Pages: 8/14 First page Previous page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next page Final page [ View by Articles | List ]

两个提权的 shellcode

  [晴 April 29, 2008 22:53 | by ]
文章作者:pt007[at]vip.sina.com
注:文章首发I.S.T.O信息安全团队,后由原创作者友情提交到邪恶八进制信息安全团队技术讨论组。I.S.T.O版权所有,转载需注明作者。
1、//win2003+sp2下加入一个test11/Test11!!!管理员用户的shellcode:
Tags: , , , , ,

nasl插件生成器(附源码)

  [晴 April 27, 2008 09:36 | by ]
作者:demonalex
来源:demonalex的狂人日记

nasl插件生成器(附源码)

OBlog Sql Injection Vulnerability

  [晴 April 26, 2008 14:24 | by ]
官方已经修正该漏洞
#Author: Whytt & Tr4c3[at]126[dot]com
#版权所有:http://www.nspcn.org & [BK瞬间群] & Whytt
#漏洞文件tags.asp
#影响版本:
3.13-20060429 [access & mssql]

Microsoft Works 7 WkImgSrv.dll crash POC  

  [多云 April 22, 2008 11:04 | by ]
转载:http://hi.baidu.com/nansec/blog/item/299edffcd582d4f8fc037fb9.html
2008-04-17 16:34
dll版本7.03.0616.0  

IE7+xpsp2 测试通过。

转载请注明出处并保持完整性,谢谢。

Windows组件0Day漏洞 通杀IE6与IE7浏览器

  [晴 April 21, 2008 17:01 | by ]
中国IT实验室4月21日报道:近日收到网友发来的邮件,反映了一个Windows 0Day漏洞。并在其博客中给出了相关代码。

[0day]Microsoft Works 7 WkImgSrv.dll crash POC,dll版本7.03.0616.0,IE7+Windows XP SP2 测试通过。
Tags: , , , , , ,
Intel - PRO/Wireless 2200BG Network Connection,估计很多机器都是这个型号的无线网卡,赶紧升级吧..
http://www.milw0rm.com/exploits/5461

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
PS:很好很强大..下面附了编译好的exp ··

沸腾展望新闻系统任意文件下载漏洞

  [雨 April 15, 2008 09:13 | by ]
Author:Tr4c3[dot]126[dot]com
版权所有 http://www.nspcn.org
#+++
影响版本:
沸腾展望新闻系统[核心:尘缘雅境] V1.1 Access版 Finish(SP3)

Windows 内核漏洞 ms08025 分析

  [雨 April 13, 2008 02:32 | by ]
Author:  Polymorphours
Email:   Polymorphours@whitecell.org

    经内部讨论后决定公布分析成果。

    4月8号microsoft再次发布了一个系统内核的补丁(KB941693),微软对该漏洞的描述为: 此安全更新解决 Windows 内核中一个秘
/** Fedora Core 6,7,8 (exec-shield) based
** Apache Tomcat Connector jk2-2.0.2(mod_jk2) remote overflow exploit
** by INetCop Security
Tags: , , , ,

SCO UnixWare Merge mcd Local Root Exploit

  [阴 April 5, 2008 11:06 | by ]
/* 04/2008: public release
* I have'nt seen any advisory on this; possibly still not fixed.
*
* SCO UnixWare Merge mcd Local Root Exploit
Tags: , , , , , ,
Exploit ID:     CAU-EX-2008-0001
Release Date:   2008.04.04
Title:          ypupdated_exec.rb
Description:    Solaris ypupdated Command Execution
Tested:         Solaris x86/sparc 10, sparc 9, 8, 2.7

Real Player rmoc3260.dll Exp

  [阴 April 3, 2008 11:04 | by ]
来源:baicker
milw0rm上的,生成器.lcx给的,稍微改了改代码,据说好用,未测试,最近忙到自杀的时间都没有.唉,可惜有马时候没洞,有洞时候没马,要不就找个站挂上了。
Real Player rmoc3260.dll ActiveX Control Remote Code Execution Exploit(Heap Corruption)
written by e.b.
Tested on Windows XP SP2(fully patched) English, IE6, rmoc3260.dll version 6.0.10.45
Thanks to h.d.m. and the Metasploit crew
/* Dreatica-FXP crew
*
* ----------------------------------------
* Target         : mod_jk2 v2.0.2 for Apache 2.0 Win32  
* Found by       : IOActive Security Advisory
Tags: , , , ,
Pages: 8/14 First page Previous page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Next page Final page [ View by Articles | List ]