首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
BS.Player 2.34 (.bsl) Universal SEH Overwrite Exploit
  日期:2009-03-21 11:07:12 点击:27 评论:0
#usage: exploit.py print ************************************************************************** print Bs.Player 2.34 (.bsl) Universal Seh Overwrite Exploitn print Author : Nine:Situations:Group::pyrokinesis print Exploited by : His0k4 print Test
BS.Player <= 2.34 Build 980 (.bsl) Local Buffer Overflow Exploit (SEH)
  日期:2009-03-21 11:06:13 点击:31 评论:0
?php /* Bs.Player = 2.34 Build 980 (.bsl) local buffer overflow 0day exploit (seh) by Nine:Situations:Group::pyrokinesis Overlong hostnames in bsplayer playlist files causes eax and seh handlers to be overwritten. Cannot reliably debug with olly beca
POP Peeper 3.4.0.0 (From) Remote Buffer Overflow Exploit (SEH)
  日期:2009-03-21 11:04:51 点击:24 评论:0
#!/usr/bin/python # [+] Bug : POP Peeper 3.4.0.0 (From) Remote Buffer Overflow Exploit (SEH) # [+] Author : His0k4 # [+] Greetings : All friends and muslims HacKerS (DZ) from socket import * import struct # win32_exec - EXITFUNC=seh CMD=calc Size=343
Hannon Hill Cascade Server Command Execution Vulnerability (post auth)
  日期:2009-03-20 12:23:24 点击:31 评论:0
Emory University UTS Security Advisory EMORY-2009-01 Topic: Command Execution in Hannon Hill Cascade Server Original release date: March 19, 2009 SUMMARY ======= Hannon Hill's Cascade Server product is vulnerable to a command execution vulnerability.
Chasys Media Player (.lst playlist) Local Buffer Overflow Exploit
  日期:2009-03-20 12:22:30 点击:27 评论:0
#!/usr/bin/perl # -------------------------------------------------------------- # Chasys Media Player (.lst playlist) Local Buffer Overflow Exploit # Discovered and Exploited By : zAx # Thanks to all my friends ! # ----------------------------------
SW-HTTPD Server 0.x Remote Denial of Service Exploit
  日期:2009-03-20 12:21:50 点击:30 评论:0
/* SW-HTTPD Server v0.x Denial of Service (PoC) Multiple Connections with GET /A[100] HTTP/1.1 After server not found all pages. Author: Jonathan Salwan Mail : submit [AT] shell-storm.org Web : http://www.shell-storm.org */ #include stdio.h #include
Bloginator v1a SQL Command Injection via Cookie Bypass Exploit
  日期:2009-03-20 12:20:27 点击:37 评论:0
########################################################################## Author = FireShot , Jacopo Vuga. Thx to = Osirys for develop the Exploitation Code with me Mail = fireshotatautisticidotorg / osirysatautisticidotorg Vulnerability = SQL Comma
Chasys Media Player 1.1 .cue File Stack Overflow Exploit
  日期:2009-03-20 12:19:24 点击:27 评论:0
#!/usr/bin/env ruby # Chasys Media Player 1.1 .cue file Stack Overflow Exploit # By Stack # Mountassif Moad # cat thnx.txt # Simo-Soft - Houssamix - Skd - Fl0 fl0w str0ke :d # time3 = Time.new puts Exploit Started in Current Time : + time3.inspect pu
SilverNews version 2.04 local file inclusion exploitSilverNews version 2.04 loca
  日期:2009-03-19 16:37:41 点击:22 评论:0
#!/usr/bin/perl -w# SilverNews 2.04 Local File Inclusion Exploit# Script: http://www.silver-scripts.de# Vuln C0de:# require admin/header.php;# if (file_exists('admin/'. ___FCKpd___0 GET['section']..php))# require 'admin/'. ___FCKpd___0 GET['section'
Icarus 2.0 (.PGN File) Local Stack Overflow Exploit (SEH)
  日期:2009-03-19 11:33:32 点击:32 评论:0
#usage: exploit.py print ******************************************************************** print Icarus 2.0 Local Stack Overflow Exploitn print Download: http://www.randomsoftware.com/pub/icarus.exe print Author : His0k4 print Tested on: Windows
Chasys Media Player 1.1 (.m3u) Stack Overflow Exploit
  日期:2009-03-19 11:32:57 点击:26 评论:0
#!/usr/bin/python # Chasys Media Player 1.1 (.m3u) Stack Overflow Exploit # By: Encrypt3d.M!nd # # Credit flys to: zAx # # the good thing in this one that the program won't crash # when the playlist file imported,and will keep running. header = #EXTM
Chasys Media Player 1.1 (.pls) Stack Overflow Exploit #2
  日期:2009-03-19 11:32:05 点击:55 评论:0
#!/usr/bin/python # Chasys Media Player 1.1 (.pls) Stack Overflow Exploit # By: Encrypt3d.M!nd # # Credit flys to: zAx # # the good thing in this one that the program won't crash # when the playlist file imported,and will keep running. header = x5B
Chasys Media Player 1.1 (.pls) Local Stack overflow Exploit
  日期:2009-03-19 11:31:17 点击:20 评论:0
#usage: exploit.py print ************************************************************************** print Chasys Media Player(pls File) Local Stack overflow Exploitn print Founder: zAx my friend :) print Exploited by : His0k4 print Tested on: Window
Chasys Media Player 1.1 (.pls) Local Buffer Overflow PoC (SEH)
  日期:2009-03-19 11:30:41 点击:36 评论:0
#!/usr/bin/python # Chasys Media Player 1.1 (.pls) Local Buffer Overflow (SEH) PoC # SEH And NEXT_SEH are Overwritten but shellcode doesn't executed !!! # I have tried a lot of Addresses . # Waitting for the Exploit from someone . # Download : http:/
CDex 1.70b2 (.ogg) Local Buffer Overflow Exploit (xp/ sp3)
  日期:2009-03-19 11:29:08 点击:38 评论:0
?PHP /* CDex v1.70b2 (.ogg) local buffer overflow exploit poc (win xp sp3) by Nine:Situations:Group::Pyrokinesis software site: http://cdexos.sourceforge.net/ our site: http://retrogod.altervista.org/ A very reliable buffer overflow exists in the way
Talkative IRC 0.4.4.16 Remote Stack Overflow Exploit (SEH)
  日期:2009-03-18 15:14:52 点击:65 评论:0
#!/usr/bin/perl # # Title: Talkative IRC 0.4.4.16 Remote Stack Overflow Exploit (SEH) # # Summary: The easiest and fastest way to meet people online. With Talkative IRC you can # chat with thousands of people at the same time. Find people with the sa
The HP LaserJet web management interface suffers from cross site request forgery
  日期:2009-03-18 15:12:52 点击:39 评论:0
Louhi Networks Oy -= Security Advisory =- Advisory: HP LaserJet multiple models web management CSRF vulnerability insecure default configuration Release Date: 2009-03-17 Last Modified: 2009-03-17 Authors: Henri Lindberg, CISA [henri d0t lindberg at
Sun Java System Messenger Express version 6.3-0.15 suffers from a cross site scr
  日期:2009-03-18 15:11:50 点击:56 评论:0
Product:Sun Java(tm) System Messenger Express Version: 6.3-0.15 Author:syniack contact:syniack@gmail.com contact%3Asyniack@gmail.com Vulnerable link: http://example.com/?user=adminerror=scriptalert(1);/script -- ~~~SyN/AcK RuLzZ~~~
Google Chrome 1.0.154.48 Single Thread Alert Out of Bound MEM Access
  日期:2009-03-17 10:08:13 点击:61 评论:0
html titleGoogle Chrome 1.0.154.48 Single Thread Alert Out of Bound Memory Access Vulnerability./title head/head bodybrbr h2centerGoogle Chrome 1.0.154.48 Single Thread Alert Out of Bound Memory Access Vulnerability.brbrProof of Concept/br/br /cente
Gretech GOM Encoder 1.0.0.11 (Subtitle File) Buffer Overflow PoC
  日期:2009-03-17 10:05:02 点击:30 评论:0
#exploit.py # # Gom Encoder (Subtitle File) Buffer Overflow PoC # by :Encrypt3d.M!nd # # Orignal Advisory: # http://www.securityfocus.com/bid/34120 # chars = 'A' * 1000000 file = open ( 'devil_inside.srt', 'w' ) file.write ('1n00:00:00,001 -- 00:00:
共637页/12733条记录 首页 上一页 [469] [470] [471] 472 [473] [474] [475] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved