首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
AIMP2 Audio Converter <= 2.53b330 (.pls/.m3u) Unicode Crash PoC
  日期:2009-09-02 10:41:54 点击:38 评论:0
#!/usr/bin/python # # ###################################################################### # # AIMP2 Audio Converter = 2.53 (build 330) (.pls/.m3u) Unicode local crash PoC # Found exploited by: mr_me # Download: ftp://www.catode.ru/AIMP/aimp_2.51.
Soritong MP3 Player 1.0 (.m3u//UI.txt) Universal Local BOF Exploits
  日期:2009-09-02 10:41:24 点击:41 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Soritong MP3 Player 1.0 (.m3u//UI.txt) Universal Local BOF (SEH) ############################################################################### # Original exploit:::http://www.milw0rm.com/exp
Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)
  日期:2009-09-02 10:09:25 点击:56 评论:0
#!/usr/bin/perl # IIS 5.0 FTP Server / Remote SYSTEM exploit # Win2k SP4 targets # bug found exploited by Kingcope, kcope2atgooglemail.com # Affects IIS6 with stack cookie protection # Modded by muts, additional egghunter added for secondary larger
osCommerce Online Merchant 2.2 RC2a Code Execution Exploit
  日期:2009-09-01 10:30:26 点击:79 评论:0
?php print_r(' +---------------------------------------------------------------------------+ osCommerce Online Merchant 2.2 RC2a RCE Exploit by Flyh4t mail: phpsec@hotmail.com team: http://www.wolvez.org dork: Powered by osCommerce Gr44tz to q1ur3n
Apple iPhone 2.2.1/3.x (MobileSafari) Crash & Reboot Exploit (loop)
  日期:2009-09-01 10:27:53 点击:21 评论:0
# Apple iPhone (MobileSafari) Crash Reboot # TheLeader, GSOG [st0p] hotmail [sp4m] com # Shoutz: hacking.org.il nullbyte.org.il # Tested on iPod Touch 2G, OS 2.2.1 # Launch MobileSafari, enter the page and MobileSafari will freeze. # Wait for 4-5 mi
Media Jukebox 8 (.pls) Universal Local Buffer Exploit (SEH)
  日期:2009-09-01 10:27:21 点击:38 评论:0
#!/usr/bin/python # # ###################################################################### # # Media Jukebox 8 (.pls) Universal Local Buffer Exploit (SEH) # Author: mr_me # Download: http://download.chip.eu/en/Media-Jukebox-8.0.400_76134.html # No
Hex Workshop 4.23//5.1//6.0 (.hex) Universal Local BOF Exploits (SEH)
  日期:2009-09-01 10:26:48 点击:24 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Hex Workshop v3//4//5//6 (.hex) Universal Local Buffer ExploitS (SEH) # Found By: DATA_SNIPER # http://www.bpsoft.com/downloads/ ###############################################################
MailEnable 1.52 HTTP Mail Service Stack BOF Exploit PoC
  日期:2009-09-01 10:25:20 点击:59 评论:0
/* *MailEnable 1.52 HTTP Mail Service Stack Overflow POC Exploit(encoded comand) *Debugging Info *szAppName : MEHTTPS.EXE szAppVer : 1.0.0.1 szModName : MEHTTPS.EXE *szModVer : 1.0.0.1 offset : 00010c21 *Files that caused error : *C:DOCUME~1Stefan
Ultimate Player 1.56b (.m3u/upl) Universal Local BOF Exploit (SEH)
  日期:2009-09-01 10:24:44 点击:10 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Ultimate Player v 1.56 beta (.m3u/upl) Universal Local BOF SEH #################################################################### my $bof=x41 x 4108; my $nsh=xEBx06x90x90; my $seh=xb8x
SolarWinds TFTP Server <=9.2.0.111 Remote DoS Exploit
  日期:2009-09-01 10:23:51 点击:54 评论:0
#!/usr/bin/perl # SolarWinds TFTP Server =9.2.0.111 Remote DoS Exploit # by Gaurav Baruah # TFTP Server Service stops after payload # is sent, and has to be started again in Config # Tested on XP SP3 # Big thnx: dragunov # Greetz: Sanjay use IO::Soc
Swift Ultralite 1.032 (.M3U) Local Buffer Overflow PoC
  日期:2009-09-01 10:23:24 点击:16 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # hack4love@hotmail.com # Swift Ultralite 1.032 (.M3U) Local Buffer Overflow PoC ############################################################ ##EAX 00000000 ##ECX FFFFFFFF ##EDX 004976F0 SwiftUlt.004976F0 ##EBX
Linux Kernel 2.4/2.6 sock_sendpage() Local Root Exploit (ppc)
  日期:2009-09-01 10:22:40 点击:302 评论:0
/* * Linux sock_sendpage() NULL pointer dereference * Copyright 2009 Ramon de Carvalho Valle ramon@risesecurity.org * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as pu
Linux Kernel < 2.6.31-rc7 AF_IRDA 29-Byte Stack Disclosure Exploit
  日期:2009-09-01 10:21:53 点击:59 评论:0
/* * cve-2009-3002.c * * Linux Kernel 2.6.31-rc7 AF_IRDA getsockname 29-Byte Stack Disclosure * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3002 * * The Lin
Linux Kernel 2.6 < 2.6.19 (32bit) ip_append_data() ring0 Root Exploit
  日期:2009-09-01 10:20:53 点击:99 评论:0
/* ** ** 0x82-CVE-2009-2698 ** Linux kernel 2.6 2.6.19 (32bit) ip_append_data() local ring0 root exploit ** ** Tested White Box 4(2.6.9-5.ELsmp), ** CentOS 4.4(2.6.9-42.ELsmp), CentOS 4.5(2.6.9-55.ELsmp), ** Fedora Core 4(2.6.11-1.1369_FC4smp), Fedo
Microsoft IIS 5.0/6.0 FTP Server Remote Stack Overflow Exploit (win2k) 0day
  日期:2009-09-01 10:17:25 点击:73 评论:0
# IIS 5.0 FTPd / Remote r00t exploit # Win2k SP4 targets # bug found exploited by Kingcope, kcope2atgooglemail.com # Affects IIS6 with stack cookie protection # August 2009 - KEEP THIS 0DAY PRIV8 use IO::Socket; $|=1; #metasploit shellcode, adduser w
URL Hunter version 3.0.12 local buffer overflow exploit that creates a malicious
  日期:2009-08-31 10:42:13 点击:33 评论:0
=============================================================URL Hunter Version 3.0.12(.M3u) Local Buffer Overflow Exploit =============================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
MediaCoder version 0.7.x .m3u/.lst universal local buffer overflow exploit
  日期:2009-08-31 10:40:43 点击:38 评论:0
=================================================================================MediaCoder 0.7.x (.m3u .lst) universal local buffer overlow exploit all devices=================================================================================1-=-=-=-
HTML Creator & Sender <= 2.3 build 697 Local BOF Exploit (SEH)
  日期:2009-08-31 10:40:15 点击:22 评论:0
#!/usr/bin/env python ############################################################################# # # HTML Creator Sender = v2.3 Build 697 Local Buffer Overflow Exploit (SEH) # Coded By: Dr_IDE # Based On: http://www.milw0rm.com/exploits/9446 # Te
uTorrent <= 1.8.3 (Build 15772) Create New Torrent Buffer Overflow PoC
  日期:2009-08-31 10:39:41 点击:32 评论:0
#!/usr/bin/env python ##################################################################################################### # # uTorrent = 1.8.3 (Build 15772) Create New Torrent Buffer Overflow PoC # By: Dr_IDE # Note: This is old but I figured I wo
PIPL <= 2.5.0 (.m3u File) Universal Buffer Overflow Exploit (SEH)
  日期:2009-08-31 10:37:38 点击:49 评论:0
#!/usr/bin/python # ############################################################# # PIPL = 2.5.0 (.m3u File) Universal bof exploit (SEH) # Coded by: Steven Seeley aka mr_me # email: info [At] net-ninja [d0t] net # Download: http://www.programmedinte
共637页/12733条记录 首页 上一页 [427] [428] [429] 430 [431] [432] [433] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved