首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
SDP Downloader 2.3.0 (.ASX) Local Buffer Overflow Exploit (SEH)
  日期:2009-04-28 10:36:52 点击:25 评论:0
#usage: exploit.py #[x]Note: In this case we have the problem of the safe_seh, but if the machine uses (idm) # and the option Use advanced browser integration is selected,then idmmbc.dll will be loaded the most of time. print ***********************
Destiny Media Player 1.61 (.rdl) Local Buffer Overflow Exploit
  日期:2009-04-28 10:35:59 点击:25 评论:0
#!/usr/bin/perl =gnk ============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ _ |_____| |_____| /_/ _ |_
libvirt_proxy <= 0.5.1 Local Privilege Escalation Exploit
  日期:2009-04-28 10:33:00 点击:43 评论:0
/* * cve-2009-0036.c * * libvirt_proxy = 0.5.1 Local Privilege Escalation Exploit * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0036 * * Buffer overflow in th
linux内核CAP_KILL校验本地提权漏洞分析
  日期:2009-04-25 21:47:08 点击:67 评论:0
绿盟七号发出的公告: http://www.nsfocus.net/vulndb/13188 Milw0rm八号发出的EXP: http://www.milw0rm.com/exploits/8369 基本上通杀2.6.29以下的2.6内核版本了。 kernel/exit.c文件中的exit_notify()函数没有正确地检查CAP_KILL功能,如果本地用户在退出前执行了se
Microsoft Internet Infomation Server 6.0 ISAPI Filename Analytic Vulnerability
  日期:2009-04-25 21:44:25 点击:17 评论:0
function Copyright() { var Author=80sec; var Email=kEvin#80sec.com.replace(#,@) var Site=http://www.80sec.com; var Date=new Date(2009,4,24).toLocaleString(); var Reference=http://www.80sec.com/Microsoft-Internet-Infomation-Server-6-ISAPI-filename-an
SDP Downloader v2.3.0 (.ASX File) Local Heap Overflow PoC
  日期:2009-04-25 21:43:05 点击:45 评论:0
#!/usr/bin/perl # # # Found By : Cyber-Zone (ABDELKHALEK) == Proud To Be Figuigian ::Figuig City OwnZ ! # # MoroCCo 2009 # # GreatZ To : Hussin X , Jiko , ZoRLu , Mag!c ompo , Stack , b0rizQ ... All MoroCCaN HaCkerS # #OllyDBG Registers #EAX 41414141
Absolute Form Processor XE-V 1.5 Remote Change Pasword Exploit
  日期:2009-04-25 21:41:29 点击:47 评论:0
title Absolute Form Processor XE-V 1.5 Remote Change Pasword /title body bgcolor=#FFFFFF text=#000000 form name=form1 method=post action=http://www.xigla.com/absolutefp/demo/edituser.asp table width=96% border=0 cellspacing=2 cellpadding=2 align=cent
CoolPlayer Portable 2.19.1 (Skin) Buffer Overflow Exploit
  日期:2009-04-24 11:32:15 点击:28 评论:0
# CoolPlayer Portable 2.19.1 (Skin) Buffer Overflow exploit # Credit To Gold_m http://www.milw0rm.com/exploits/8489 # By Stack Sysworm.com # Note abouts this Exploit : right click Option Open select our target file and boooooom calc executed :d # Not
Popcorn 1.87 Remote Heap Overflow Exploit PoC
  日期:2009-04-24 11:30:14 点击:22 评论:0
#!/usr/bin/python #[x]Product download : http://www.ultrafunk.com/products/popcorn/ #[+]Founder : x.CJP.x #[+]Greeting : His0k4,Sub-Zero,Bibi-info,Aach2006,Youness,Simitch,Halimz,Bibicha.. :=) #[-]Seni seviyorum, base64_decode('TW91bmE='); from sock
Dream FTP Server 1.02 (users.dat) Arbitrary File Disclosure Exploit
  日期:2009-04-24 11:30:14 点击:52 评论:0
#!/usr/bin/perl -w # # This Bug Similar to others found By My Friend : Stack = so special Thanx # So You Can Exploit Arbitrary File Disclosure From The Server == You can use Stack's Exploit To do That # But This Exploit i will get Users Passwords Of
Home Web Server <= r1.7.1 (build 147) Gui Thread-Memory Corruption
  日期:2009-04-24 11:29:17 点击:39 评论:0
Home Web Server =r1.7.1 (build 147) Gui Thread-Memory Corruption Exploit. By: Aodrulez. Homepage : http://downstairs.dnsalias.net/homewebserver.html Product Released : 22.4.2009/21:16:58 Description: This web server when fed with 1006 bytes of chr(0
Norton Ghost Support module for EasySetup wizard Remote DoS PoC
  日期:2009-04-24 11:26:17 点击:36 评论:0
----------------------------------------------------------------------------------------- Norton Ghost Support module for EasySetup wizard Remote DoS/Arbitrary code execution(?) url: http://www.symantec.com/ Author: shinnai mail: shinnai[at]autistic
Zervit HTTP Server <= 0.3 (sockets++ crash) Remote Denial of Service
  日期:2009-04-23 12:35:54 点击:24 评论:0
#!/usr/bin/perl # # Zervit HTTP Server = v0.3 Remote Denial of Service. # # -------------------------------------------------------------------- # The vulnerability is caused due to an error in multi-socket. # This can be exploited to crash the HTTP
CoolPlayer Portable 2.19.1 (m3u) Buffer Overflow Exploit #2
  日期:2009-04-23 12:34:52 点击:21 评论:0
#!/usr/bin/python #[*] Usage : coolplayer.py #[*] Bug : CoolPlayer Portable(m3u) Buffer Overflow exploit #[*] Founder : Gold_m #[*] First exploiter : stack he is my friend :) #[*] Tested on : Xp sp2 (fr) #[*] Greetings : All friends muslims HaCkErs (
PJblog V3.0 0day+EXP
  日期:2009-04-23 10:57:36 点击:55 评论:0
影响版本:3.0 信息来源:零客网安 www.0kee.com Author:bink 漏洞文件:action.asp 第14行 12 strcname=request(cname)set checkcdb=conn.execute(select * from blog_Content where log_cname=amp;strcnameamp;) 密码是sha1加密。 相关exp: 1234567891011121314151
CoolPlayer Portable 2.19.1 (m3u) Buffer Overflow exploit
  日期:2009-04-23 10:49:40 点击:40 评论:0
# CoolPlayer Portable 2.19.1 (m3u) Buffer Overflow exploit # Credit To Gold_m http://www.milw0rm.com/exploits/8489 # I test it 12 times but the 13 is worked but i dont know maybe it work in first time for you # By Stack chars = x41 * 212 eip = xED
Femitter FTP Server 1.03 Arbitrary File Disclosure Exploit
  日期:2009-04-23 10:47:13 点击:31 评论:0
#!/usr/bin/perl # Femitter FTP Server 1.03 Arbitrary File Disclosure Exploit # Like ftpdmin 0.96 the same exploit but here is work just with double slach not 1 :d xd # By stack # Cyber-Zone use LWP::Simple; use LWP::UserAgent; if (@ARGV 3) { print(Us
Joomla Component rsmonials Remote Cross Site Scxripting Exploit
  日期:2009-04-23 10:46:18 点击:41 评论:0
/* RSMonials XSS Exploit http://www.rswebsols.com/downloads/category/14-download-rsmonials-all?download=23%3Adownload-rsmonials-component Google Dork: allinurl:option=com_rsmonials Anything entered into the form gets rendered as HTML, so you can add
Dokeos LMS <= 1.8.5 (include) Remote Code Execution Exploit
  日期:2009-04-23 10:44:27 点击:41 评论:0
#!/usr/bin/perl # # Dokeos LMS = 1.8.5 include Remote Code Execution Exploit # # Description # --------------------------------------------------------------- # Dokeos LMS contains one flaw that allows an attacker to include # a local file with html
Counter Strike Source ManiAdminPlugin v2 Remote Crash Exploit
  日期:2009-04-23 10:43:27 点击:36 评论:0
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@ Counter strike source @@@@@ @@@@@ Mani Admin Plugin Exploit v2 @@@@@ @@@@@ M4rt1n. www.hackerzbay.com @@@@@ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ alias aspam admin;admin;admin;admin;admin;a
共637页/12733条记录 首页 上一页 [460] [461] [462] 463 [464] [465] [466] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved