首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Invisible Browsing 5.0.52 (.ibkey) Local Buffer Overflow Exploit
  日期:2009-09-15 10:54:34 点击:40 评论:0
#!/usr/bin/perl print qq( ############################################################ ## Iranian Pentesters Home ## ## Www.Pentesters.Ir ## ## PLATEN -[ H.jafari ]- ## ## Invisible Browsing 5.0.52 (.ibkey) Local BoF Exploit ## ## bug found exploite
Joomla Component AlphaUserPoints SQL Injection Exploit
  日期:2009-09-15 10:52:40 点击:71 评论:0
?php echo 'h2Joomla Component AlphaUserPoints SQL Injection Exploit/h2'; echo 'h4jdc 2009/h4'; echo 'fieldsetlegendBuffer/legenddiv id=update style=padding:8px;/div/fieldset'; echo 'script type=text/javascriptvar update = document.getElementById(upd
Oracle Secure Backup Server 10.3.0.1.0 Auth Bypass/RCI Exploit
  日期:2009-09-15 10:50:05 点击:82 评论:0
#!/bin/bash #Oracle Secure Backup Administration Server authentication bypass, plus command injection vulnerability #1-day exploit for CVE-2009-1977 and CVE-2009-1978 #PoC script successfully tested on: #Oracle Secure Backup Server 10.3.0.1.0_win32_
Mozilla Firefox < 3.0.14 Multiplatform RCE via pkcs11.addmodule
  日期:2009-09-14 11:09:09 点击:78 评论:0
Fix announce: http://www.mozilla.org/security/announce/2009/mfsa2009-48.html Bug history: https://bugzilla.mozilla.org/show_bug.cgi?id=326628 So, Firefox up through 3.0.13 had an obscure little function under window.pkcs11: long addmodule(in DOMStri
Siemens Gigaset SE361 WLAN Remote Reboot Exploit
  日期:2009-09-14 11:07:54 点击:133 评论:0
Attacking port 1723(flood), it restarts the device almost instantly, here's the code in PHP. It takes a few bytes for the AP to automatically restart ?php $apaddr = 192.168.2.1; $apport=1723; $con = fsockopen($apaddr, $apport, $errno, $errstr); if (
IBM AIX 5.6/6.1 _LIB_INIT_DBG Arbitrary File Overwrite via Libc Debug
  日期:2009-09-14 11:07:06 点击:148 评论:0
#!/bin/sh # # $Id: raptor_libC,v 1.1 2009/09/10 15:08:04 raptor Exp $ # # raptor_libC - AIX arbitrary file overwrite via libC debug # Copyright (c) 2009 Marco Ivaldi raptor@mediaservice.net # # Property of @ Mediaservice.net Srl Data Security Divisi
Kolibri+ Webserver 2 (GET Request) Remote SEH Overwrite Exploit
  日期:2009-09-14 11:06:24 点击:103 评论:0
#!/usr/bin/python # # Could not get this to work on XP SP3. php5ts.dll is the only module with safe seh off but could not get the pop pop ret # to work correctly despite the large number of usable addresses that were tested. # # $ ./kolibri.py 192.1
FreeRadius < 1.1.8 Remote Packet of Death Exploit (CVE-2009-3111)
  日期:2009-09-14 11:02:13 点击:54 评论:0
#!/usr/bin/env python # FreeRadius Packet Of Death # Matthew Gillespie 2009-09-11 # Requires RadiusAttr http://trac.secdev.org/scapy/attachment/ticket/92/radiuslib.py # http://www.braindeadprojects.com/blog/what/freeradius-packet-of-death/ import sy
Linux Kernel 2.4/2.6 sock_sendpage() Local Root Exploit [3]
  日期:2009-09-14 10:58:03 点击:699 评论:0
/* This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and l
Lame Windows Vista / Windows 7 / Win2k8 R1 SP2 and beta R2 SMB 2.0 NEGOTIATE PRO
  日期:2009-09-11 11:01:48 点击:119 评论:0
?php/* * Lame Windows Vista / Windows 7 / Win2k8 R1 SP2+updates and beta R2 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote BSOD * Author: Ricardo Almeida * email: ricardojba[at]aeiou[DoT]pt * * Credits: http://seclists.org/fulldisclosure/2009/Sep/0039.h
Enlightenment - Linux Null PTR Dereference Exploit Framework
  日期:2009-09-11 10:46:10 点击:1484 评论:0
/* enlightenment 200909092307 To create your own exploit module for enlightenment, just name it exp_whatever.c It will be auto-compiled by the run_exploits.sh script and thrown into the list of loaded exploit modules Each module must have the follow
Icarus 2.0 (.pgn File) Universal Local Buffer Overflow Exploit (SEH)
  日期:2009-09-11 10:44:58 点击:43 评论:0
#!/user/bin/perl #Icarus 2.0 (.PGn File)Universal Local BOF (SEH) #tested on win SP2 #origenal exploit : http://milw0rm.com/exploits/8236 #Author: germaya_x D3v!LFUCK3R #Download :http://www.randomsoftware.com/pub/icarus.exe #GreTz [2] :his0k4 , Eddy
INMATRIX Zoom Player Pro <= 6.0.0 (.MID) Integer Overflow PoC
  日期:2009-09-11 10:42:00 点击:43 评论:0
#!/usr/bin/env python ################################################################## # # INMATRIX Zoom Player Pro = 6.0.0 (.MID) Integer Overflow PoC # Found By:Dr_IDE # Credits:Platen # Tested:verified on v 5.0.2 and 6.0.0 on XP SP3 # Download:
KSP 2009R2 (m3u) Universal Local Buffer Overflow Exploit (SEH)
  日期:2009-09-11 10:41:38 点击:97 评论:0
##!/usr/bin/python # Found By :: HACK4LOVE # hack4love@hotmail.com # KSP 2009R2 (m3u) Universal Local Buffer Exploit (SEH) # http://ksplayer.boo.pl/index.php # #--- info:: KSP 2009R2 Sound Player was released 28//8//2009 # AND special THANKS FOR His
WarFTPd 1.82.00-RC12 (LIST command) Format String DoS Exploit
  日期:2009-09-11 10:39:39 点击:73 评论:0
# [*] Vulnerability : War FTP Daemon Format String DoS (LIST command) # [*] Detected by : corelanc0d3r (corelanc0d3r[at]gmail[dot]com) # [*] Type : remote DoS # [*] OS : Windows # [*] Product : Jgaa's War FTP Daemon # [*] Versions affected : 1.82 RC
linux/x86 listens for shellcode on tcp/5555 and jumps to it
  日期:2009-09-10 10:02:24 点击:41 评论:0
/* _ __ __ ___ __ | |/ /__ ____ ____ / |/ /_ __/ /_____ _ | / _ / __ / __ / /|_/ / / / / __/ __ `/ / / __/ / / / /_/ / / / / /_/ / /_/ /_/ / /_/|____/_/ /_/____/_/ /_/__,_/__/__,_/ xenomutax40phreakerx2enet http://xenomuta.tuxfamily.org/ -
Media Player Classic 6.4.9 (.mid) Integer Overflow PoC
  日期:2009-09-10 10:01:53 点击:32 评论:0
#! /usr/bin/perl print qq( ############################################################ ## Iranian Pentesters Home ## ## Www.Pentesters.Ir ## ## PLATEN -[ H.jafari ]- ## ## Media Player Classic 6.4.9(.mid) Integer Overflow PoC ## ## Vulnerability Di
jetAudio 7.1.9.4030 plus vx(asx/wax/wvx) Universal Local BOF (SEH)
  日期:2009-09-10 10:01:18 点击:48 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # hack4love@hotmail.com # jetAudio v 7.1.9.4030 plus vx(asx/wax/wvx)Universal Local BOF (SEH) ####################################################################### # use--open file--hac4love.asx after that ju
Millenium MP3 Studio (pls/mpf/m3u) Local Universal BOF Exploits (SEH)
  日期:2009-09-10 10:00:46 点击:57 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Millenium MP3 Studio (pls/mpf/m3u) Local Universal BOF ExploitS (SEH) # POC WAS BY::HACK4LOVE # http://www.milw0rm.com/exploits/9277 # thankscorelanc0d3r # 3 EXPLOITS WORK SOOOOOOOOOOOOO GOOOO
Pidgin MSN <= 2.5.8 Remote Code Execution Exploit
  日期:2009-09-10 09:59:57 点击:49 评论:0
/* * Pidgin MSN = 2.5.8 Remote Code Execution * * Pierre Nogues - pierz@hotmail.it * http://www.indahax.com/ * * * Description: * Pidgin is a multi-protocol Instant Messenger. * * This is an exploit for the vulnerability[1] discovered in Pidgin by c
共637页/12733条记录 首页 上一页 [424] [425] [426] 427 [428] [429] [430] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved