首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Chance-i DiViS-Web DVR System ActiveX Control Heap Overflow PoC
  日期:2009-04-13 11:30:39 点击:122 评论:0
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-035 original advisory: http://dsecrg.com/pages/vul/DSECRG-09-035.html Application: Chance-i DiViS-Web DVR System ActiveX control Versions Affected: 3,0,0,7 Vendor URL: http://www.chance-i.c
Xilisoft Video Converter Wizard 3 .CUE File Stack Buffer Overflow PoC
  日期:2009-04-13 11:29:32 点击:134 评论:0
/* ---------------------------------------------------------------------------------------- Xilisoft Video Converter Wizard 3 .CUE File Stack Buffer Overflow POC name: xilisoft.cpp Credits : fl0 fl0w --------------------------------------------------
The IBM BladeCenter Advanced Management module suffers from cross site scripting
  日期:2009-04-10 12:29:42 点击:76 评论:0
Louhi Networks Information Security Research Security Advisory Advisory: IBM BladeCenter Advanced Management Module Multiple vulnerabilities (XSS type 2 1, CSRF, Information Disclosure) Release Date: 2009-04-09Last Modified: 2009-04-09 Authors: Henr
SWF Opener 1.3 (.swf File) Off By One Buffer Overflow PoC
  日期:2009-04-10 12:24:45 点击:56 评论:0
# SWF Opener .swf Off By One / Underground Bof Poc # Probably impossible to exploit, but who knows? -_- At least, there still exist Underground stack overflows in :d # Version: 1.3 # http://www.browsertools.net/downloads/SWFOpenerSetup.exe # usage pe
Exjune Guestbook v2 Remote Database Disclosure Exploit
  日期:2009-04-10 12:24:07 点击:33 评论:0
#!/usr/bin/perl # By AlpHaNiX [NullArea.Net] # alpha[at]hacker.bz # Made in Tunisia ########### # script : Exjune Guestbook v2 # download : http://www.exjune.com/downloads/downloads/exJune_guestbook.asp ########### # Vulnerable : # database path : /a
Geeklog <= 1.5.2 SEC_authenticate() SQL Injection Exploit
  日期:2009-04-10 12:22:59 点击:81 评论:0
?php /* Geeklog =1.5.2 SEC_authenticate()/PHP_AUTH_USER sql injection exploit by Nine:Situations:Group::bookoo our site: http://retrogod.altervista.org/ software site: http://www.geeklog.net/ credit goes to rgod, bug found more than a year ago workin
net2ftp versions 0.97 and below suffer from cross site scripting and cross site
  日期:2009-04-09 10:41:23 点击:39 评论:0
#=cicatrizc1c4tr1z@voodoo-labs.org=#=~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~(advisories)=# /) /) /) _ _ _______(/ ________ // _ (/_ _ _____ _ (/__(_)(_)(_(_(_)(_) (/_(_(_/_) /_)_ o (_)/ (_(_/_ .-/ #=net2ftp = 0.97 Cross-Site Scripti
OTSTurntables 1.00.027 (.ofl) SEH Overwrite Exploit
  日期:2009-04-09 10:39:30 点击:25 评论:0
#usage: exploit.py#Open the exploit file from the programprint **************************************************************************print OTSTurntables 1.00.027 (.ofl) SEH Overwrite Exploitnprint Refer: milw0rm.com/exploits/8371print Tested on
OTSTurntables 1.00.027 (.m3u/.ofl file) Universal BOF Exploit
  日期:2009-04-09 10:38:46 点击:40 评论:0
#!/usr/bin/perl # By AlpHaNiX [NullArea.Net] # alpha[at]hacker.bz # Made in Tunisia my $junk = x41 x 96 ; # whatever bytes my $nop = x90 x 20 ; # bla bla xD # win32_exec - EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub , thanks metasploit my
GOM Player 2.1.16.6134 Subtitle Local Buffer Overflow PoC
  日期:2009-04-09 10:37:48 点击:38 评论:0
#!/usr/local/bin/perl ################################################################## # #Title : GOM Player Subtitle Buffer Overflow Vulnerabiltity #Discovery by : Bui Quang Minh #Tested : GOM Player 2.1.16.6134 #Reference : Bkis [http://security.
Linux Kernel < 2.6.29 exit_notify() Local Privilege Escalation Exploit
  日期:2009-04-09 10:36:25 点击:64 评论:0
#!/bin/sh ################################################################################### # gw-notexit.sh: Linux kernel 2.6.29 exit_notify() local root exploit # # by Milen Rangelov (gat3way-at-gat3way-dot-eu) # # Based on 'exit_notify()' CAP_KIL
peterConnects Web Server Traversal Arbitrary File Access Vulnerability
  日期:2009-04-09 10:35:13 点击:85 评论:0
- PeterConnects Web Server Traversal Arbitrary File Access - Description PeterConnects products use a web server that is vulnerable to classic directory traversal (hello 1987) that allows for arbitrary file access. - Product PeterConnects, Unknown Pr
SASPCMS 0.9 Multiple Remote Vulnerabilities
  日期:2009-04-09 10:08:25 点击:270 评论:0
##########################www.BugReport.ir######################################## # # AmnPardaz Security Research Team # # Title: SASPCMS Multiple Vulnerabilities # Vendor: http://www.lgasoft.com # Vulnerable Version: 0.9 (prior versions also may be
XBMC 8.10 (HEAD) Remote Buffer Overflow Exploit (SEH)
  日期:2009-04-08 11:47:05 点击:49 评论:0
#!/usr/bin/python #[*] Usage : exploit.py [victime_ip] #[*] Bug : XBMC 8.10 (HEAD Request) Remote Buffer Overflow Exploit (SEH) #[*] Refer : http://www.milw0rm.com/exploits/8337 #[*] Tested on : Xp sp2 (fr) #[*] Exploited by : His0k4 #[*] Greetings :
Lanius CMS <= 0.5.2 Remote Arbitrary File Upload Exploit
  日期:2009-04-08 11:44:49 点击:50 评论:0
?php /* -------------------------------------------------------- Lanius CMS = 0.5.2 Remote Arbitrary File Upload Exploit -------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[dot]com link.....: http://w
Family Connections CMS <= 1.8.2 Blind SQL Injection Vulnerability
  日期:2009-04-08 11:43:25 点击:45 评论:0
******* Salvatore drosophila Fresta ******* [+] Application: Family Connections [+] Version: = 1.8.2 [+] Website: http://www.familycms.com [+] Bugs: [A] Blind SQL Injection [+] Exploitation: Remote [+] Date: 1 Apr 2009 [+] Discovered by: Salvatore dr
Baby FTP server version 1.x remote memory consumption exploit
  日期:2009-04-07 11:19:35 点击:49 评论:0
#!/usr/bin/perl## Baby FTP Server v1.x Remote Memory Consumption Exploit.## -------------------------------------------------------# This can be exploited to use 100% UC.# Tested with Windows xp sp2# -------------------------------------------------
Unsniff Network Analyzer 1.0 (usnf) Local Heap Overflow PoC
  日期:2009-04-07 10:49:38 点击:48 评论:0
#!/usr/bin/perl # # Unsniff Network Analyzer 1.0 (usnf) Local Heap Overflow PoC # # Summary: Dont just look at hex dumps and protocol trees. With Unsniff # Network Analyzer, you can view network traffic at various levels of detail. # View high level
Pirelli Discus DRG A225 wifi router WPA2PSK Default Algorithm Exploit
  日期:2009-04-07 10:48:37 点击:89 评论:0
#!/usr/bin/python # # Pirelli Discus DRG A225 WiFi router # Default WPA2-PSK algorithm vulnerability # # paper: http://milw0rm.com/papers/313 # # With this code we can predict the WPA2-PSK key... # # Hacked up by Muris Kurgas aka j0rgan # j0rgan (-@-
UltraISO <= 9.3.3.2685 .ui Off By One / Buffer Overflow PoC
  日期:2009-04-07 10:47:49 点击:54 评论:0
# UltraISO = 9.3.3.2685 .ui Off By One / Bof Poc Exploit # Probably impossible to exploit, but who knows? -_- At least, there still exist stack overflows in :d # usage perl poc.pl xpl.ui my $poc= x55x6Cx74x72x61x49x53x4Fx20x50x72x6Fx6Ax
共637页/12733条记录 首页 上一页 [464] [465] [466] 467 [468] [469] [470] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved