首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Destiny Media Player 1.61 (.pls) Universal Buffer Overflow Exploit (SEH)
  日期:2009-08-03 12:15:36 点击:25 评论:0
#!/usr/bin/perl #[+] Bug : Destiny Media Player 1.61 (.pls) Universal Buffer overflow (SEH) #[+] Author : ThE g0bL!N #[+] Greetz : ma 3labaliche :D #[+] Use : open the pls file directly :) #[+] Note: His0k4 Merci jamais Raditni #####################
Arab Portal v2.x (forum.php qc) Remote SQL Injection Exploit
  日期:2009-08-03 12:14:22 点击:58 评论:0
? /* [ Arab Portal v2.x (forum.php qc) SQL Injection Exploit ] [-] Author : rEcruit [-] Mail : recru1t@ymail.com [-] Download : http://arab-portal.net/download.php [-] Vuln in ./forum.php Line: 1503 [code] if((isset($apt-get[qc])) (!isset($apt-get[qp
SAP Business One 2005-A License Manager Remote BOF Exploit
  日期:2009-08-03 12:13:30 点击:61 评论:0
#!/usr/bin/python import socket, time #########################################INFO################################################ # NT_Naming_Service.exe (License Manager 2005 for SAP Business One 2005-A) is # # vulnerable to a stack-based buffer
VLC Media Player 0.8.6f smb:// URI Handling Remote BOF Exploit (univ)
  日期:2009-08-03 12:12:32 点击:188 评论:0
#!/usr/bin/python #[*] Exploit : VLC Media Player 0.8.6f smb:// URI Handling Remote BOF Exploit (univ) #[*] Credits :Pankaj Kohli #[*] Exploit : His0k4 header1=( x3cx3fx78x6dx6cx20x76x65x72x73x69x6fx6ex3dx22x31 x2ex30x22x20x65x
Google SketchUp Pro 7.0 (.skp file) Remote Stack Overflow PoC
  日期:2009-08-03 12:10:32 点击:155 评论:0
/* Title: Google SketchUp Pro 7.0 Model File Handling Remote Stack Overflow PoC Vendor: Google Inc. ( http://www.google.com ) Product Web Page: http://www.sketchup.com http://sketchup.google.com Current Version: 7.0.10247 Summary: Google SketchUp Pro
Microsoft Windows XP (win32k.sys) Local Privilege Escalation Exploit (2)
  日期:2009-07-31 12:08:36 点击:490 评论:0
---------------------------------InvbShellcode.h-------------------------- typedef VOID (*INBV_DISPLAY_STRING_FILTER) ( PUCHAR *String ); VOID (__stdcall *InbvAcquireDisplayOwnership) ( VOID ); VOID (__stdcall *InbvDisplayString) ( IN PCHAR String )
Microsoft Windows XP (win32k.sys) Local Privilege Escalation Exploit (1)
  日期:2009-07-31 12:03:26 点击:374 评论:0
//////////////////////////////////////////////////////////////////////////////////// // +----------------------------------------------------------------------------+ // // | | // // | Microsoft Corporation - http://www.microsoft.com/ | // // | | //
bind can be crashed with an update packet
  日期:2009-07-31 11:39:17 点击:54 评论:0
bind can be crashed with an update packet: Packet in tcpdump: 15:38:11.676045 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17), length: 178) 10.2.0.205.59447 10.2.0.205.53: 17378 update [1a] [1n] [1au] SOA? 8.0.10.in-addr.arpa. 8.8.0
PunBB Reputation.php Mod <= 2.0.4 Local File Inclusion Exploit
  日期:2009-07-31 10:50:04 点击:29 评论:0
#!/usr/bin/perl #[0-Day] PunBB Reputation.php Mod = v2.0.4 Local File Inclusion Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew #register_globals = On #magic_quotes_gpc = On use LWP::UserAgent; use HTTP::Cookies;
IBM AIX 5.3 libc MALLOCDEBUG File Overwrite Vulnerability
  日期:2009-07-31 10:49:18 点击:48 评论:0
#!/bin/bash ################################################################# # _______ _________ _ # # ( ____ )__ __/( ( /|# # | ( )| ) ( | ( |# # | (____)| | | | | |# # | __) | | | ( ) |# # | ( ( | | | | |# # | ) __ | | | ) |# # |/
EPSON Status Monitor 3 Local Privilege Escalation Vulnerability
  日期:2009-07-31 10:48:42 点击:259 评论:0
------- EPSON Status Monitor 3 local privilege escalation vulnerability -------- by Nine:Situations:Group::bruiser site: http://retrogod.altervista.org/ -------------------------------------------------------------------------------- After that pyro
VLC Media Player 0.8.6f smb:// URI Handling Remote BOF Exploit
  日期:2009-07-31 10:47:57 点击:96 评论:0
/* VLC Media Player 'smb://' URI Handling Remote Buffer Overflow Vulnerability Exploit * Reference: http://www.securityfocus.com/bid/35500 * * Tested on VLC media player 0.8.6f on WinXP SP3 * * Coded by Pankaj Kohli * http://www.pank4j.com * */ #incl
Compface 1.1.5 (.xbm File) Local Buffer Overflow Exploit
  日期:2009-07-31 10:43:58 点击:24 评论:0
#!/usr/bin/python #[*] Exploit : Compface '.xbm' Local Buffer Overflow Exploit #[*] Affected :compface 1.1.5 #[*] Tested on : Ubuntu 9.04 (without stack randomization) #[*] Refer :bid/35863 #[*] Exploit : His0k4 #[*] Use : $compface exploit.xbm out
ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC
  日期:2009-07-31 10:35:29 点击:60 评论:0
/* ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC Based on: http://www.securityfocus.com/data/vulnerabilities/exploits/35848.txt by kingcope - this is basically a rewrite of the above, lame i know, but fun enough for the [zone] argume
PunBB Reputation.php module versions 2.0.4 and below local file inclusion exploi
  日期:2009-07-30 10:03:21 点击:29 评论:0
#!/usr/bin/perl#[0-Day] PunBB Reputation.php Mod = v2.0.4 Local File Inclusion Exploit#Coded By Dante90, WaRWolFz Crew#Bug Discovered By: Dante90, WaRWolFz Crew#register_globals = On#magic_quotes_gpc = Onuse LWP::UserAgent;use HTTP::Cookies;use stri
WINMOD 1.4 (.lst) Local Stack Overflow Exploit XP SP3 (RET+SEH) #3
  日期:2009-07-29 12:13:31 点击:54 评论:0
# # Winmod 1.4 (.lst) Local Stack Overflow Exploit (RET overwrite+SEH) # http://www.software112.com/products/winmod+download.html # # Exploit for Windows XP SP3 (en) # # by corelan - c0d3r # Greetings to Saumil and SK # my $sploitfile = c:\program
Millenium MP3 Studio 1.0 .mpf File Local Stack Overflow Exploit #2
  日期:2009-07-29 12:12:33 点击:209 评论:0
# # [+] Vulnerability: .mpf File Local Stack Overflow Exploit (SEH) #2 # [+] Product: Millenium MP3 Studio # [+] Versions affected : v1.0 # [+] Download : http://www.software112.com/products/mp3-millennium+download.html # [+] Method: seh # [+] Teste
MP3 Studio v1.0 (mpf File) Local BOF Exploit (SEH)
  日期:2009-07-29 12:11:56 点击:35 评论:0
#!/usr/bin/perl # # MP3 Studio v1.0 (mpf File) Local BOF Exploit (SEH) # Exploited by: Koshi # Download: http://www.software112.com/products/mp3-millennium+download.html # Based on PoC/findings by HACK4LOVE ( http://milw0rm.com/exploits/9277 ) # Tes
PunBB Reputation.php Mod <= 2.0.4 Blind SQL Injection Exploit
  日期:2009-07-29 12:11:17 点击:25 评论:0
#!/usr/bin/perl #[0-Day] PunBB Reputation.php Mod = v2.0.4 Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew use strict; use LWP::UserAgent; use HTTP::Cookies; use HTTP::Request::Common; u
MP3 Studio 1.0 (.mpf /.m3u File) Local Stack Overflow Exploit (SEH)
  日期:2009-07-29 12:10:28 点击:82 评论:0
# # [+] Vulnerability: (.mpf /.m3u File) Local Stack Overflow Exploit (SEH) #1 # [+] Product: Millenium MP3 Studio # [+] Versions affected : v1.0 # [+] Download : http://www.software112.com/products/mp3-millennium+download.html # [+] Method: ret/seh
共637页/12733条记录 首页 上一页 [434] [435] [436] 437 [438] [439] [440] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved