首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Mozilla Firefox 3.5 (Font tags) Remote Buffer Overflow Exploit (osx)
  日期:2009-07-27 11:06:48 点击:36 评论:0
#!/usr/bin/env python ####################################################### # # FireFox 3.5 Heap Spray OS X Exploit # Modified by: Dr_IDE # Originally Discovered by: Simon Berry-Bryne # Pythonized by: David Kennedy (ReL1K) @ SecureState # Thanks t
PHP Live! 3.2.1/2 (x) Remote Blind SQL Injection Exploit
  日期:2009-07-27 11:05:49 点击:47 评论:0
#!/usr/bin/perl ################################################################# ################################################################# ################ Original discover author banner ################ ###################################
WzdFTPD <= 8.0 Remote Denial of Service Exploit
  日期:2009-07-27 11:05:15 点击:20 评论:0
#!/usr/bin/env python # # WzdFTPD Denial of Service (= 8.0) # # wzdftpd_dos.py by Jose Miguel Esparza # 2007-01-19 S21sec labs import sys,socket user = guest passw = guest if len(sys.argv) != 3: sys.exit(Usage: + sys.argv[0] + target_host target_por
Ekiga 2.0.5 (GetHostAddress) Remote Denial of Service Exploit
  日期:2009-07-27 11:04:47 点击:34 评论:0
#!/usr/bin/env python # # Ekiga GetHostAddress Remote Denial of Service Vulnerability (CVE-2007-4897) # # ekiga207_dos.py by Jose Miguel Esparza # 2007-09-11 S21sec labs import sys,socket if len(sys.argv) != 3: sys.exit(Usage: + sys.argv[0] + target
OpenH323 Opal SIP Protocol Remote Denial of Service Exploit
  日期:2009-07-27 11:03:26 点击:65 评论:0
#!/usr/bin/env python # # OpenH323 Opal SIP Protocol Remote Denial of Service Vulnerability (CVE-2007-4924) # # opal228_dos.py by Jose Miguel Esparza # 2007-10-08 S21sec labs import sys,socket if len(sys.argv) != 3: sys.exit(Usage: + sys.argv[0] + t
The my_gallery version 2.4.1 plugin for e107 suffers from a local file disclosur
  日期:2009-07-24 10:27:52 点击:33 评论:0
MainHack BrotherHood [ http://news.serverisdown.org ] Vrs-hCk OoN_BoY Paman bL4Ck_3n91n3 Angela Zhang H312Y yooogy mousekill }^-^{ loqsa zxvf martfella skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke FUCK TERORIS!! */ $vuln = '/e107_plugins/my_gallery
e107 Plugin my_gallery 2.4.1 readfile() Local File Disclosure Exploit
  日期:2009-07-24 10:25:11 点击:44 评论:0
?php /* ============================================ [o] e107 Plugin my_gallery 2.4.1 Exploit [o] ============================================ Bug [f]ound by NoGe - noge.code@gmail.com Exploit [c]oded by Vrs-hCk - d00r@telkom.net * Plugin my_gallery
WINMOD 1.4 (.lst) Local Stack Overflow Exploit
  日期:2009-07-24 10:24:43 点击:54 评论:0
#!/usr/bin/perl # # Winmod 1.4 (.lst) Local Stack Overflow Exploit # Exploit by CWH Underground # Tested on Win XP SP2 EN # # Download: http://www.software112.com/products/winmod+download.html # print n===============================================
Adobe Flash (Embedded in PDF) LIVE VIRUS/MALWARE Exploit
  日期:2009-07-24 10:21:23 点击:1009 评论:0
@hdmoore live exploit sample for the new Flash bug (embedded in PDF) Don't play with it if you don't know what it does... This virus is srs business. /str0ke begin 644 hereEvil.pdf M)5!$1BTQ+C0*)?LCZ(*,2`P(]B:@H/`HO5'EP92`O0V%T86QO9PHO3W5T M;EN97,@,
Windows x86 null-free bindshell for Windows 5.0-6.0 all service packs
  日期:2009-07-24 10:18:36 点击:55 评论:0
BITS 32 ; Windows x86 null-free bindshell for Windows 5.0-6.0 all service packs. ; (See http://skypher.com/wiki/index.php/Hacking/Shellcode/Bind/NGS). ; Based largely on code and ideas (C) 2005 by Dafydd Stuttard, NGS Software. ; (See http://www.ngss
WINMOD 1.4 (.lst) Universal Buffer Overflow Exploit (SEH) #2
  日期:2009-07-23 10:40:37 点击:39 评论:0
#!/usr/bin/python #[*] Exploit : WINMOD 1.4 (.lst) Universal Buffer Overflow Exploit (SEH) #[*] Tested on : Xp sp2 fr #[*] Original exploit : http://www.milw0rm.com/exploits/9221 #[*] By : Dz_Girl #[*] Greets to : hisok4 (even if he doesn't know me)
otsAV 1.77.001 (.ofl File) Local Heap Overflow PoC
  日期:2009-07-23 10:39:55 点击:25 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # otsAV 1.77.001 (.ofl File) Local Heap Overflow PoC # http://x.download.otszone.com/static/otsavfreesetup.exe ######################################################################################## ##EAX 0123
MS Office Web Components Spreadsheet ActiveX (OWC10/11) Exploit
  日期:2009-07-22 12:22:48 点击:126 评论:0
# # Author : Ahmed Obied (ahmed.obied@gmail.com) # # - Based on the code posted at http://www.milw0rm.com/exploits/9163 # - Tested using: # Internet Explorer 7.0.5730.13 on Windows XP SP3 with owc10.dll installed # Internet Explorer 7.0.5730.13 on Wi
Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit
  日期:2009-07-22 12:22:08 点击:28 评论:0
/* alwaysdirtyneverclean.c AKA Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit (alwaysdirtyneverclean.zip) BY Jeremy Brown 2009 [0xjbrown41@gmail.com] 07.21.2009 *****************************************************************************
FlyHelp (.CHM File) Local Buffer Overflow PoC
  日期:2009-07-22 12:20:55 点击:58 评论:0
/* Name flyhelp.cpp FlyHelp .CHM File Buffer Overflo POC Credits fl0 fl0w Website http://www.sploitz.10001mb.com */ /* DEMO C:Documents and SettingsStefanDesktopNew Folder1flyhelp.exe C:Documents and SettingsStefanDesktopNew Folder1flyhelp.ex
WINMOD 1.4 (.lst File) Local Buffer Overflow Exploit (SEH)
  日期:2009-07-22 12:19:51 点击:34 评论:0
#!/usr/bin/perl# by hack4love# hack4love@hotmail.com# WINMOD V 1.4 (.lst File) Local Buffer Overflow Exploit (SEH)##http://www.software112.com/products/winmod+download.html# ## easy ### Thanks for ELNAMER ELMASRYEL7ADRANYDeCo017ZAXASER ELRO7## t
Php168 v6 权限提升漏洞
  日期:2009-07-21 10:49:46 点击:89 评论:0
#!/usr/bin/php?phpprint_r('+---------------------------------------------------------------------------+Php168 v6.0 update user access exploitby puret_tmail: puretot at gmail dot comteam: http://www.wolvez.orgdork: Powered by PHP168 V6.0+-----------
DD-WRT (httpd service) Remote Command Execution Vulnerability
  日期:2009-07-21 10:45:58 点击:85 评论:0
This is a remote root vulnerability in DD-WRT's httpd server. The bug exists at the latest 24 sp1 version of the firmware. The problem is due to many bugs and bad software design decisions. Here is part of httpd.c: 859 if (containsstring(file, cgi-b
KMplayer <= 2.9.4.1433 (.srt File) Local Buffer Overflow PoC
  日期:2009-07-21 10:45:12 点击:33 评论:0
#!usr/bin/perl ######################## In The Name Of Allah #################### # # The KMplayer (.Srt) File Local Bof Poc # # #Author : b3hz4d (Seyed Behzad Shaghasemi) #Site : Www.Pentesters.Ir #Tested on KMplayer = 2.9.4.1433 #Special Thanks :
Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow Exploit (SEH)
  日期:2009-07-21 10:44:10 点击:31 评论:0
###################################################### #-------------------- ~~ SkuLL-HacKeR ~~ -----------------# #################################################### #!/usr/bin/perl #[+] Bug : Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow Ex
共637页/12733条记录 首页 上一页 [436] [437] [438] 439 [440] [441] [442] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved