首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Mercury SMTPD Remote Preauth Stack Based Overrun PoC
  日期:2007-08-20 13:44:55 点击:66 评论:0
# If there are images in this attachment, they will not be displayed. Download the original attachment # Mercury Mail Transport System Remote Stack Based Overflow # Overview # Mercury Mail Transport System: Mercury is a free, standards-based mail ser
PHP <= 5.2.0 (php_win32sti) Local Buffer Overflow PoC (win32)
  日期:2007-08-20 13:44:02 点击:85 评论:0
?php // ================================================================================== // // php_win32sti.dll PHP = 5.2.0 (win32) Buffer Overflow // //[x] Discovery: boecke boecke@herzeleid.net //[x] Risk: Local Buffer Overflow (Medium - High Ris
Diskeeper 9 Remote Memory Disclosure Exploit
  日期:2007-08-20 13:39:56 点击:51 评论:0
/* Diskeeper Remote Memory Disclosure Credit: Pravus (pravus -a-t- hush -d-o-t- com) Greetz: Scientology for making a remotely accessible disk defragmenter. Felix, Jenna, and Isaac. Vulnerability Description: This vulnerability involves a memory comp
EDraw Office Viewer Component 5.1 HttpDownloadFile() Insecure Method
  日期:2007-08-17 11:58:34 点击:64 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol-------------------------------------------------------------------------------------------------------------- b0-day EDraw Office Viewer Component 5.1 (officeviewer.ocx v. 5.1.199.1
Easy Chat Server 2.2 Remote Denial of Service Exploit
  日期:2007-08-15 14:14:47 点击:55 评论:0
?php ########################################################## ###----------------------------------------------------### ###--------Easy Chat Server Remote DoS Exploit---------### ###----------------------------------------------------### ###-http:
WireShark < 0.99.6 MMS Remote Denial of Service Exploit
  日期:2007-08-15 14:13:08 点击:139 评论:0
#include winsock2.h #include stdio.h #pragma comment(lib, ws2_32) char *http = POST / HTTP/1.0rn Content-Type: application/vnd.wap.mms-messagern; char *hoststr = Host: %s:%drn; char *contentlenstr = Content-Length: %drnrn; unsigned char mms
SurgeMail 38k (SEARCH) Remote Buffer Overflow Exploit
  日期:2007-08-15 14:09:13 点击:43 评论:0
#!/usr/bin/python import os import sys import time import socket import struct #this is imap exploit #710 bytes, tcp port 9999 bind, borrowed from skape miller inventor of megacanvas sc = x90 sc += x41x41x41x41x41x41x41x41x41x41x41x41x4
CounterPath X-Lite 3.x SIP phone Remote Denial of Service Exploit
  日期:2007-08-14 11:44:49 点击:136 评论:0
/**********main.cpp***********/ #include stdio.h #include string using namespace std; #ifdef WIN32 #include winsock2.h #pragma comment(lib, ws2_32.lib) #define close closesocket #define write(a,b,c) send(a, b, c, 0) #define writeto(a,b,c,d,e) sendto(
Racer v0.5.3 beta 5 Remote Buffer Overflow Exploit
  日期:2007-08-14 11:43:29 点击:77 评论:0
#!/usr/bin/perl ###Credit's to n00b. ################################################ #Racer v0.5.3 beta 5 (12-03-07) remote exploit. #Racer is also prone to a buffer over flow in the #server and client.Automatically the game open's #Udp port 26000 a
WengoPhone 2.x SIP Phone Remote Denial of Service Exploit
  日期:2007-08-14 11:41:34 点击:53 评论:0
/**********main.cpp***********/ #include stdio.h #include string using namespace std; #ifdef WIN32 #include winsock2.h #pragma comment(lib, ws2_32.lib) #define close closesocket #define write(a,b,c) send(a, b, c, 0) #define writeto(a,b,c,d,e) sendto(
Savant 3.1 Get Request Remote Overflow Exploit (Universal)
  日期:2007-08-13 10:41:37 点击:63 评论:0
#!/usr/bin/perl -w # exploit for Savant webserver 3.1 remote bof # shellcode bind 4444 port on target host # # # Jacopo cervini aka acaro@jervus.it # use IO::Socket; if(!($ARGV[1])) { print Uso: savant-3.1.pl victim portnn; exit; } $victim = IO::So
Microsoft DXMedia SDK 6 (SourceUrl) ActiveX Remote Code Execution
  日期:2007-08-13 10:40:09 点击:75 评论:0
HTML !-- Microsoft DXMedia SDK 6 SourceUrl ActiveX 0day Remote Code Execution Exploit Bug discovered by Krystian Kloskowski (h07) h07@interia.pl Tested on:.. - Microsoft DirectX Media 6.0 SDK - Microsoft Internet Explorer 6 + all patches - Microsoft
PHP <= 5.2.3 snmpget() object id Local Buffer Overflow Exploit (EDI)
  日期:2007-08-13 10:38:12 点击:176 评论:0
?php /* Inphex reference -http://milw0rm.com/exploits/4204 317 Bytes , Windows Command Shell Bind TCP Inline , Architecture x86 , Windows TinyXP - vm. GET /script.php HTTP/1.1n telnet 192.168.2.32 4444 Microsoft Windows XP [Version 5.1.2600] (C) Cop
Cisco IOS Next Hop Resolution Protocol (NHRP) Denial of Service Exploit
  日期:2007-08-13 10:36:41 点击:95 评论:0
/******************************************************************************/ /* */ /* nhrp-dos - Copyright by Martin Kluge, mk@elxsi.de */ /* */ /* Feel free to modify this code as you like, as long as you include the */ /* above copyright statem
Live for Speed S1/S2/Demo (.spr file) Buffer Overflow Exploit
  日期:2007-08-07 17:49:19 点击:127 评论:0
/** ***** ************************************************************************** 0day Live for speed patch x s2 /s1 and demo local .Spr File buffer over flow Spr file's are also exploitable although i had to go about it a different Way,At first i
Live for Speed S1/S2/Demo (.ply file) Buffer Overflow Exploit
  日期:2007-08-07 17:46:54 点击:117 评论:0
/** ***** ************************************************************************** 0day Live for speed patch x s2 /s1 and demo local .ply File buffer over flow Live for speed .ply file is a set up file,This file is shared amongst user's Who want s
Microsoft Visual 6 (VDT70.DLL NotSafe) Stack Overflow Exploit
  日期:2007-08-07 17:42:37 点击:67 评论:0
!--============================================================================ ( Microsoft Visual 6 ) VDT70.DLL Stack Overflow Exploit DeltahackingSecurityTEAM Bug discovered by D_7J Affected Software: VDT70.DLL (Microsoft Visual Database Tools Data
Panda Antivirus 2008 Local Privilege Escalation Exploit
  日期:2007-08-06 13:56:41 点击:56 评论:0
/* _________________________________________ Security Advisory _________________________________________ _________________________________________ Severity: Medium Title: Panda Antivirus 2008 Local Privileg Escalation Date: 02.08.07 Author: tarkus (t
Envolution <= 1.1.0 (topic) Remote SQL Injection Exploit
  日期:2007-08-06 13:55:20 点击:53 评论:0
#!/usr/bin/perl use LWP::UserAgent; use HTTP::Cookies; if(@ARGV 3) { usage(); exit(); } $site = $ARGV[0]; # Site Target $path = $ARGV[1]; # Path direktori envolution_1-0-1 $usid = $ARGV[2]; # member id $www = new LWP::UserAgent; $sql = $site/$path/mo
CHILKAT ASP String (CkString.dll <= 1.1) SaveToFile() Inscure Method
  日期:2007-08-06 13:54:34 点击:91 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------- bCHILKAT ASP String (CkString.dll = 1.1) SaveToFile() Inscure Method/b url: http://www.chilkatsoft.com/
共637页/12733条记录 首页 上一页 [542] [543] [544] 545 [546] [547] [548] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved