首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MS Windows (.CHM File) Denial of Service (html compiled)
  日期:2009-01-12 15:54:30 点击:37 评论:0
################################################################################################################################ #MS Windows .CHM Denial of Service (html compiled) # ###################################################################
Joomla com_jashowcase (catid) Remote SQL Injection Exploit
  日期:2009-01-12 15:53:40 点击:35 评论:0
#!/usr/bin/perl -w #Joomla com_jashowcase Sql injection# ######################################## #[~] Author : EcHoLL #[~] www.warezturk.org www.tahribat.com #[~] Greetz : Black_label TURK Godlike Nitrous #[!] Module_Name: com_jashowcase #[!] Scrip
Joomla com_xevidmegahd (catid) Remote SQL Injection Exploit
  日期:2009-01-12 15:52:37 点击:27 评论:0
#!/usr/bin/perl -w #Joomla com_xevidmegahd Sql injection# ######################################## #[~] Author : EcHoLL #[~] www.warezturk.org www.tahribat.com #[~] Greetz : Black_label TURK Godlike Nitrous #[!] Module_Name: com_xevidmegahd #[!] Scr
Microsoft HTML Workshop <= 4.74 Universal Buffer Overflow Exploit
  日期:2009-01-12 15:51:44 点击:25 评论:0
#!/usr/bin/perl # Microsoft HTML Workshop = 4.74 Universal Buffer Overflow Exploit # ----------------------------------------------------------------- # Discovered/Exploit by SkD ( skdrat@hotmail.com ) # ---------------------------------------------
VUPlayer 2.49 .ASX File (HREF) Local Buffer Overflow Exploit
  日期:2009-01-12 15:50:17 点击:56 评论:0
#!/usr/bin/perl intro(); #does not need a thread method shellcode to run as best as can. seh work great too! # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com my $shellcode = xebx03x59xebx05xe8xf8xffxff
World Association of Newspapers remote SQL injection exploit
  日期:2009-01-12 11:15:43 点击:50 评论:0
#!/usr/bin/python# This was written for educational purpose only. Use it at your own risk.# Author will be not responsible for any damage!# !!! Special greetz for my friend sinner_01 !!!# !!! Special thanx for d3hydr8 and rsauron who inspired me !!!
VUPlayer 2.49 .ASX File (HREF) Local Buffer Overflow Exploit
  日期:2009-01-12 11:03:37 点击:41 评论:0
#!/usr/bin/perl -w # author : Houssamix # VUPlayer 2.49 (.asx File) local Stack Overflow Exploit print ######################################################################## #~ Author : HouSSamix # #~ Program : VUPlayer # #~ Version : 2.49 # #~ web
MS Internet Explorer JavaScript screen[ ] Denial of Service Exploit
  日期:2009-01-12 10:56:34 点击:15 评论:0
######################################################################################## #svchost.exe CPU usage boils up to almost 100 percent when we open the malicious #webpage and IE7 (Version 7.0.5730.13) closes with all tabs. # #Tested On: # Mic
VUPlayer 2.49 .ASX File (HREF) Local Buffer Overflow PoC
  日期:2009-01-12 10:53:17 点击:93 评论:0
#!/usr/bin/perl -w print ######################################################################## #~ Program : VUPlayer # #~ Version : 2.49 # #~ website : http://www.vuplayer.com/ # #~ Download : http://vuplayer.com/files/vuplayersetup.exe # #~ Type
MP3 TrackMaker 1.5 (.mp3 File) Local Heap Overflow PoC
  日期:2009-01-12 10:52:37 点击:26 评论:0
# #!/bin/perl # Author : HouSSamix # MP3 TrackMaker v1.5 .mp3 File Heap Overflow PoC # http://www.heathcosoft.com/software/mp3trackmaker/mp3tm15.exe # open the program browse (source file) file exploit #EAX 41414141 #ECX 000000F8 #EDX 0000020A #EBX 0
以色列人发现的IE 0day
  日期:2009-01-09 14:15:32 点击:32 评论:0
测试成功,会运行计算器 只是利用起来有点 ... ... 这个漏洞是由于微软IE浏览器启动Print Table of Links时引起的跨站攻击(Cross-Zone Scripting ) 如果启用了 Print Table of Links,在打印一个网页的时候,能够导致执行任意代码。 1.选择Print Table of Links选项
IE Denial of Service Exploit ( mshtml.dll )
  日期:2009-01-09 14:13:37 点击:32 评论:0
!-- IE Denial of Service Exploit ( mshtml.dll ) . . Tested on IE6. !-- simply click on the file saved as /crash.html/ And after few seconds crashes ... -- !-- /Be safe. /cnaph. -- !-- Greetz to : Str0ke , Blub, etc . . . -- scriptfunction Req(u){var
VMware COM DB ActiveX Remote Buffer Overflow Exploit
  日期:2009-01-09 14:11:53 点击:56 评论:0
html !-- Bug discovered by cN4phux a small GHH from DZ. # VMware COM DB ActiveX Remote Buffer Overflow Exploit # # This was written for educational purpose. Use it at your own risk. # Author will be not responsible for any damage. # Tested on Window
Virgilio Toolbar Toolbar ActiveX Control Remote Denial of Service Exploit
  日期:2009-01-09 14:10:40 点击:48 评论:0
!-- // Virgilio Toolbar Toolbar ActiveX Control Remote Denial of Service Exploit // Version == 1.3.0.0 // Internet Explorer ver 6.0 , 7.0 // Tested on Windows SP2 Bug discovered by cN4phux. Greet'z ^to : Blub , Knuthy , Djug , Xacker , DATA_SNIPER ,
IntelliTamper (2.07/2.08) Language Catalog SEH Overflow Exploit
  日期:2009-01-09 14:07:36 点击:48 评论:0
#!usr/bin/python # IntelliTamper (2.07/2.08) Language Catalog SEH Overflow Exploit. # we start off the exploitation with some fuzzing to determine how many bytes # before overwriting the pointer to next SEH # and pointer to SEH, we will try and overw
Anope IRC Services With bs_fantasy_ext <= 1.1.16 mIRC script
  日期:2009-01-09 14:06:50 点击:48 评论:0
; bs_fantasy_ext = 1.1.16 Exploit by Phil ; Kudos to MattT for pointing this out ; Only seems to work for non-vhosted unresolved IPs ; Code is a little inefficient, sorry. ; Usage: /getip channel nickname bs bot nickname alias getip { if ($1 != $null
XOOPS 2.3.2 (mydirname) Remote PHP Code Execution Exploit
  日期:2009-01-09 14:04:58 点击:45 评论:0
#!/usr/bin/php -q ?php /**************************************************************** * XOOPS 2.3.2 (mydirname) Remote PHP Code Execution Exploit * * by athos - staker[at]hotmail[dot]it * * http://xoops.org * * * * thanks to s3rg3770 and The:Parad
Pizzis CMS <= 1.5.1 (visualizza.php idvar) Blind SQL Injection Exploit
  日期:2009-01-09 14:04:14 点击:19 评论:0
--+++=============================================================+++-- --+++====== Pizzis CMS = 1.5.1 Blind SQL Injection Exploit ======+++-- --+++=============================================================+++-- #!/usr/bin/perl use strict; use war
GOM Player 2.0.12.3375 (.ASX File) Stack Overflow Exploit
  日期:2009-01-09 14:02:33 点击:43 评论:0
/*------------------------------------------------ * GOM Player 2.0.12 (.ASX) Stack Overflow Exploit *------------------------------------------------- * [_]Exploit Code by:DATA_SNIPER * [_]Greetz: Arabic and algeria hackerz,arab4services.net and AT4
CuteNews <= 1.4.6 (ip ban) XSS/Command Execution Exploit (adm req.)
  日期:2009-01-09 13:54:43 点击:58 评论:0
#!/usr/bin/php -q ?php /********************************************************************* * CuteNews = 1.4.6 (ip ban) XSS / Remote Command Execution Exploit * * by athos - staker[at]hotmail[dot]it * * http://cutephp.com * *-=--=--=--=--=--=--=--=
共637页/12733条记录 首页 上一页 [486] [487] [488] 489 [490] [491] [492] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved