base Score
VideoCache 1.9.2 vccleaner root vulnerability
  日期:2009-12-17 10:22:06 点击:29 评论:0
====[ SYNOPSIS ]===================================================== VideoCache is a Squid URL rewriter plugin written in Python for bandwidth optimization while browsing video sharing websites. Version 1.9.2 allows a user with the privileges of th
Google Picasa 3.5 Local DoS Buffer Overflow
  日期:2009-12-17 10:21:25 点击:59 评论:0
Connection of the HackTalk team recently found a buffer overflow in the Picasa software by Google. Below is the write up. Pentest Information: ==================== Connection has discovered a Buffer Overflow in Picasa 3.5 created by Google. An attac
Monkey HTTP Daemon < 0.9.3 Denial of Service Vulnerability
  日期:2009-12-17 10:20:33 点击:34 评论:0
#Monkey HTTP Daemon is prone to a denial-of-service vulnerability. #Remote attackers can exploit this issue to cause the application to crash, denying service to legitimate users. #Versions prior to Monkey HTTP Daemon 0.9.3 are vulnerable. #!/usr/bi
Adobe Multimeda Doc.media.newPlayer Use After Free Vulnerability(meta)
  日期:2009-12-16 09:50:26 点击:204 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
win xp sp2 PEB ISbeingdebugged shellcode
  日期:2009-12-15 10:01:35 点击:42 评论:0
#name: win xp sp2 PEB ISbeingdebugged shellcode #Author: Teo Manojlovic #Contact: teo.manojlovic@skole.hr #Date: 14.12.2009. here is the ASM code made using masm32 if program is being run under debugger the shellcode wil start beeping :D ///////////
Savant Web Server 3.1 Remote Buffer Overflow Exploit
  日期:2009-12-15 10:00:29 点击:35 评论:0
#!/usr/bin/python #Title: Savant web server 3.1 buffer overflow exploit #Author: DouBle_Zer0 #Version: 3.1 #Tested on: win xp sp2,3 [en] #Vulnerability discovered by Muts(offensive security) #x83xc4x50x54xc3 -add esp,50 push esp ret[see the dou
RM Downloader 3.0.2.1(.M3U File) Stack Overflow exploit
  日期:2009-12-15 09:59:34 点击:38 评论:0
#!/usr/bin/perl # ********************************************************* # * RM Downloader 3.0.2.1(.M3U File) Stack Overflow exploit * # ********************************************************* # # Author: Vinod Sharma # Download : http://www.rm
Mozilla Codesighs Memory Corruption PoC
  日期:2009-12-14 11:04:52 点击:25 评论:0
#!/usr/bin/perl # thedailyshow.pl # AKA # Mozilla Codesighs Memory Corruption PoC # # Jeremy Brown [0xjbrown41@gmail.com//jbrownsec.blogspot.com//krakowlabs.com] 12.12.2009 # # ************************************************************************
HP NNM 7.53 ovalarm.exe CGI Pre Authentication Remote Buffer Overflow
  日期:2009-12-14 11:04:05 点击:39 评论:0
#!/usr/bin/python # HP NNM 7.53 ovalarm.exe CGI Pre Authentication Remote Buffer Overflow # Tested on XP SP3 + NNM Release B.07.50 # Authors: muts sinn3r # Reference: http://dvlabs.tippingpoint.com/advisory/TPTI-09-12 # http://www.offensive-security
Xenorate 2.50(.xpl) universal Local Buffer Overflow Exploit (SEH)
  日期:2009-12-11 10:27:37 点击:26 评论:0
#!/usr/bin/perl =gnk ============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ _ |_____| |_____| /_/ _ |_
Xenorate 2.50(.xpl) universal Local Buffer Overflow Exploit (SEH) (meta)
  日期:2009-12-11 10:26:58 点击:28 评论:0
require 'msf/core' class Metasploit3 Msf::Exploit::Remote include Msf::Exploit::FILEFORMAT include Msf::Exploit::Remote::Seh include Msf::Exploit::Egghunter def initialize(info = {}) super(update_info(info, 'Name' = 'Xenorate 2.50(.xpl) universal Lo
Easy RM to MP3 Converter 2.7.3.700 (.m3u) File WinXP Sp2 Buffer Overflow Exploit
  日期:2009-12-11 10:26:06 点击:47 评论:0
#!/usr/bin/perl # Easy RM to MP3 Converter 2.7.3.700 (.m3u) File WinXP Sp2 Buffer Overflow Exploit # Author: Vinod Sharma # Download : http://www.rm-to-mp3.net/EasyRMtoMP3Converter.exe # Tested : Windows XP SP2 (En) # Thanks to exploit-db # Original
SAP GUI for Windows sapirrfc.dll Activex Overflow Exploit
  日期:2009-12-11 10:25:39 点击:28 评论:0
html title SAP GUI for Windows sapirrfc.dll (Accecpt) Activex Overflow /title center h1 www.Abysssec.com Public Exploit h1 /center object classid='clsid:77F12F8A-F117-11D0-8CF1-00A0C91D9D87' id='target' / script /* Application: SAP GUI for Windows,
Eureka Email 2.2q ERR Remote Buffer Overflow Exploit(meta)
  日期:2009-12-11 10:23:02 点击:25 评论:0
class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::TcpServer include Msf::Exploit::Egghunter def initialize(info = {}) super(update_info(info, 'Name' = 'Eureka Email 2.2q ERR Remote Buffer Overflow Exploit', 'D
共637页/12733条记录 首页 上一页 [412] [413] [414] 415 [416] [417] [418] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved