首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MS Internet Explorer 7 Memory Corruption Exploit (MS09-002) (fast)
  日期:2009-03-05 10:42:34 点击:47 评论:0
# # Author : Ahmed Obied (ahmed.obied@gmail.com) # # - Based on the code found by str0ke in the wild for MS09-002 # - Tested using Internet Explorer 7.0.5730.11 on Windows XP SP2 # # Usage : python ie_ms09002.py [port] # import sys, socket from BaseH
libcURL suffers from an arbitrary file access and creation vulnerability
  日期:2009-03-04 14:06:07 点击:54 评论:0
Curl/Libcurl Arbitrary File Access Release date: 03/Mar/2009 Last Modified: N/A Author: David Kierznowski http://withdk.com Application: cURL/libcURL Risk: HIGH CVE-2009-0037 Quote from: http://curl.haxx.se/libcurl/ : libcurl is a free and easy-to-us
EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability
  日期:2009-03-04 14:02:32 点击:35 评论:0
HTML !-- EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability Version: 2.2 Date: Jan 11, 2007 Size:1519KB Download Easy Chat Server http://www.echatserver.com/ecssetup.exe By Mountassif Moad -- HEAD TITLEEFS Easy Chat Server (XSRF) Change Admi
Yaws < 1.80 (multiple headers) Remote Denial of Service Exploit
  日期:2009-03-04 13:59:53 点击:50 评论:0
#!usr/bin/perl -w ####################################################################################### # Yaws before 1.80 allows remote attackers to cause a denial of service (memory # consumption and crash) via a request with a large number of he
Imera ImeraIEPlugin ActiveX Control Remote Code Execution Exploit
  日期:2009-03-04 13:59:01 点击:122 评论:0
Who: Imera(http://www.imera.com) Imera TeamLinks Client(http://teamlinks.imera.com/install.html) What: ImeraIEPlugin.dll Version 1.0.2.54 Dated 12/02/2008 {75CC8584-86D4-4A50-B976-AA72618322C6} http://teamlinks.imera.com/ImeraIEPlugin.cab How: This c
Sopcast SopCore Control (sopocx.ocx) Command Execution Exploit
  日期:2009-03-04 13:57:44 点击:180 评论:0
!-- Sopcast SopCore Control (sopocx.ocx 3.0.3.501) SetExternalPlayer() user assisted remote code execution poc by Nine:Situations:Group::surfista (IE7/8) our site: http://retrogod.altervista.org/ software site: http://www.sopcast.org/ Through the Set
EFS Easy Chat Server Authentication Request BOF Exploit (SEH)
  日期:2009-03-04 13:54:43 点击:39 评论:0
#!/usr/bin/python #[*] Bug : EFS Easy Chat Server Authentication Request Buffer Overflow Exploit (SEH) #[*] Refer : http://www.milw0rm.com/exploits/4289 #[*] Tested on : Xp sp2 (fr) #[*] Exploited by : His0k4 #[*] Greetings : All friends muslims HaCk
Internet Download Manager 5.15 Local .LNG Stack Buffer Overflow Exploit
  日期:2009-03-03 12:41:29 点击:40 评论:0
/* ----------------------------------- Internet Download Manager 5.15 Local .LNG Stack Buffer Overflow Exploit cORRuption start at the address in stack of 0x0012E0B4 SEH CHANINS SEH_1 address_1 0012EE8C -STATUS: clean SEH_2 address_2 0012FF04 -STATU
VUplayer 2.49 .CUE File Local Buffer Overflow Exploit
  日期:2009-03-03 12:39:43 点击:75 评论:0
/* Author: Assed Edin E-mail: storms0uth@hotmail.com GreetS : Xcracker SimO-s0ft Ga3 Drari Wlad MArrakech ^_^ o Manssawch Lyc Hassan2 Str0ke */ #include string.h #include stdlib.h #include stdio.h #include windows.h #define OFFSET 1012 char header1[]
Media Commands (m3u File) Local SEH Overwrite Exploit
  日期:2009-03-03 12:38:44 点击:29 评论:0
#usage: exploit.py print ************************************************************************** print Media Commands (m3u File) local Seh Overwrite Exploitn print Founder: Hakxer print Exploited: His0k4 print Tested on: Windows XP Pro SP2 Frn p
Media Commands (M3U,M3l,TXT,LRC Files) Local Heap Overflow PoC
  日期:2009-03-03 12:37:16 点击:38 评论:0
#!usr/bin/perl # # Discovered Coded by : Hakxer # # Media Commands (M3U,M3l,TXT,LRC Files) Crash PoC # # Greetz : Allah , ProViDoR , Egyptian x Hacker # # Team : Egy coders Team # # Download/http://www.mediacommands.com/download.html# # Description :
Joomla com_digistore (pid) Blind SQL Injection Exploit
  日期:2009-03-03 12:36:33 点击:487 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################################## # # Joomla com_digistore (pid) Blind SQL Injection Exploit # # === Cyb3R-1sT === # cyb3r-1st [at] hormail.com # inject0r5 t3a
Novell eDirectory iMonitor (Accept-Language) Request BOF PoC
  日期:2009-03-03 12:35:31 点击:22 评论:0
#!usr/bin/perl -w ####################################################################################### # Novell eDirectory iMonitor 'Accept-Language' Request Buffer Overflow Vulnerability # Refer: # http://www.securityfocus.com/bid/33928/discuss #
Merak Media PLayer 3.2 m3u File Local Buffer Overflow Exploit (SEH)
  日期:2009-03-03 12:34:44 点击:20 评论:0
#exploit.py # # Merak Media Player 3.2 Buffer Overflow Exploit(SEH) # By:Encrypt3d.M!nd # m1nd3d.wordpress.com # # Orginal Advisory: # http://www.milw0rm.com/exploits/7857 ###################################################### # Nothing Intersting in
HTC Touch vCard over IP Denial of Service Exploit
  日期:2009-03-03 12:31:45 点击:23 评论:0
#! /usr/bin/env python## Copyright (c) 2009 Mobile Security Lab www.mseclab.com## Permission is hereby granted, free of charge, to any person obtaining a copy# of this software and associated documentation files (the Software), to deal # in the Soft
POP Peeper version 3.4.0.0 UIDL command remote buffer overflow
  日期:2009-03-02 12:53:13 点击:21 评论:0
#!/usr/bin/perl# KL0209EXP-poppeeper_uidl-bof.pl# 02.27.2009# Krakow Labs Development [www.krakowlabs.com]# POP Peeper 3.4.0.0 UIDL Remote Buffer Overflow Exploit## SEH overwrite exploitation, uses Imap.dll (included with POP Peeper) for universal#
Proof of concept denial of service exploit for the HTC Touch vCard over IP that
  日期:2009-03-02 12:52:27 点击:21 评论:0
#! /usr/bin/env python## Copyright (c) 2009 Mobile Security Lab www.mseclab.com## Permission is hereby granted, free of charge, to any person obtaining a copy# of this software and associated documentation files (the Software), to deal # in the Soft
动易SiteWeaver6.6版最新漏洞利用工具
  日期:2009-03-02 12:24:04 点击:53 评论:0
script functiongb2utf8(data){ var glbEncode =[]; gb2utf8_data =data; execScript( gb2utf8_data = MidB (gb2utf8_data,1),VBScript); var t = escape (gb2utf8_data).replace(/%u/g,).replace(/(.{2})(.{2})/g,%$2%$1).replace(/%([A-Z].)%(.{2})/g,@$1$2); t t =t
Demium CMS 0.2.1B Multiple Vulnerabilities and Exploit
  日期:2009-03-02 12:23:07 点击:62 评论:0
Demium CMS, version 0.2.1 Beta, is prone to multiple remote vulnerabilities, because of insufficient security on it. Let's see them. In this advisory you can find vulnerabilities, afflicted source, and multiple Remote Exploit. Credits to : Giovanni B
Hex Workshop v6 (.HEX File) Local Code Execution Exploit
  日期:2009-03-02 12:21:38 点击:44 评论:0
#!/usr/bin/perl -w # Hex Workshop = v6 (.hex) File Local Code Execution # Discovred by : Security^Ghost # Exploited by : DATA_SNIPER # Exploit Tested on WindoZ XP SP2 FR. # for more information vist my blog:http://datasniper.arab4services.net/ # the
共637页/12733条记录 首页 上一页 [472] [473] [474] 475 [476] [477] [478] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved