首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Mp3info Stack Buffer Overflow
  日期:2014-01-28 11:26:40 点击:35 评论:0
# Waste of CPU clock N2# Exploit for: mp3info! Latest version# Author: jsacco - jsacco@exploitpack.com# Vendor: http://ibiblio.org/mp3info/# No-one-cares-about programs!junk = "x90x90x90x90"*8 shellcode = "x31xc0x50x68//shx68/binx89xe3x50
Ammyy Admin 3.2 - Authentication Bypass
  日期:2014-01-26 10:22:57 点击:122 评论:0
Title: ==== Ammyy Admin - Hidden hard-coded option and Access Control vulnerability. Credit: ====== Name: Bhadresh Patel Company/affiliation: Cyberoam Technologies Private Limited Website: www.cyberoam.com CVE: ==== - CVE-2013-5581 for hidden hard-c
Daum Game 1.1.0.5 ActiveX (IconCreate Method) - Stack Buffer Overflow
  日期:2014-01-26 10:21:30 点击:51 评论:0
!-- Trustwave SpiderLabs Security Advisory TWSL2014-002: Buffer Overflow Vulnerability in DaumGame ActiveX Published: 01/07/2014 Version: 1.1 Vendor: Daum (daum.net) Product: Daum Game ActiveX Version affected: 1.1.0.5, 1.1.0.4 Product description:
MW6 Technologies MaxiCode ActiveX (Data param) - Buffer Overflow
  日期:2014-01-26 10:20:36 点击:137 评论:0
!-- =========================================================================== Problem: The Data parameter is subject to a buffer overflow DEFINITELY leading to arbitrary code execution. COM Object - {2355C601-37D1-42B4-BEB1-03C773298DC8} MW6MaxiCo
MW6 Technologies DataMatrix ActiveX (Data param) - Buffer Overflow
  日期:2014-01-26 10:19:28 点击:39 评论:0
!-- =========================================================================== Problem: The Data parameter is subject to a buffer overflow PROBABLY leading to arbitrary code execution. COM Object - {DE7DA0B5-7D7B-4CEA-8739-65CF600D511E} MW6DataMatr
MW6 Technologies Aztec ActiveX (Data param) - Buffer Overflow
  日期:2014-01-26 10:17:50 点击:177 评论:0
!-- =========================================================================== Problem: The Data parameter is subject to a buffer overflow DEFINITELY leading to arbitrary code execution. COM Object - {F359732D-D020-40ED-83FF-F381EFE36B54} MW6Aztec
NCH Software Express Burn Plus 4.68 Buffer Overflow
  日期:2014-01-22 14:57:14 点击:54 评论:0
#!/usr/local/bin/perl### NCH Software Express Burn Plus 4.68 EBP Project File Handling Buffer Overflow PoC### Vendor: NCH Software# Product web page: http://www.nchsoftware.com# Affected version: 4.68## Summary: Express Burn is a program that allows
HP Data Protector Backup Client Service Directory Traversal
  日期:2014-01-21 12:09:38 点击:51 评论:0
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Tcp includ
ASUS RT-N56U Remote Root
  日期:2014-01-21 12:07:32 点击:63 评论:0
#!/usr/bin/env python from time import sleepfrom sys import exitimport urllib2, signal, struct, base64, socket, ssl # [*] Title: ASUS RT-N56U Remote Root Shell Exploit - apps_name# [*] Discovered and Reported: October 2013# [*] Discovered/Exploited
Ammyy Admin 3.2 Access Bypass
  日期:2014-01-21 12:06:35 点击:67 评论:0
Title:====Ammyy Admin - Hidden hard-coded option and Access Control vulnerability.Credit:======Name: Bhadresh PatelCompany/affiliation: Cyberoam Technologies Private LimitedWebsite: www.cyberoam.comCVE:====- CVE-2013-5581 for hidden hard-coded optio
MuPDF 1.3 - Stack-based Buffer Overflow in xps_parse_color()
  日期:2014-01-21 12:01:59 点击:99 评论:0
============================================================= 0day - MuPDF Stack-based Buffer Overflow in xps_parse_color() ============================================================= # Date of discovery: 2013-01-26 # Software Links: http://www.mu
haneWIN DNS Server 1.5.3 - Denial of Service
  日期:2014-01-20 10:21:40 点击:61 评论:0
########################################################### [~] Exploit Title: haneWIN DNS Server 1.5 . 3 - Denial of service [~] Author: sajith [~] version: haneWIN DNS Server 1.5 . 3 [~]Vendor Homepage: http: / / www.hanewin.net / [~] vulnerable a
SoapUI 4.6.3 - Remote Code Execution
  日期:2014-01-15 10:42:53 点击:75 评论:0
# Exploit Title: SoapUI Remote Code Execution # Date: 25.12.13 # Exploit Author: Barak Tawily # Vendor Homepage: http://www.soapui.org/ http://www.soapui.org/ # Software Link: http://www.soapui.org/Downloads/download-soapui-pro-trial.html http://www
SerComm Device Remote Code Execution
  日期:2014-01-13 10:08:31 点击:40 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Tcp i
SerComm Device Remote Code Execution Vulnerability
  日期:2014-01-13 10:05:40 点击:45 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Tcp i
Ofilter Player 1.1 - (.wav) Integer Division by Zero
  日期:2014-01-09 11:11:25 点击:49 评论:0
?php /* *Title: Ofilter Player 1.1 (.wav) Integer Division by Zero *Version: 1.1 *Tested on: Windows XP SP2 en *Vendor: http://www.008soft.com/ *Software Link: http://www.008soft.com/downloads_OfilterPlayer.exe *E-Mail: OsandaJayathissa@gmail.com *B
ACE Stream Media 2.1 - (acestream://) Format String Exploit PoC
  日期:2014-01-09 11:10:43 点击:182 评论:0
ACE Stream Media 2.1 (acestream://) Format String Exploit PoC Vendor: ACE Stream Product web page: http://www.acestream.org Affected version: Ace Player HD 2.1.9 (VLC 2.0.5) Summary: Ace Stream is an innovative multimedia platform of a new generatio
CCProxy 7.3 - Integer Overflow Exploit
  日期:2014-01-09 11:09:42 点击:34 评论:0
#!/usr/bin/env python # Exploit Title: CCProxy v7.3 Integer Overflow Exploit # Date: 2013/03/22 # Author: Mr.XHat # E-Mail: Mr.XHat {AT} GMail.com # Vendor Homepage: http://www.youngzsoft.net/ # Software Link: http://user.youngzsoft.com/ccproxy/upda
vTiger CRM SOAP AddEmailAttachment Arbitrary File Upload
  日期:2014-01-08 14:43:25 点击:74 评论:0
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rexml/document'class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include REXM
Total Video Player Denial Of Service
  日期:2014-01-06 11:46:48 点击:26 评论:0
###################################################################################################### Total Video Player (.rmvb) Local Crash P.O.C######################################################################################################
共637页/12733条记录 首页 上一页 [185] [186] [187] 188 [189] [190] [191] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved