首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Microsoft Office 2007 - msxml5.dll Crash PoC
  日期:2015-09-01 13:07:48 点击:35 评论:0
#!/usr/bin/perl -w # Title : Microsoft Office 2007 msxml5.dll - Crash Proof Of Concept # Tested : Microsoft Office 2007 / Win7 # DLL : msxml5.dll 5.20.1072.0 # WINWORD.EXE version : 12.0.6612.1000 # # # Author : Mohammad Reza Espargham # Linkedin : h
PFTP Server 8.0f Lite - textfield Local SEH Buffer Overflow
  日期:2015-09-01 13:07:12 点击:22 评论:0
#************************************************************************************************************* # # Exploit Title: PFTP Server 8.0f (lite) SEH bypass technique tested on Win7x64 # Date: 8-29-2015 # Software Link: http://www.heise.de/do
Ganglia Web Frontend < 3.5.1 - PHP Code Execution
  日期:2015-09-01 13:05:49 点击:19 评论:0
?php /* ################################################################################ # # Author : Andrei Costin (andrei theATsign firmware theDOTsign re) # Desc : CVE-2012-3448 PoC # Details : This PoC will create a dummy file in the /tmp folder
Apple OS X Entitlements Rootpipe Privilege Escalation
  日期:2015-08-31 18:10:51 点击:19 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit4 Msf::Exploit::Local Rank = GreatRanking include Msf::Post::OSX::System include M
MS SQL Server 2000/2005 SQLNS.SQLNamespace COM Object Refresh() Unhandled Pointe
  日期:2015-08-31 18:10:03 点击:31 评论:0
% Function Padding(intLen) Dim strRet, intSize intSize = intLen/2 - 1 For I = 0 To intSize Step 1 strRet = strRet unescape(%u4141) Next Padding = strRet End Function Function PackDWORD(strPoint) strTmp = replace(strPoint, 0x, ) PackDWORD = PackDWORD
Sysax Multi Server 6.40 SSH Component Denial of Service
  日期:2015-08-31 18:09:20 点击:89 评论:0
''' # Exploit title: Sysax Multi Server 6.40 ssh component denial of service vulnerability # Date: 29-8-2015 # Vendor homepage: http://www.sysax.com # Software Link: http://www.sysax.com/download/sysaxserv_setup.msi # Version: 6.40 # Author: 3unnym00
Photo Transfer (2) 1.0 iOS - Denial of Service Vulnerability
  日期:2015-08-31 18:07:56 点击:11 评论:0
Document Title: =============== Photo Transfer (2) v1.0 iOS - Denial of Service Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1580 Release Date: ============= 2015-08-20 Vulnerability Labo
freeSSHd 1.3.1 - Denial of Service Vulnerability
  日期:2015-08-31 18:05:35 点击:32 评论:0
''' # Exploit title: freesshd 1.3.1 denial of service vulnerability # Date: 28-8-2015 # Vendor homepage: http://www.freesshd.com # Software Link: http://www.freesshd.com/freeSSHd.exe # Version: 1.3.1 # Author: 3unnym00n # Details: # -----------------
BSIGN 0.4.5 - Buffer Overflow
  日期:2015-08-28 17:04:20 点击:42 评论:0
# Exploit Author: Juan Sacco - http://www.exploitpack.com jsacco@exploitpack.com # Program: bsign - embed and verify secure hashes and digital signatures # Tested on: GNU/Linux - Kali Linux 2.0 # # Description: BSIGN v0.4.5 and prior is prone to a st
FENIX 0.92 - Buffer Overflow
  日期:2015-08-28 17:03:36 点击:20 评论:0
# Exploit Author: Juan Sacco - http://www.exploitpack.com jsacco@exploitpack.com # Program: fenix - development environment for making 2D games # Tested on: GNU/Linux - Kali Linux 2.0 # # Description: FENIX v0.92 and prior is prone to a stack-based b
FHFS - FTP/HTTP File Server 2.1.2 Remote Command Execution
  日期:2015-08-28 17:02:18 点击:20 评论:0
#!/usr/bin/python # # FHFS - FTP/HTTP File Server 2.1.2 Remote Command Execution # # Author: Naser Farhadi # # Date: 26 August 2015 # Version: 2.1.2 # Tested on: Windows 7 SP1 (32 bit) # # Link : http://sourceforge.net/projects/fhfs/ # # Description
VLC Media Player 2.2.1 - m3u8/m3u Crash PoC
  日期:2015-08-27 14:36:07 点击:119 评论:0
#!/usr/bin/python # # VLC media player 2.2.1 m3u8/m3u Crash Proof Of Concept # # Author: Naser Farhadi # # Date: 25 August 2015 # Version: 2.2.1 # Tested on: Windows 7 SP1 (32 bit) # ## ModLoad: 71ae0000 71b64000 C:WindowsWinSxSx86_microsoft.windo
ZSNES 1.51 - Buffer Overflow
  日期:2015-08-27 14:34:48 点击:42 评论:0
# Exploit Author: Juan Sacco - http://www.exploitpack.comp jsacco@exploitpack.com # Tested on: GNU/Linux - Kali Linux 2.0 # Description: ZSNES v1.51 and prior is prone to a stack-based buffer overflow # vulnerability because the application fails to
Magento Add Administrator Account
  日期:2015-08-27 14:02:22 点击:128 评论:0
###################################################################################################Exploit Title : Magento Shoplift exploit (SUPEE-5344)#Author : Manish Kishan Tanwar AKA error1046#Date : 25/08/2015#Love to : zero cool,Team indishell
Firefox PDF.js Privileged Javascript Injection
  日期:2015-08-25 18:11:25 点击:49 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::Brow
GOM Audio 2.0.8 - (.gas) Crash POC
  日期:2015-08-25 18:10:15 点击:21 评论:0
******************************************************************************************** # Exploit Title: GOM Audio 2.0.8 Crash POC # Date: 8/24/2015 # Exploit Author: Un_N0n # Software Vendor : http://audio.gomlab.com/ # Software Link: http://au
Mock SMTP Server 1.0 Remote Crash PoC
  日期:2015-08-25 18:09:18 点击:38 评论:0
#!/usr/bin/python # Exploit Title: Mock SMTP Server 1.0 Remote Crash PoC # Date: 23-08-2015 # Exploit Author: Shankar Damodaran # Author's Twitter : @sh4nx0r # Vendor Homepage: http://mocksmtpserver.codeplex.com # Software Link: http://mocksmtpserver
Easy Address Book Web Server 1.6 - USERID Remote Buffer Overflow
  日期:2015-08-25 18:08:11 点击:22 评论:0
#!/usr/bin/python # Exploit Title: Easy Address Book Web Server 1.6 - USERID Remote Buffer Overflow # Version: 1.6 # Date: 2015-08-23 # Author: Tracy Turben ( tracyturben@gmail.com ) # Software Link: http://www.efssoft.com/ # Tested on: Win7x32-EN,Wi
Easy File Sharing Web Server 6.9 - USERID Remote Buffer Overflow
  日期:2015-08-25 18:07:27 点击:60 评论:0
#!/usr/bin/python # Exploit Title: Easy File Sharing Web Server v6.9 - USERID Remote Buffer Overflow # Version: 6.9 # Date: 2015-08-22 # Author: Tracy Turben ( tracyturben@gmail.com ) # Software Link: http://www.efssoft.com/ # Tested on: Win7x32-EN,W
Multiple ChiefPDF Software 2.0 - Buffer Overflow
  日期:2015-08-25 18:06:08 点击:46 评论:0
#!/usr/bin/python #Exploit Title:ChiefPDF Software Buffer Overflow #vulnerable programs: #PDF to Image Converter 2.0 #PDF to Image Converter Free 2.0 #PDF to Tiff Converter 2.0 #PDF to Tiff Converter Free 2.0 #Software Link:http://www.soft32.com/publ
共637页/12733条记录 首页 上一页 [135] [136] [137] 138 [139] [140] [141] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved