首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Internet Explorer 9 MSHTML - CPtsTextParaclient::CountApes Out-of-Bounds Read
  日期:2016-11-08 14:24:48 点击:31 评论:0
!-- Source: http://blog.skylined.nl/20161104001.html Synopsis A specially crafted web-page can cause Microsoft Internet Explorer 9 to access data before the start of a memory block. An attack that is able to control what is stored before this memory
Internet Explorer 8-11, IIS, CScript.exe/WScript.exe VBScript - CRegExp..Execute
  日期:2016-11-08 14:23:56 点击:12 评论:0
!-- Source: http://blog.skylined.nl/20161107001.html Synopsis A specially crafted script can cause the VBScript engine to access data before initializing it. An attacker that is able to run such a script in any application that embeds the VBScript en
VBScript CRegExp::Execute Uninitialized Memory Use
  日期:2016-11-08 14:20:14 点击:38 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is the fifthentry in that series.The below information is available in more detail on my blog athttp://blog.skylined.nl/201
LanWhoIs.exe 1.0.1.120 SEH Local Buffer Overflow
  日期:2016-11-08 14:19:07 点击:16 评论:0
#!/usr/bin/python# -*- coding: utf-8 -*- ### LanWhoIs.exe 1.0.1.120 SEH Local Buffer Overflow Exploit by H3ku ### # Date: 2016-10-26# Exploit Author: H3ku# Exploit Title: LanWhoIs.exe 1.0.1.120 SEH Overflow Exploit# Vendor Homepage: http://lantricks
Microsoft Windows Server AD LDAP RootDSE Netlogon Denial Of Service
  日期:2016-11-07 18:47:03 点击:82 评论:0
#!/usr/bin/perl## MS Windows Server 2008/2008 R2/ 2012/2012 R2/ AD LDAP RootDSE Netlogon # (CLDAP AD Ping) query reflection DoS PoC## Copyright 2016 (c) Todor Donev# Varna, Bulgaria# todor.donev@gmail.com# https://www.ethical-hacker.org/# https://ww
LDAP Amplication Denial Of Service
  日期:2016-11-07 18:46:22 点击:19 评论:0
#!/usr/bin/perl# LDAP DRDoS# by ShadowHatesYouuse Net::RawIP;@ldapservers = qw();if ($ARGV[0] eq '') { print Use: ___FCKpd___0 IPn; exit; }my $target = $ARGV[0];my $ldap_searchrequest = x30x84x00x00x00x2dx02x01x01x63x84x00x00x00x24x
Microsoft Internet Explorer 10 MSHTML CElement::GetPlainTextInScope Out-Of-Bound
  日期:2016-11-07 18:45:16 点击:46 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is the thirdentry in that series.The below information is also available on my blog athttp://blog.skylined.nl/20161103001.h
BolinTech DreamFTP 1.02 - 'RETR' Command Remote Buffer Overflow
  日期:2016-11-07 18:43:41 点击:39 评论:0
import socket import os import sys print ''' ############################################## # Created: ScrR1pTK1dd13 # # Name: Greg Priest # # Mail: ScrR1pTK1dd13.slammer@gmail.com # ############################################## # Exploit Title: Dre
PCMan FTP Server 2.0.7 - 'PORT' Command Buffer Overflow
  日期:2016-11-07 18:42:17 点击:21 评论:0
#!/usr/bin/env python #-*- coding: utf-8 -*- # Exploit Title: PCMan FTP Server 2.0 PORT Command BoF Exploit # Author: Pablo Gonzlez # Date: 4/11/2016 # Software: PCMan 2.0 # Tested on: Windows XP Profesional SP3 Spanish x86 import socket print Creati
PCMan FTP Server 2.0.7 - 'SITE CHMOD' Command Buffer Overflow
  日期:2016-11-07 18:41:39 点击:22 评论:0
#!/usr/bin/env python #-*- coding: utf-8 -*- # Exploit Title: PCMan FTP Server 2.0 BoF SITE CHMOD Command # Date: 04/11/2016 # Exploit Author: Luis Noriega # Tested on: Windows XP Profesional V. 5.1 Service Pack 3 # CVE : n/a import socket # shellcod
PCMan FTP Server 2.0.7 - 'NLST' Command Buffer Overflow
  日期:2016-11-07 18:40:54 点击:23 评论:0
#!/usr/bin/env python # -*- coding: utf-8 -*- import socket #Exploit Title: PCMan FTP Server 2.0 Buffer Overflow NLST command #Date: 03/11/16 #Exploit Author: Karri93 #Version: 2.0 #Tested on: Windows XP Profesional SP3 Spanish x86 #CVE: N/A #Shellco
Freefloat FTP Server 1.0 - 'SITE ZONE' Command Buffer Overflow
  日期:2016-11-07 18:23:47 点击:61 评论:0
#!/usr/bin/env python #-*- coding: utf-8 -*- # Exploit Title: FreeFloat FTP Server BoF SITE ZONE Command # Date: 04/11/2016 # Exploit Author: Luis Noriega # Software Link: http://www.freefloat.com/software/freefloatftpserver.zip # Version: 1.0 # Test
IBM AIX 5.3/6.1/7.1/7.2 - 'lquerylv' Privilege Escalation
  日期:2016-11-07 18:23:03 点击:87 评论:0
#!/usr/bin/sh # # AIX lquerylv 5.3, 6.1, 7.1, 7.2 local root exploit. Tested against latest patchset (7100-04) # # This exploit takes advantage of known issues with debugging functions # within the AIX linker library. We are taking advantage of known
IBM AIX 6.1/7.1/7.2.0.2 - 'lsmcode' Privilege Escalation
  日期:2016-11-07 18:22:09 点击:214 评论:0
#!/usr/bin/sh # # AIX lsmcode local root exploit. # # Affected: AIX 6.1/7.1/7.2.0.2 # # Blog post URL: https://rhinosecuritylabs.com/2016/11/03/unix-nostalgia-hunting-zeroday-vulnerabilities-ibm-aix/ # # lqueryroot.sh by @hxmonsegur [2016 //RSL] ROOT
PCMan FTP Server 2.0.7 - 'ACCT' Command Buffer Overflow
  日期:2016-11-04 15:00:46 点击:25 评论:0
#!/usr/bin/env python #-*- coding: utf-8 -*- # Exploit Title: PCMan FTP Server 2.0 ACCT Command Buffer Overflow Exploit # Date: 3/11/2016 # Exploit Author: Cybernetic # Version: 2.0 # Tested on: Windows XP Profesional SP3 ESP x86 # CVE : N/A import s
Axessh 4.2 - Denial Of Service
  日期:2016-11-04 15:00:06 点击:21 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AXESSH-DENIAL-OF-SERVICE.txt [+] ISR: ApparitionSec Vendor: ============ www.labf.com Product: ============= Axessh 4.2.
SweetRice 1.5.1 - Arbitrary File Download
  日期:2016-11-04 14:59:03 点击:32 评论:0
#/usr/bin/python #-*- Coding: utf-8 -*- # Exploit Title: SweetRice 1.5.1 - Local File Inclusion # Exploit Author: Ashiyane Digital Security Team # Date: 03-11-2016 # Vendor: http://www.basic-cms.org/ # Software Link: http://www.basic-cms.org/attachme
Memcached 1.4.33 - PoC (3)
  日期:2016-11-04 14:58:15 点击:304 评论:0
# Source: http://paper.seebug.org/95/ import struct import socket import sys MEMCACHED_REQUEST_MAGIC = x80 OPCODE_SET = x21 key_len = struct.pack(!H,32) body_len = struct.pack(!I,1) packet = MEMCACHED_REQUEST_MAGIC + OPCODE_SET + key_len + body_len
Memcached 1.4.33 - PoC (2)
  日期:2016-11-04 14:57:40 点击:25 评论:0
# Source: http://paper.seebug.org/95/ import struct import socket import sys MEMCACHED_REQUEST_MAGIC = x80 OPCODE_ADD = x02 key_len = struct.pack(!H,0xfa) extra_len = x08 data_type = x00 vbucket = x00x00 body_len = struct.pack(!I,0xffffffd0) op
Memcached 1.4.33 - PoC (1)
  日期:2016-11-04 14:56:49 点击:33 评论:0
# Source: http://paper.seebug.org/95/ import struct import socket import sys MEMCACHED_REQUEST_MAGIC = x80 OPCODE_PREPEND_Q = x1a key_len = struct.pack(!H,0xfa) extra_len = x00 data_type = x00 vbucket = x00x00 body_len = struct.pack(!I,0) opaqu
共637页/12733条记录 首页 上一页 [99] [100] [101] 102 [103] [104] [105] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved