Pages: 7/12 First page Previous page 1 2 3 4 5 6 7 8 9 10 11 12 Next page Final page [ View by Articles | List ]

MS08-025 for win2k & win2k3

  [晴 April 18, 2008 11:09 | by ]
来源:BlogJava
PS:Win2k CN SP2 ,Win2k3 CN SP1下测试通过
D:\>whoami
BAICKER-VMWARE\009

D:\>net user hack /add
Tags: , , , , ,
PS:很好很强大..下面附了编译好的exp ··

Windows 内核漏洞 ms08025 分析

  [雨 April 13, 2008 02:32 | by ]
Author:  Polymorphours
Email:   Polymorphours@whitecell.org

    经内部讨论后决定公布分析成果。

    4月8号microsoft再次发布了一个系统内核的补丁(KB941693),微软对该漏洞的描述为: 此安全更新解决 Windows 内核中一个秘
/** Fedora Core 6,7,8 (exec-shield) based
** Apache Tomcat Connector jk2-2.0.2(mod_jk2) remote overflow exploit
** by INetCop Security
Tags: , , , ,

SCO UnixWare Merge mcd Local Root Exploit

  [阴 April 5, 2008 11:06 | by ]
/* 04/2008: public release
* I have'nt seen any advisory on this; possibly still not fixed.
*
* SCO UnixWare Merge mcd Local Root Exploit
Tags: , , , , , ,
Exploit ID:     CAU-EX-2008-0001
Release Date:   2008.04.04
Title:          ypupdated_exec.rb
Description:    Solaris ypupdated Command Execution
Tested:         Solaris x86/sparc 10, sparc 9, 8, 2.7

Real Player rmoc3260.dll Exp

  [阴 April 3, 2008 11:04 | by ]
来源:baicker
milw0rm上的,生成器.lcx给的,稍微改了改代码,据说好用,未测试,最近忙到自杀的时间都没有.唉,可惜有马时候没洞,有洞时候没马,要不就找个站挂上了。
Real Player rmoc3260.dll ActiveX Control Remote Code Execution Exploit(Heap Corruption)
written by e.b.
Tested on Windows XP SP2(fully patched) English, IE6, rmoc3260.dll version 6.0.10.45
Thanks to h.d.m. and the Metasploit crew
Runs calc.exe on Office XP SP3 with updates < 03/11/08.

Just for fun...

http://milw0rm.com/sploits/2008-ms08-016.tgz

Quick TFTP Pro 2.1 Remote SEH Overflow Exploit (0day)

  [晴 March 27, 2008 00:03 | by ]
#!/usr/bin/python
# Quick TFTP Pro 2.1 SEH Overflow (0day)
# Tested on Windows XP SP2.
# Coded by Mati Aharoni
# muts..at..offensive-security.com
# http://www.offensive-security.com/0day/quick-tftp-poc.py.txt
Tags: , , , ,
#!/usr/bin/python
# TFTP Server for Windows V1.4 ST (0day)
# http://sourceforge.net/projects/tftp-server/
# Tested on Windows Vista SP0.
# Coded by Mati Aharoni
Tags: , , , ,
Microsoft Office Excel Code Execution Exploit (MS08-014)
http://www.milw0rm.com/sploits/2008-zha0_ms08_014.rar
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

Sun Solaris rpc.ypupdated Arbitrary Command Execution

  [晴 March 20, 2008 14:32 | by ]
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.
Tags: , , , ,

CreateLive CMS Version 4.0 0day

  [晴 March 17, 2008 17:09 | by ]
来源:xn_ice的blog
CreateLive CMS Version 4.0 0day.doc
by:xiaok q:391232032.771044833 time: 2008-2-4 02:10 xpsp2 ie7 iis5.1 ……
致敬D.S.T的各位同志,致Hell-Phantom,致on thin ice,致老D,致Doom,致群里那帮有文化的流氓……

Cmsez(随易)全站系统 0day

  [晴 March 14, 2008 22:59 | by ]
来源:零客网络安全小组
程序名称:Cmsez Web Content Manage System v2.0.0
漏洞发现:小帥(小帅)
公布时间:08-03-14
Tags: , , , , ,
Pages: 7/12 First page Previous page 1 2 3 4 5 6 7 8 9 10 11 12 Next page Final page [ View by Articles | List ]