首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Remote buffer overflow exploit for the Serv-U web client version 9.0.0.5
  日期:2009-11-06 10:26:08 点击:60 评论:0
/* !!!FOR EDUCATIONAL USE ONLY!!! M.Yanagishita Nov 2, 2009 !!!FOR EDUCATIONAL USE ONLY!!! */ #include winsock2.h #include stdio.h #pragma comment(lib, ws2_32) #define Die(a) if(a){return;} char request[] = POST / HTTP/1.1rnHost: %srnCookie: kil
Mac OS X 10.5.6/10.5.7 ptrace() mutex handling DoS
  日期:2009-11-05 12:23:30 点击:110 评论:0
/* Mac OS X 10.5.6/10.5.7 ptrace() mutex handling DoS ================================================== This code should be run in a loop and due to problems with mutex handling in ptrace a DoS can occur when a destroyed mutex is attempted to be in
PunBB Extension Attachment versions 1.0.2 and below remote SQL injection exploit
  日期:2009-11-04 17:23:01 点击:98 评论:0
#!/usr/bin/php?phpprint_r('+---------------------------------------------------------------------------+Punbb Extension Attachment = v1.0.2 Bind SQL injection exploitby puret_tmail: puretot at gmail dot comteam: http://www.wolvez.orgdork: Powered by
Xion Audio Player version 1.0 build 121 local buffer overflow exploit
  日期:2009-11-04 17:22:26 点击:89 评论:0
# [*] Vulnerability : Xion Audio Player Local BOF# [*] Discovered by : Dragon Rider (http://securityreason.com/exploitalert/7392)# [*] drag0n.rider(at)hotmail.com# [*] Sploit written by : corelanc0d3r (corelanc0d3r[at]gmail[dot]com)# [*] Sploit rele
Symantec ConsoleUtilities ActiveX Control Buffer Overflow (msf)
  日期:2009-11-04 17:21:28 点击:40 评论:0
## # Use it only for education or ethical pentesting! The author accepts no liability for damage caused by this tool.##require 'msf/core'class Metasploit3 Msf::Exploit::Remote include Msf::Exploit::Remote::HttpServer::HTML def initialize(info = {})
RhinoSoft.com Serv-U 9.0.0.5 WebClient Remote Buffer Overflow
  日期:2009-11-04 17:15:54 点击:134 评论:0
-- KC Security PUBLIC ADVISORY -- http://www.rangos.de -- 11-01-2009RhinoSoft.com Serv-U 9.0.0.5 WebClient Remote Buffer OverflowBackground------------Serv-U includes a simple, browser-based transfer client perfectfor every business environment. The
Joomla 1.5.12 Remote Code Execution via TinyMCE upload vulnerability
  日期:2009-11-04 17:15:10 点击:132 评论:0
?php/** ** Joomla 1.5.12 Remote Code Execution via TinyMCE upload vulnerability ** ** Tested against : ** - Joomla 1.5.12 / Ubuntu 8.10 / Apache 2.2.9 ** - Joomla 1.5.12 / Windows XP SP2 / Apache 2.2.12 ** ** Luca daath De Fulgentis - daath [at] nib
Linux Kernel 'pipe.c' Local Privilege Escalation Vulnerability
  日期:2009-11-04 17:14:34 点击:80 评论:0
The following proof of concept is available: while : ; do { echo y ; sleep 1 ; } | { while read ; do echo z$REPLY; done ; } amp; PID=$! OUT=$(ps -efl | grep 'sleep 1' | grep -v grep | { read PID REST ; echo $PID; } ) OUT=${OUT%% *} DELAY=$((RANDOM *
Flash应用安全规范
  日期:2009-11-03 10:54:45 点击:48 评论:0
Flash应用安全规范 Author: jianxin [80sec] EMail: jianxin#80sec.com Site: http://www.80sec.com Date: 2009-07-25 From: http://www.80sec.com/release/flash-security.txt [ 目录 ] 000 前言 001 安全的服务端flash安全策略 002 安全的客户端flash安全规范 003 fl
CubeCart 4 suffers from a really nasty session management bypass vulne
  日期:2009-11-02 10:43:22 点击:168 评论:0
CubeCart 4 Session Management BypassRelease Date: 2009/10/29Author: Bogdan Calin (bogdan [at] acunetix [dot] com)Severity: CriticalVendor Status: Vendor has released an updated versionI. BackgroundFrom Wikipedia: CubeCart is a free-to-use eCommerce
Remote denial of service exploit for 2WIRE routers versions 5.29.52 and below
  日期:2009-11-02 10:42:59 点击:54 评论:0
print n #################################################print # 2WIRE REMOTE DoS (FW = 5.29.52) #print # #print # hkm@hakim.ws #print #################################################nimport socket, sys, urllib2 socket.setdefaulttimeout(4)try:ip
CVE-2009-1979 PoC. Working at least on Oracle 10.2.0.4 win32
  日期:2009-11-02 10:41:10 点击:203 评论:0
#include winsock2.h #include stdio.h #include string.h #include windows.h #include assert.h #include string void s_send (SOCKET s, char *msg, DWORD size) { int sent; printf (s_send: begin: %d bytesn, size); sent=send (s, (char*)msg, size, 0); if (s
Apache 2.2.0 - 2.2.11 Remote exploit
  日期:2009-10-29 10:19:59 点击:7774 评论:0
* =========================================================== !THIS 0DAY EXPLOIT IS PRIVATE PLEASE DO NOT DISTRIBUTE! =========================================================== Apache 2.2.0 - 2.2.11 Remote exploit Exploiting an off-by one bug in apr
Mozilla Firefox 3.5.3 Local Download Manager Exploit
  日期:2009-10-29 10:19:15 点击:163 评论:0
/*getunique.cAKAMozilla Firefox 3.5.3 Local Download Manager ExploitJeremy Brown [0xjbrown41@gmail.com // jbrownsec.blogspot.com // krakowlabs.com] 10.28.2009*******************************************************************************************
VMWare Workstation Virtual 8086 Linux Local ring0 exploit
  日期:2009-10-28 11:23:00 点击:164 评论:0
----------------------------------------vmware86.c---------------------------------------- // // ----------------------------------- // VMWare Workstation Virtual 8086 Linux Local ring0 // --------------------------- taviso@sdf.lonestar.org , julien
Boloto Media Player 1.0.0.9 Local (.PLS) Crash PoC
  日期:2009-10-28 11:21:38 点击:43 评论:0
############################################################################### Boloto Media Player 1.0.0.9 Local (.PLS) Crash PoC# Found By:Dr_IDE# Download:http://www.tucows.com/preview/602821# Tested On:XPSP3# Note:It locks hard if you add this f
U3D CLODProgressiveMeshDeclaration initialization array overrun
  日期:2009-10-28 11:17:19 点击:166 评论:0
##Copyright (c) 2009, Felipe Andres Manzano felipe.andres.manzano@gmail.com##All rights reserved.####Redistribution and use in source and binary forms, with or without##modification, are permitted provided that the following conditions are met:## *
xp-AntiSpy <= 3.9.7-4 Local (.XPAS File) Local DoS Exploit
  日期:2009-10-27 10:21:56 点击:59 评论:0
#!/usr/bin/env python######################################################################## xp-AntiSpy = 3.9.7-4 Local (.XPAS File) Local Buffer Overflow PoC# Found By:Dr_IDE# Tested On:XPSP3# Notes:# 1) The program does not check the imported dat
Cherokee web server version 0.5.4 remote denial of service exploit
  日期:2009-10-27 10:20:48 点击:44 评论:0
############################################################################################# Name : Cherokee Web Server 0.5.4 Denial Of Service# Author: Usman Saeed# Company: Xc0re Security Research Group# Website: http://www.xc0re.net# DATE: 25/10
RunCMS version 2M1 store() remote SQL injection exploit
  日期:2009-10-27 10:19:23 点击:55 评论:0
?php /* RunCms v.2M1 store() - 'pid' remote SQL Injection Exploit by Nine:Situations:Group::bookoo site: http://retrogod.altervista.org/ software site: http://www.runcms.org/ Function store() in /modules/forum/class/class.forumposts.php is vulnerabl
共637页/12733条记录 首页 上一页 [418] [419] [420] 421 [422] [423] [424] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved