首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Acoustica MP3 CD Burner 4.51 Build 147 (asx file) Local BOF Exploit
  日期:2008-09-01 10:12:41 点击:21 评论:0
#!/usr/bin/perl # # Acoustica MP3 CD Burner (asx file) Local BOF Exploit # Author: Koshi # # Date: 08-29-08 ( 0day ) # Application: Acoustica MP3 CD Burner # Version: 4.51 Build 147 ( possibly older ) # Site: http://acoustica.com/download.htm # Teste
Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
  日期:2008-08-29 10:27:43 点击:41 评论:0
!-- In addition to the overflow found in the Friendly Technologies dialers ActiveX, Here is a remote command execution exploit. Its so sad people dont actually Think... Greetz to Binaryvision ====================== - http://www.binaryvision.org.il/ -
Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
  日期:2008-08-29 10:20:07 点击:38 评论:0
!-- Friendly Technologies provide software like L2TP and PPPoE clients to ISPs, who give the software to their customers on CD so they have less trouble setting up thire connections. They also provide remote configuration solutions .. not the best id
Acoustica Mixcraft <= 4.2 Build 98 (mx4 file) Local BOF Exploit
  日期:2008-08-29 10:19:11 点击:13 评论:0
#!/usr/bin/perl # # Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit # Author: Koshi # # Date: 08-28-08 ( 0day ) # Application: Acoustica Mixcraft # Version(s): (Possibly Older) / 4.1 Build 96 / 4.2 Build 98 # Site: http://acoustica.com/mi
Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
  日期:2008-08-28 10:23:45 点击:50 评论:0
----------------------------------------------------------------------------- Ultra Office ActiveX Control Remote Arbitrary File Corruption url: http://www.ultrashareware.com Author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.alt
Ultra Office ActiveX Control Remote Buffer Overflow Exploit
  日期:2008-08-28 10:23:02 点击:49 评论:0
----------------------------------------------------------------------------- Ultra Office ActiveX Control Remote Buffer Overflow url: http://www.ultrashareware.com Author: shinnai mail: shinnai[at]autistici[dot]org site: http://www.shinnai.net This
Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
  日期:2008-08-27 10:27:17 点击:34 评论:0
Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote Buffer Overflow Exploit Author: Koshi Original POC: http://www.milw0rm.com/exploits/6244 ( Not by me ) My first ActiveX exploit, learned quite a bit playing with this one. Heaps are handy. #######
MyBulletinBoard (MyBB) <= 1.2.11 private.php SQL Injection Exploit (2)
  日期:2008-08-27 10:23:12 点击:367 评论:0
?php // forum mybb = 1.2.11 remote sql injection vulnerability // bug found by Janek Vind waraxe http://www.waraxe.us/advisory-64.html // exploit write by c411k (not brutforce one symbol. insert hash in your PM in one action) // //POST http://mybb.ru
Simple PHP Blog (SPHPBlog) <= 0.5.1 Code Execution Exploit
  日期:2008-08-27 10:22:32 点击:44 评论:0
? /* sIMPLE php bLOG 0.5.0 eXPLOIT bY mAXzA 2008 */ function curl($url,$postvar){ global $cook; $ch = curl_init( $url ); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ch, CURLOPT_HEADER, 1); curl_setopt ($ch, CURLOPT_REFERER,$url); if (
GeekLog <= 1.5.0 Remote Arbitrary File Upload Exploit
  日期:2008-08-26 11:17:08 点击:25 评论:0
#!/usr/bin/perl use warnings; use strict; use LWP::UserAgent; use HTTP::Request::Common; print INTRO; +++++++++++++++++++++++++++++++++++++++++++++++++++++ + GeekLog = 1.5.0 Remote Arbitrary File Upload + + + + Discovered Coded By: t0pP8uZz + + + + 0
Belkin wireless G router + ADSL2 modem Auth Bypass Exploit
  日期:2008-08-26 11:15:50 点击:55 评论:0
html head /head body bhtml code to bypass the webinterface password protection of the Belkin wireless G router + adsl2 modem.br It worked on model F5D7632-4V6 with upgraded firmware 6.01.08./b br form action=http://192.168.2.1/cgi-bin/setup_dns.exe n
Dana IRC 1.4a Remote Buffer Overflow Exploit
  日期:2008-08-26 11:15:04 点击:27 评论:0
#!/usr/bin/perl # k`sOSe - 08/24/2008 # This is a useless and not portable exploit code, tested only on my winxp-sp3 VM. # I was looking for a vuln to write an exploit for when I found this PoC: # # http://www.milw0rm.com/exploits/5817 # # The author
NoName Script <= 1.1 Multiple Remote Vulnerabilities
  日期:2008-08-25 09:57:51 点击:52 评论:0
################################################################################ [+] NoName Script 1.1 BETA Multiple Remote Vulnerabilities [+] Discovered By SirGod [+] www.mortal-team.org [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,
webEdition CMS (we_objectID) Blind SQL Injection Exploit
  日期:2008-08-21 11:15:27 点击:28 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################### # # WebEdition CMS - Blind SQL Injection Exploit # # Vulnerability discovered by: Lidloses_Auge # Exploit coded by: Lidloses_Auge # Special
Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
  日期:2008-08-21 11:13:20 点击:26 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print ################## VIVA ISLAME VIVA ISLAME ####################n; print ################## VIVA ISLAME VIVA ISLAME ####################n; print ## ##n; print ##
Anzio Web Print Object <= 3.2.30 ActiveX Buffer Overflow Exploit
  日期:2008-08-21 11:10:55 点击:61 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ~ Core Security Technologies - CoreLabs Advisory ~ http://www.coresecurity.com/corelabs/ ~ Anzio Web Print Object Buffer Overflow *Advisory Information* Title: Anzio Web Print Object Buffer Overflow Advis
VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
  日期:2008-08-19 10:12:36 点击:58 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : VMWare Workstation (hcmon.sys 6.0.0.45731) Class : DoS Published : 2008-08-17 Credit : g_ (g_ # orange-bat # com) - - Details - Fails to sanitize pointers sent from usermo
WS_FTP Home/Professional FTP Client Remote Format String PoC
  日期:2008-08-18 10:55:34 点击:37 评论:0
################################################################################################################## # # Ipswitch WS_FTP Home/WS_FTP Professional FTP Client Remote Format String vulnerability # Vendor : http://www.ipswitch.com/ # Affect
FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh)
  日期:2008-08-18 10:50:01 点击:22 评论:0
#!/usr/bin/perl # k`sOSe 08/17/2008 # bypass safeseh using flash9f.ocx. use warnings; use strict; use IO::Socket; # win32_exec - EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub http://metasploit.com my $shellcode = x31xc9x83xe9xdexd9xeex
EO Video 1.36 Local Heap Overflow DOS / PoC
  日期:2008-08-18 10:49:07 点击:23 评论:0
#!/usr/bin/python # -------------------------------------------------------------- # EO Video v1.36 Heap Overflow local PoC/DoS exploit # *.eop playlist file in Name buffer overflow # Other versions may be vulnerable too... # ------------------------
共637页/12733条记录 首页 上一页 [511] [512] [513] 514 [515] [516] [517] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved