首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
SurgeMail v.38k4 webmail Host header Denial of Service Exploit
  日期:2007-12-19 11:58:30 点击:60 评论:0
?php /* SurgeMail v.38k4 webmail Host header denial of service exploit tested against the windows version rgod */ dl(php_curl.so); $url = http://192.168.0.1; $puf=str_repeat(0xff,0xfff); $header =POST / HTTP/1.0rn; $header.=Host: $pufrn; $header.
MS07-065 Message Queuing Service RPC远程溢出分析
  日期:2007-12-18 09:02:34 点击:190 评论:0
Html 版本: http://pstgroup.blogspot.com/2007/12/paperms07-065-message-queuing-service.html Author: axis Date: 2007-12-17 Team: http://www.ph4nt0m.org 微软的补丁链接 http://www.microsoft.com/technet/security/bulletin/ms07-065.mspx 根据ZDI的漏洞描述:
Samba 3.0.27a send_mailslot() Remote Buffer Overflow PoC
  日期:2007-12-17 11:59:41 点击:65 评论:0
/* http://secunia.com/secunia_research/2007-99/advisory/ * * A remote attacker could send a specially crafted SAMLOGON domain * logon packet, possibly leading to the execution of arbitrary code with * elevated privileges. Note that this vulnerability
Adult Script <= 1.6 Unauthorized Administrative Access Exploit
  日期:2007-12-17 11:58:49 点击:75 评论:0
? ob_implicit_flush(true); ? titleAdult Script Unauthorized Administrative Access Exploit/title style body{margin:0px;font-style:normal;font-size:10px;color:#FFFFFF;font-family:Verdana,Arial;background-color:#3a3a3a;scrollbar-face-color: #303030;scro
HP OpenView Network Node Manager 07.50 CGI Remote BoF Exploit
  日期:2007-12-17 11:57:58 点击:84 评论:0
#!/usr/bin/python # HP OpenView Network Node Manager CGI Buffer Overflow # Tested on NNM Release B.07.50 / Windows 2000 server SP4 # http://www.zerodayinitiative.com/advisories/ZDI-07-071.html # Coded by Mati Aharoni # muts|offensive-security|com # h
Apple Mac OS X xnu <= 1228.0 Local kernel Denial of Service PoC
  日期:2007-12-17 11:57:02 点击:51 评论:0
/* xnu-superblob-dos.c * * Copyright (c) 2007 by mu-b@digit-labs.org * * Apple MACOS X xnu = 1228.0 local kernel DoS POC * by mu-b - Mon 10 Dec 2007 * * - Tested on: Apple MACOS X 10.5.1 (xnu-1228.0.2~1/RELEASE_I386) * * assert trip or bcopy (NULL, .
SquirrelMail G/PGP Plugin deletekey() Command Injection Exploit
  日期:2007-12-12 11:52:44 点击:42 评论:0
#!/usr/local/bin/ruby putshttp://backdoored.netn puts SquirrelMail G/PG deletekey() command injection exploitn puts http://backdoored.net Visit Usn puts Coded by Backdoored member. n puts --------------------------------------------------n if AR
Simple HTTPD 1.3 (/aux) Remote Denial of Service Exploit
  日期:2007-12-12 11:52:06 点击:42 评论:0
#usage: poc.py host port import socket import sys print ----------------------------------------------------------------------- print Simple HTTPD 1.3 /aux Denial of Servicen print url: http://shttpd.sourceforge.netn print author: shinnai print mai
Online Media Technologies AVSMJPEGFILE.DLL 1.1 Remote BoF PoC
  日期:2007-12-12 11:51:16 点击:46 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0------------------------------------------------------------------------------- bOnline Media Technologies AVSMJPEGFILE.DLL 1.1 Remote Buffer Overflow/b url: www.
MonAlbum 0.87 Upload Shell / Password Grabber Exploit
  日期:2007-12-12 11:50:02 点击:66 评论:0
#!/usr/bin/env perl use strict; use warnings; ############################################### use LWP::UserAgent; use HTTP::Request::Common; use Getopt::Std; my (%args, $user, $password, $sql_host, $sql_user, $sql_password, $cookie, $path, $file, $up
Nullsoft Winamp 5.32 MP4 tags Stack Overflow Exploit
  日期:2007-12-10 15:26:22 点击:60 评论:0
#!/bin/perl # # Nullsoft Winamp MP4 tags Stack Overflow # # 0-day discovered and exploited by SYS 49152 # # Tested on win XP SP2 ENG # Tuned for Nullsoft Winamp 5.32 d.i. # Shell on port 49152 # # usage: # well, not much fun for you kids here .. # to
Windows Media Player 6.4 MP4 File Stack Overflow PoC
  日期:2007-12-10 14:45:24 点击:99 评论:0
#!/bin/perl # # Windows media player 6.4 MP4 Stack Overflow # # 0-day discovered and exploited by SYS 49152 # # Tested on win XP SP2 ENG # Shell on port 49152 # # usage: # - download this codec in order to manage MP4 content: # http://www.3ivx.com/co
Media Player Classic 6.4.9 MP4 File Stack Overflow Exploit
  日期:2007-12-10 14:25:48 点击:74 评论:0
#!/bin/perl # # Media Player Classic 6.4.9 MP4 Stack Overflow # # 0-day discovered and exploited by SYS 49152 # # Tested on win XP SP2 ENG # Shell on port 49152 # # usage: # - download this codec in order to manage MP4 content: # http://www.3ivx.com/
Send ICMP Nasty Garbage (sing) Append File Logrotate Exploit
  日期:2007-12-07 15:06:25 点击:68 评论:0
/* sing file append exploit by bannedit 12/05/2007 The original reporter of this issue included an example session which added an account to the machine. The method for this exploit is slightly different and much more quiet. Although it relies upon l
Cisco Phone 7940 Remote Denial of Service Exploit
  日期:2007-12-06 15:10:34 点击:419 评论:0
#!/usr/bin/perl ############################### # Vulnerabily discovered using KiF ~ Kiph # # Authors: # Humberto J. Abdelnur (Ph.D Student) # Radu State (Ph.D) # Olivier Festor (Ph.D) # # Madynes Team, LORIA - INRIA Lorraine # http://madynes.loria.f
Apple Mac OS X 10.5.0 (leopard) vpnd Remote Denial of Service PoC
  日期:2007-12-05 11:56:20 点击:249 评论:0
/* vpnd-leopard-lb-dos.c * * Copyright (c) 2007 by mu-b@digit-labs.org * * Apple MACOS X 10.5.0 (leopard) vpnd remote DoS POC * by mu-b - Fri 9 Nov 2007 * * - Tested on: Apple MACOS X 10.5.0 (leopard) vpnd * * Program received signal EXC_ARITHMETIC,
Apple Mac OS X xnu <= 1228.0 Local Kernel Denial of Service PoC
  日期:2007-12-05 11:54:43 点击:76 评论:0
/* xnu-macho-dos.c * * Copyright (c) 2007 by mu-b@digit-labs.org * * Apple MACOS X xnu = 1228.0 local kernel DoS POC * by mu-b - Thu 15 Nov 2007 * * - Tested on: Apple MACOS X 10.4 (xnu-792.22.5~1/RELEASE_I386) * Apple MACOS X 10.5.1 (xnu-1228.0.2~1/
VLC 0.86 < 0.86d ActiveX Remote Bad Pointer Initialization PoC
  日期:2007-12-05 11:53:38 点击:97 评论:0
!-- Core Security Technologiess - CoreLabs Advisory http://www.coresecurity.com/corelabs VLC Activex Bad Pointer Initialization Vulnerability *Advisory Information* Title: VLC Activex Bad Pointer Initialization Vulnerability Advisory ID: CORE-2007-10
RealPlayer 11 Malformed AU File Denial of Service Exploit
  日期:2007-12-03 14:30:32 点击:40 评论:0
#RealPlayer 11 local/remote DoS by A.Sawan aka NtWaK0 and A.Hariri aka nophie import sys import os head = (x2Ex73x6Ex64x00x00x01x18x00x00x42xDCx00x00x00x01+ x00x00x1Fx40x00x00x00x00x69x61x70x65x74x75x73x2E+ x61x75x0
Windows Media Player AIFF Divide By Zero Exception DoS PoC
  日期:2007-11-30 13:00:32 点击:96 评论:0
/* * Windows Media Player AIFF Divide By Zero Exception DOS POC * by Hong Gil-Dong, Jeon Woo-chi * Jeong Ji-Sang (?1135), He was one of the most famous korean * poet. This poem says sadness about good-bye'. * * * * * * If you open the kr.aiff in Wind
共637页/12733条记录 首页 上一页 [534] [535] [536] 537 [538] [539] [540] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved