首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Sam Spade 1.14 Buffer Overflow
  日期:2015-11-04 14:09:58 点击:95 评论:0
# Exploit Title : Sam Spade 1.14 - Buffer OverFlow# Date : 10/30/2015# Exploit Author : MandawCoder# Contact : MandawCoder@gmail.com# Vendor Homepage : http://samspade.org# Software Link : http://www.majorgeeks.com/files/details/sam_spade.html# Vers
Python 3.4 / 3.5 xmlparse_setattro() Type Confusion
  日期:2015-11-04 14:08:43 点击:44 评论:0
Title: Python 3.4 and 3.5 xmlparse_setattro() Type ConfusionCredit: John Leitch (john@autosectools.com), Bryce Darling (darlingbryce@gmail.com)Url1: http://autosectools.com/Page/Python-xmlparse_setattro-Type-ConfusionUrl2: http://bugs.python.org/iss
Python 3.3 - 3.5 product_setstate() Function - Out-of-bounds Read
  日期:2015-11-04 14:08:04 点击:29 评论:0
Title: Python 3.3 - 3.5 product_setstate() Out-of-bounds Read Credit: John Leitch ( john@autosectools.com ), Bryce Darling ( darlingbryce@gmail.com ) Url1: http://autosectools.com/Page/Python-product_setstate-Out-of-bounds-Read Url2: http://bugs.pyth
Python 2.7 strop.replace() Method - Integer Overflow
  日期:2015-11-04 14:06:56 点击:68 评论:0
Title: Python 2.7 strop.replace() Integer Overflow Credit: John Leitch ( john@autosectools.com ) Url1: http://autosectools.com/Page/Python-strop-replace-Integer-Overflow Url2: http://bugs.python.org/issue24708 Resolution: Fixed The Python 2.7 strop.r
Python 2.7 array.fromstring Method - Use After Free
  日期:2015-11-04 14:05:58 点击:50 评论:0
Title: Python 2.7 array.fromstring Use After Free Credit: John Leitch ( john@autosectools.com ) Url1: http://autosectools.com/Page/Python-array-fromstring-Use-After-Free Url2: http://bugs.python.org/issue24613 Resolution: Fixed The Python 2.7 array.f
Python 2.7 hotshot Module - pack_string Heap Buffer Overflow
  日期:2015-11-04 14:05:19 点击:49 评论:0
Title: Python 2.7 hotshot pack_string Heap Buffer Overflow Credit: John Leitch ( john@autosectools.com ) Url1: http://autosectools.com/Page/Python-hotshot-pack_string-Heap-Buffer-Overflow Url2: http://bugs.python.org/issue24481 Resolution: Fixed The
Gold MP4 Player - .swf Local Exploit
  日期:2015-11-04 14:03:33 点击:298 评论:0
#!/usr/bin/python # EXPLOIT TITLE: GOLD PLAYER Local Exploit # AUTHOR: Vivek Mahajan - C3p70r # Credits: Gabor Seljan # Date of Testing: 30 October 2015 # Download Link : http://download.cnet.com/GoldMP4Player/3000-2139_4-10967424.html # Tested On :
AIX 7.1 - lquerylv Local Privilege Escalation
  日期:2015-11-02 13:58:41 点击:76 评论:0
#!/bin/sh # # Exploit Title: AIX 7.1 lquerylv privilege escalation # Date: 2015.10.30 # Exploit Author: S2 Crew [Hungary] # Vendor Homepage: www.ibm.com # Software Link: - # Version: - # Tested on: AIX 7.1 (7100-02-03-1334) # CVE : CVE-2014-8904 # #
NetUSB Kernel Stack Buffer Overflow
  日期:2015-11-02 13:57:46 点击:51 评论:0
#!/usr/bin/env python # -*- coding: utf-8 -*- # Exploit Title: NetUSB Kernel Stack Buffer Overflow # Date: 9/10/15 # Exploit Author: Adrian Ruiz Bermudo # Vendor Homepage: http://www.kcodes.com/ # Version: Multiple: https://www.sec-consult.com/fxdata
Sam Spade 1.14 - Scan From IP Address Field SEH Overflow Crash PoC
  日期:2015-11-02 13:56:34 点击:27 评论:0
#!/usr/bin/env python # -*- coding: utf-8 -*- # Exploit Title : Sam Spade 1.14 Scan from IP address Field SEH Overflow Crash PoC # Discovery by : Luis Martnez # Email : l4m5@hotmail.com # Discovery Date : 20/10/2015 # Vendor Homepage : http://samspad
Samsung SecEmailUI Script Injection
  日期:2015-10-29 14:17:14 点击:32 评论:0
# Source: https://code.google.com/p/google-security-research/issues/detail?id=494 ''' The default Samsung email client's email viewer and composer (implemented in SecEmailUI.apk) doesn't sanitize HTML email content for scripts before rendering the da
Mac OS X 10.9.5 / 10.10.5 rsh/libmalloc Privilege Escalation
  日期:2015-10-27 15:47:55 点击:155 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit4 Msf::Exploit::Local Rank = NormalRanking include Msf::Post::OSX::System include
Th3 MMA mma.php Backdoor Arbitrary File Upload
  日期:2015-10-27 15:46:23 点击:26 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'nokogiri'class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Expl
MacOS X 10.11 Hardlink Resource Exhaustion
  日期:2015-10-27 15:45:37 点击:59 评论:0
/*MacOS X 10.11 hardlink bomb cause resource exhaustion (Avast PoC)Credit: Maksymilian Arciemowicz ( CXSECURITY )Website: http://cxsecurity.com/http://cert.cx/Affected software:- Commands such as: zip, tar, find- AntiVirus: Avast, Eset32Let's back t
MacOS X 10.11 FTS Buffer Overflow
  日期:2015-10-27 15:43:19 点击:32 评论:0
MacOS X 10.11 FTS Deep structure of the file system Buffer OverflowCredit: Maksymilian Arciemowicz ( CXSECURITY )Website: http://cxsecurity.com/http://cert.cx/Affected software:- Commands such as: ls, find, rm - probably moreApple file system suffer
Winamp Bento Browser Remote Code Execution
  日期:2015-10-27 15:41:04 点击:26 评论:0
#!/usr/bin/php?php/* ########################################################## # Author : Ehsan Noreddini # E-Mail : me@ehsann.info # Social : @prot3ct0r # Title : Winamp Bento Browser - Remote Command Execution # Version : Winamp 5.666 # CVE : CVE
Microsoft Compiled HTML Help Remote Code Execution
  日期:2015-10-27 15:40:15 点击:65 评论:0
#!/usr/bin/php?php########################################################## # Author : Ehsan Noreddini # E-Mail : me@ehsann.info # Social : @prot3ct0r # Title : Microsoft Compiled HTML Help - Remote Code Execution# Microsoft Compiled HTML Help is a
HTML Compiler Remote Code Execution
  日期:2015-10-27 15:38:44 点击:28 评论:0
#!/usr/bin/php?php########################################################### Title : HTML Compiler Remote Code Execution# HTML Compiler is a program that allows you to put an entire HTML application into a standalone Windows application.# Author :
SiteWIX SQL Injection
  日期:2015-10-27 15:35:15 点击:39 评论:0
#!/usr/bin/env python#-*- coding:utf-8 -*-#Title: SiteWIX - (edit_photo2.php id) SQL Injection Exploit#Author: ZoRLu / zorlu@milw00rm.com#Website: milw00rm.com / milw00rm.net / milw00rm.org / milw0rm.info#Twitter: https://twitter.com/milw00rm or @mi
HandyPassword 4.9.3 SEH Overwrite
  日期:2015-10-27 15:33:33 点击:647 评论:0
********************************************************************************************# Exploit Title: HandyPassword SEH-Over Write Exploit# Date: 9/24/2015# Exploit Author: Un_N0n# Software Link: http://www.handypassword.com/download.shtml# V
共637页/12733条记录 首页 上一页 [130] [131] [132] 133 [134] [135] [136] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved