首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
联众世界的游戏大厅主程序GLWorld的ActiveX控件exploit
  日期:2008-05-04 10:19:02 点击:793 评论:0
SCRIPTwindow.onerror=function(){return true;}/SCRIPT SCRIPT document.writeln(object classid=clsid:61F5C358-60FB-4A23-A312-D2B556620F20 style='display:none' id='Kazakh'/object); document.writeln(SCRIPT language=javascript); document.writeln(v
HLDS WebMod 0.48 (rconpass) Remote Heap Overflow Exploit
  日期:2008-05-04 10:14:40 点击:141 评论:0
?php ## HLDS WebMod 0.48 (rconpass) Remote Heap Overflow Exploit ## Tested on HLDS Launcher 4.1.1.1, WebMod 0.48, Windows XP SP2 Hebrew ## shir, skod.uk [at] gmail [dot] com ## 17/12/2007 ## Registers (rconpass = Ax16444): # EAX 67E04955 w_mm.67E0495
Microsoft Works 7 WkImgSrv.dll ActiveX Remote BOF Exploit
  日期:2008-05-04 10:11:18 点击:40 评论:0
!-- The problem is in wkimgsrv.dll module shipped with many MS Offiice Suite (tested on MS OF 2003,MS OF 2007) Actually,this is not the case of buffer overflow attack,just a exploit of insecure method WKsPictureInterface. Setting this point to any wh
Joomla Component Webhosting (catid) Blind SQL Injection Exploit
  日期:2008-05-02 20:57:22 点击:40 评论:0
#!/usr/bin/perl #eSploit Framework - Inphex use Digest::MD5 qw(md5 md5_hex md5_base64); use LWP::UserAgent; use HTTP::Cookies; use Switch; $host_ = shift; $path_ = shift; $id_ = shift; $non_find = shift; #choose anything thats inside the article of i
GroupWise 7.0 (mailto: scheme) Buffer Overflow PoC
  日期:2008-04-29 15:58:21 点击:36 评论:0
PRODUCT: GroupWise 7.0 OS: Windows Xp The scheme mailto is vulnerable if one takes as default mail client to GroupWise, the fault is to implement the scheme followed by an extensive argument and this causes the buffer overflow. This brings the conse
MS Windows XP SP2 (win32k.sys) Privilege Escalation Exploit (MS08-025)
  日期:2008-04-29 15:53:05 点击:307 评论:0
// ms08-25-exploit #1 // This exploit takes advantage of one of the vulnerabilities // patched in the Microsoft Security bulletin MS08-25 // http://www.microsoft.com/technet/security/bulletin/ms08-025.mspx // ---------------------------------------
VLC 0.8.6d httpd_FileCallBack Remote Format String Exploit
  日期:2008-04-29 15:51:12 点击:60 评论:0
/* Epibite // bite since 1442 * pown meme ta mamie */ /* Advisory from Luigi Auriemma * CVE-2007-6682 / format string in VideoLAN VLC 0.8.6d * * Description : * Format string vulnerability in the httpd_FileCallBack * function (network/httpd.c) in Vi
HP Software Update (Hpufunction.dll 4.0.0.1) Insecure Method PoC
  日期:2008-04-29 15:46:38 点击:23 评论:0
Insecure Methods in HP Update Software. Remote: Yes Execute code remotely is possible using methods ExecuteAsync and Execute :-) If a user visits the malicious page the attacker can execute code. Coded by callAX Proof of Concept ---------------- HTM
DivX Player 6.7 SRT File Subtitle Parsing Buffer Overflow Exploit
  日期:2008-04-25 15:55:25 点击:65 评论:0
g// Exploit.cpp : Defines the entry point for the console application. // #include stdafx.h /*********************************************************************** DivX Player =6.7 srt subtitle parsing exploit Coded by lhoang8500@gmail.com Tested o
又见0day! [FlashGet]-FG2CatchUrl Crash POC
  日期:2008-04-24 09:41:44 点击:226 评论:0
FlashGet 2.0 正式版的0day 早在2.0bate版就有这个BUG 当时发现了但是比较忙就扔下了 今天看见出正式版了 下载回来试了一下 软件更新 BUG犹在 于是乎把POC放出来 html title[FlashGet]-FG2CatchUrlCrashPOC(0Day)/title objectclassid=CLSID:FB5DA724-162B-11D3-8B9B-A
YouTube Clone Script (spages.php) Remote Code Execution Exploit
  日期:2008-04-24 09:34:03 点击:55 评论:0
#!/usr/bin/perl #inphex #/siteadmin/spages.php # include(../include/config.php); # include(../include/function.php); # # if($_REQUEST['update']) # { # $file_path = $config['BASE_DIR']./templates/.$_REQUEST['page']; # if(file_exists($file_path)) # { #
Zune Software ActiveX Arbitrary File Overwrite Exploit
  日期:2008-04-24 09:33:17 点击:33 评论:0
Vulnerability class : Arbitrary file overwrite Discovery date : 21 April 2008 Remote : Yes Credits : J. Bachmann B. Mariani from ilion Research Labs Vulnerable : Zune software: EncProfile2 Class An arbitrary file overwrite as been discovered in an Ac
Web Calendar <= 4.1 Blind SQL Injection Exploit
  日期:2008-04-23 11:10:48 点击:36 评论:0
#!/usr/bin/perl use strict; use LWP::Simple; print -+--[ Web Calendar = 4.1 Blind SQL Injection Exploit ]--+-n; print -+-- --+-n; print -+-- Discovered Coded By t0pP8uZz --+-n; print -+-- Discovered On: 24 April 2008 --+-n; print -+-- --+-n; pri
RedDot CMS 7.5 (LngId) Remote SQL Injection Exploit
  日期:2008-04-22 11:12:46 点击:69 评论:0
#!/usr/bin/env python # un-comment your selection. import urllib2 import urllib import string import getopt import sys def banner(): print print RED DOT CMS 7.5 database enumeration print by Mark Crowther and Rodrigo Marcos def usage(): print print u
Adobe Album Starter 3.2 Unchecked Local Buffer Overflow Exploit
  日期:2008-04-22 11:11:52 点击:41 评论:0
Exploitable issue in various Adobe products c0ntex (c0ntexb@gmail.com) Scott Laurie February 2008 Vulnerable applications, tested: Adobe Photoshop Album Starter Adobe After Effects CS3 Adobe Photoshop CS3 Not Vulnerable applications, tested: Adobe Re
SubEdit Player build 4066 subtitle Buffer Overflow PoC
  日期:2008-04-21 10:40:18 点击:25 评论:0
/===Subedit Player build 4066 subtitle BoF vulnerability=========| | | SubEdit Player is a very popular player and subtitles | editor in Poland. It does not perform any boundery checks | on supplied subtitles. This causes buffer overrun and | throwin
PHP-Fusion 6.00.307 Remote Blind SQL Injection Exploit
  日期:2008-04-21 10:39:21 点击:27 评论:0
#!/usr/bin/python #=================================================================================================# # ____ __________ __ ____ __ # # /_ | ____ |_______ _____/ |_ /_ |/ |_ # # | |/ | | _(__ _/ ___ __ ______ | __ # # | | |
OpenInvoice 0.9 Arbitrary Change User Password Exploit
  日期:2008-04-21 10:38:28 点击:23 评论:0
#!/usr/bin/perl# [ OpenInvoice 0.9 Arbitrary Change User Password Exploit ]# Discovered Coded By t0pP8uZz# Discovered On: 18 April 2008# Vendor has not been notified!# see exploit for more details..# Greetz: milw0rm.com, h4ck-y0u.org, CipherCrew!use
DivX Player 6.6.0 SRT File SEH Buffer Overflow Exploit
  日期:2008-04-21 10:36:54 点击:44 评论:0
#!/usr/bin/python ####################################################################### # DivX 6.6 SRT SEH overwrite PoC # Tested on XP SP2 # Coded by Mati Aharoni, aka muts and Chris Hadnagy, aka loganWHD # muts..at..offensive-security...dot..com
Intel Centrino ipw2200BG Wireless Driver Remote BOF Exploit (meta)
  日期:2008-04-18 10:05:51 点击:68 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/projects
共637页/12733条记录 首页 上一页 [522] [523] [524] 525 [526] [527] [528] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved