首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
LeadTools Thumbnail Browser Control (lttmb14E.ocx) Remote BoF Exploit
  日期:2007-05-21 13:16:17 点击:73 评论:0
span style=font: 14pt Courier New;p align=centerb2007/05/19/b/p/span pre codespan style=font: 10pt Courier New;span class=general1-symbol---------------------------------------------------------------------------------------------------- bLeadTools T
LeadTools JPEG 2000 COM Object Remote Stack Overflow Exploit
  日期:2007-05-21 13:15:09 点击:78 评论:0
span style=font: 14pt Courier New;p align=centerb2007/05/18/b/p/span pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------------------------- bLeadTools JPEG 2
MagicISO <= 5.4(build239) .cue File Heap Overflow PoC
  日期:2007-05-18 19:12:01 点击:72 评论:0
#!/usr/bin/env ruby ################################### #Credits to n00b for finding this bug. #Magic iso has a stacked based buffer over-flow when #We pass an overly-long file name inside the .cue file #We are able to control alot of the registers s
FAQEngine <= 4.16.03 (question.php questionref) SQL Injection Exploit
  日期:2007-05-17 13:37:31 点击:79 评论:0
#!/usr/bin/perl -w ################################################################################# ## # FAQEngine = v4.16.03 SQL Injection Exploit# ## # Discovered by: Silentz# # Payload: Admin Username Hash Retrieval# # Website: http://www.w4ck1ng
SimpNews <= 2.40.01 (print.php newnr) Remote SQL Injection Exploit
  日期:2007-05-17 13:34:30 点击:84 评论:0
#!/usr/bin/perl -w ################################################################################# # # # SimpNews = 2.40.01 SQL Injection Exploit # # # # Discovered by: Silentz # # Payload: Admin Username Hash Retrieval # # Website: http://www.w4ck
CA BrightStor Backup 11.5.2.0 caloggderd.exe Denial of Service Exploit
  日期:2007-05-17 13:16:12 点击:67 评论:0
#!/usr/bin/python # # Computer Associates (CA) Brightstor Backup Mediasvr.exe DoS (catirpc.dll/rwxdr.dll) # (Previously Unknown) # # There is an issue with RPC operation 126 and the imported cactirpc.dll # and rwxdr.dll. It looks as if Mediasvr.exe
MS Windows Vista forged ARP packet Network Stack DoS Exploit
  日期:2007-05-16 17:17:03 点击:100 评论:0
#!/usr/bin/env python # # :: Kristian Hermansen :: # Date: 20070514 # Reference: CVE-2007-1531 # Description: Microsoft Windows Vista (SP0) dumps interfaces when # it receives this ARP packet. This DoS is useful for an internet # cafe, wireless venue
Eudora 7.1 SMTP ResponseRemote Remote Buffer Overflow Exploit
  日期:2007-05-16 16:56:10 点击:69 评论:0
#!/usr/bin/python # Eudora 7.1 SMTP Response 0day Remote Buffer Overflow PoC Exploit # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Tested on Eudora 7.1.0.9 / XP SP2 Polish # Shellcode type: Windows Execute Command (calc.exe) # Note:.
TinyIdentD <= 2.2 Remote Buffer Overflow Exploit
  日期:2007-05-15 13:13:24 点击:74 评论:0
# #tinyidentd exploit code by #thomas . pollet _at_ gmail . com #bug by Maarten Boone # #usage: python exploit.py [target] # import socket,sys #jmp into nop sled payload = 'xebx20' #ident crap payload += ', 28 : USERID : UNIX : ' #nop sled payload
webdesproxy 0.0.1 (GET Request) Remote Root Exploit (exec-shield)
  日期:2007-05-15 13:09:28 点击:73 评论:0
/* ** ** Fedora Core 6 (exec-shield) based ** Webdesproxy (webdesproxy-0.0.1.tgz) remote root exploit ** (reverse connect-back method) by Xpl017Elz ** ** Advanced exploitation in exec-shield (Fedora Core case study) ** URL: http://x82.inetcop.org/h0m
VImpX ActiveX (VImpX.ocx v. 4.7.3.0) Remote Buffer Overflow Exploit
  日期:2007-05-14 17:10:59 点击:51 评论:0
!- IE 6 / DB Software Laboratory VImpX ActiveX (VImpX.ocx v. 4.7.3.0) remote buffer overflow exploit windows xp sp2 it version / eip overwrite method by rgod site: http://retrogod.altervista.org mail: retrog at alice dot it software site: http://www.
webdesproxy 0.0.1 (GET Request) Remote Buffer Overflow Exploit
  日期:2007-05-14 17:08:09 点击:537 评论:0
/*[ webdesproxy[v0.0.1]: (cygwin) remote buffer overflow exploit. ]* * * * by: vade79/v9 v9@fakehalo.us (fakehalo/realhalo) * * * * compile: * * gcc xwdp-cygwin.c -o xwdp-cygwin * * * * syntax: * * ./xwdp-cygwin [-r] -h host -p port * * * * webdespro
notepad++ 4.1 ruby file processing Buffer Overflow Exploit (win32)
  日期:2007-05-14 16:39:03 点击:145 评论:0
/*[ notepad++[v4.1]: (win32) ruby file processing buffer overflow exploit. ]* * * * by: vade79/v9 v9@fakehalo.us (fakehalo/realhalo) * * * * compile: * * gcc xnotepad++.c -o xnotepad++ * * * * syntax: * * ./xnotepad++ [-xe] -f filename * * * * notepa
McAfee Security Center IsOldAppInstalled ActiveX BoF Exploit
  日期:2007-05-11 17:01:45 点击:100 评论:0
/* McAfee Security Center IsOldAppInstalled ActiveX Buffer Overflow Vulnerability Peel the frame from axis,Thanks Test on Windows2000 and dll version Mcsubmgr.dll 6.0.0.15 Greetz to OYXin, sowhat, Winny Thomas and 0x557 team */ #include stdio.h #incl
MS Internet Explorer <= 7 Remote Arbitrary File Rewrite PoC (MS07-027)
  日期:2007-05-11 16:59:38 点击:94 评论:0
html title MS07-027 mdsauth.dll NMSA Session Description Object SaveAs control, arbitrary file modification /title body OBJECT id=target classid=clsid:d4fe6227-1288-11d0-9097-00aa004254a0 /OBJECT script language=vbscript //next script is converted to
TaskDriver <= 1.2 Login Bypass/SQL Injection Exploit
  日期:2007-05-11 16:57:52 点击:88 评论:0
#!/usr/bin/perl -w ################################################################################# ## # TaskDriver = 1.2 Login Bypass/SQL Injection Exploit# ## # Discovered by: Silentz# # Payload: Login Bypass Admin Username Hash Retrieval# # Websi
Gimp 2.2.14 .RAS File Download/Execute Buffer Overflow Exploit (win32)
  日期:2007-05-10 19:03:04 点击:61 评论:0
Gimp 2.2.14 .RAS File Download/Execute Buffer Overflow Exploit (win32) /* :: Kristian Hermansen :: Date: 20070509 Description: Gimp 2.2.14 RAS vuln, thanks to Marsu. This one is universal download and exec using call esp in libgimpcolor-2.0-0.dll. V
Helix Server Vsrc3260.dll Remote Vul Exploit
  日期:2007-04-30 16:46:46 点击:99 评论:0
/******************************************************************************/ Real Networks Helix Universal Server Vsrc3260.dll Remote Buffer Overflow Vulnerability Exploit by cocoruder(frankruder_at_hotmail.com),2007.04.27 http://ruder.cdut.net R
Fenice OMS server 1.10 Remote Buffer Overflow Exploit (exec-shield)
  日期:2007-04-30 09:45:23 点击:102 评论:0
/* ** ** Fedora Core 6 (exec-shield) based ** Fenice OMS server (fenice-1.10.tar.gz) remote root exploit ** by Xpl017Elz ** ** Advanced exploitation in exec-shield (Fedora Core case study) ** URL: http://x82.inetcop.org/h0me/papers/FC_exploit/FC_expl
TCExam <= 4.0.011 (SessionUserLang) Shell Injection Exploit
  日期:2007-04-30 09:43:55 点击:92 评论:0
?php print_r(' -------------------------------------------------------------------------- TCExam = 4.0.011 $_COOKIE[SessionUserLang] shell injection exploit by rgod mail: retrog at alice dot it site: http://retrogod.altervista.org -------------------
共637页/12733条记录 首页 上一页 [550] [551] [552] 553 [554] [555] [556] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved