首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Ninja Privilege Escalation Detection and Prevention System 0.1.3 - Race Conditio
  日期:2015-04-30 14:27:47 点击:20 评论:0
#[Title] Ninja privilege escalation detection and prevention system race condition #[Author] Ben 'highjack' Sheppard #[URL] http://highjack.github.io/ #[Description] There is a small delay between the time of execution of a command and the time priv
i.FTP 2.21 SEH Overflow Crash PoC
  日期:2015-04-29 11:34:32 点击:30 评论:0
# iFTP 2.21 SEH overwritten Crash PoC # Author: Avinash Kumar Thapa -Acid # Date of Testing : 28th April'2015 # Vendor's home page: http://www.memecode.com/iftp.php # Software's Url: http://www.memecode.com/data/iftp-win32-v2.21.exe # Crash Point: G
VideoSpirit Pro 1.91 Buffer Overflow
  日期:2015-04-28 14:05:23 点击:249 评论:0
#!/usr/bin/python# Exploit Title: VideoSpirit Pro v1.91 # Date: 27/April/2015# Author: @evil_comrade IRC freenode: #vulnhub or #offsec or #corelan# email: kwiha2003@yahoo.com # Version: 1.91# Tested on: Win XP3 and Win 7#Vendor: http://www.verytools
Encaps PHP/Flash Gallery 2.3.22s Database DoS
  日期:2015-04-28 14:02:36 点击:130 评论:0
Hi guys,#ref: http://www.milw00rm.com/exploits/5179#!/usr/bin/perl -w#Title: Encaps PHP/Flash Gallery 2.3.22s Database Puffing Up Exploit#Vendor : http://www.encaps.net#Download: http://sourceforge.net/projects/encapsnet/files/#Author: ZoRLu / zorlu
Legend Perl IRC Bot Remote Code Execution Exlpoit
  日期:2015-04-28 14:01:31 点击:66 评论:0
# # legend_rce.py # Legend Perl IRC Bot Remote Code Execution PoC # author: Jay Turla ( @shipcod3 ) # description: This is a RCE PoC for Legend Bot which has been used in the Shellshock spam October 2014. # reference: http://www.csoonline.com/articl
MiniUPnPd 1.0 - Stack Overflow RCE for AirTies RT Series (MIPS) Exploit
  日期:2015-04-28 14:00:23 点击:148 评论:0
#!/usr/bin/env python # Exploit Title: MiniUPnPd 1.0 Stack Overflow RCE for AirTies RT Series # Date: 26.04.2015 # Exploit Author: Onur ALANBEL (BGA) # Vendor Homepage: http://miniupnp.free.fr/ # Version: 1.0 # Architecture: MIPS # Tested on: AirTie
UniPDF Version 1.2 - 'xml' Buffer Overflow Crash PoC
  日期:2015-04-28 13:59:10 点击:22 评论:0
# Exploit Title: UniPDF v1.2 BufferOverflow, SEH overwrite DoS PoC # Author : Avinash Kumar Thapa -Acid # Date of Testing : 25th April 2015 # Tested On : Windows XP- Service Pack 3 Windows 7 Home Basic # Vendor Homepage: http://unipdf.com/ # Softwar
Free MP3 CD Ripper 2.6 2.8 (.wav) - SEH Based Buffer Overflow (W7 - DEP Bypass)
  日期:2015-04-28 13:58:17 点击:32 评论:0
#!/usr/bin/python # credit to ThreatActor at CoreRed.com # Tested on: Windows 7 Ultimate X64 # Added DEP Bypass to the exploit # naxxo (head@gmail.com) import struct def create_rop_chain(): # rop chain generated with mona.py - www.corelan.be rop_gad
OTRS < 3.1.x & < 3.2.x & < 3.3.x - Stored Cross-Site Scripting (XSS) Vulnerabili
  日期:2015-04-28 13:32:57 点击:23 评论:0
# Exploit Title: Stored Cross-Site Scripting (XSS) in OTRS # Date: 28.01.2014 # Exploit Author: Adam Ziaja http://adamziaja.com # Vendor Homepage: https://www.otrs.com # Version: 3.1.x before 3.1.20, 3.2.x before 3.2.15, and 3.3.x before 3.3.5 # CVE
WordPress WPshop eCommerce 1.3.9.5 Shell Upload
  日期:2015-04-27 14:06:53 点击:41 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::HTTP::Wordpress includ
WordPress InBoundio Marketing 2.0 Shell Upload
  日期:2015-04-27 14:05:49 点击:30 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::HTTP::Wordpress includ
Quick Search 1.1.0.189 - 'search textbox' Unicode SEH egghunter Buffer Overflow
  日期:2015-04-27 14:01:19 点击:500 评论:0
#!/usr/bin/perl ###########################################################################= ####################### # Exploit Title: Quick Search 1.1.0.189 'search textbox' Unicode SEH egghunter Buffer Overflow # Date: 2015-04-23 # Exploit Author:
Free MP3 CD Ripper 2.6 2.8 (.wav) - SEH Based Buffer Overflow
  日期:2015-04-24 10:52:43 点击:240 评论:0
#!/usr/bin/env perl # original p0c https://www.exploit-db.com/exploits/36465/ # credit to TUNISIAN CYBER # however he was attemping to vanilla buffer overflow # in fact it is SEH based exploit # using the address 0x7C9D30D7 is limit the targets #whi
Ubuntu usb-creator 0.2.x - Local Privilege Escalation
  日期:2015-04-24 10:47:24 点击:40 评论:0
Source: http://www.openwall.com/lists/oss-security/2015/04/22/12 Bug report: https://bugs.launchpad.net/ubuntu/vivid/+source/usb-creator/+bug/1447396 Ubuntu Precise (12.04LTS) = usb-creator: 0.2.38.3ubuntu (Patched in: 0.2.38.3ubuntu0.1) Ubuntu Trus
ZYXEL P-660HN-T1H_IPv6 Remote Configuration Editor / Web Server DoS
  日期:2015-04-24 10:44:18 点击:120 评论:0
?php/*Exploit Title : ZYXEL remote configuration editor / Web Server DoSDate : 23 April 2015Exploit Author : Koorosh GhorbaniSite : http://8thbit.net/Vendor Homepage : http://www.zyxel.com/Platform : Hardware Tested On : ZyXEL P-660HN-T1H_IPv6Firmwa
ProFTPd CPFR / CPTO Proof Of Concept
  日期:2015-04-23 10:37:25 点击:34 评论:0
'''*** for educational purpouse ONLY! ***c0ded by daldana. (daniel.aldana.moreno ___at__ gmail.com)please, first read https://github.com/chcx/cpx_proftpd/'''import sysfrom ftplib import FTP def main(argv):if len(argv) == 4:ip = argv[1]src = argv[2]d
MooPlayer 1.3.0 'm3u' SEH Buffer Overflow
  日期:2015-04-23 10:27:31 点击:44 评论:0
#!/usr/bin/perl ###########################################################################= ################################# # Exploit Title: MooPlayer 1.3.0 'm3u' SEH Buffer Overflow # Date: 09-02-2015 # Exploit Author: Tomislav Paskalev # Vulner
Wolf CMS 0.8.2 Arbitrary File Upload Exploit
  日期:2015-04-23 10:25:23 点击:58 评论:0
?php /* ,--^----------,--------,-----,-------^--, | ||||||||| `--------' | O .. CWH Underground Hacking Team .. `+---------------------------^----------| `_,-------, _________________________| / XXXXXX /`| / / XXXXXX / ` / / XXXXXX /______( / XXX
ProFTPd 1.3.5 - Remote Command Execution Exploit
  日期:2015-04-22 10:52:58 点击:109 评论:0
# Title: ProFTPd 1.3.5 Remote Command Execution # Date : 20/04/2015 # Author: R-73eN # Software: ProFTPd 1.3.5 with mod_copy # Tested : Kali Linux 1.06 # CVE : 2015-3306 # Greetz to Vadim Melihow for all the hard work . import socket import sys impo
OpenBSD 5.6 - Multiple Local Kernel Panics Exploit
  日期:2015-04-22 10:50:32 点击:33 评论:0
/* # Exploit Title: OpenBSD = 5.6 - Multiple Local Kernel Panics # Exploit Author: nitr0us # Vendor Homepage: http://www.openbsd.org # Version: 5.6 # Tested on: OpenBSD 5.6 i386 (snapshot - Nov 25th, 2014), OpenBSD 5.6 i386, OpenBSD 5.5 i386 * - 0xb
共637页/12733条记录 首页 上一页 [145] [146] [147] 148 [149] [150] [151] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved