首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
RealPlayer Heap-based Buffer Overflow Vulnerability
  日期:2013-12-23 11:27:41 点击:34 评论:0
= 1.0 ? PACKAGE TITLE resto/ TITLE ACTION import,replace/ ACTION SERVER LOCATION %fid/ LOCATION / SERVER TARGET resto/ TARGET TRACKLIST LISTID 1/ LISTID TRACK TRACKID 1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Traidnt Upload 3 Add Administrator
  日期:2013-12-18 10:31:12 点击:93 评论:0
#!/usr/bin/pythonimport urllib2import sysprint +-------------------------------------------+| Traidnt upload 3 - Admin add Exploit || By i-Hmx || sec4ever.com || n0p1337@gmail.com |+-------------------------------------------+target=str(raw_input([*
MS13-101 Windows Kernel win32k.sys - Integer Overflow
  日期:2013-12-18 10:29:18 点击:73 评论:0
Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Divide Error in Windows Kernel 1. *Advisory Information* Title: Divide Error in Windows Kernel Advisory ID: CORE-2013-0807 Advisory URL: http://www.coresecurity.com/advisories/divid
QuickHeal AntiVirus 7.0.0.1 - Stack Overflow Vulnerability
  日期:2013-12-18 10:26:51 点击:40 评论:0
Document Title: =============== QuickHeal AntiVirus 7.0.0.1 - Stack Overflow Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1171 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-67
Microsoft Windows ndproxy.sys Local Privilege Escalation
  日期:2013-12-18 10:23:36 点击:108 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'rex' class Metasploit3 Msf::Exploit::Local Rank = AverageRanking include Msf::Post::
Nvidia (nvsvc) Display Driver Service Local Privilege Escalation
  日期:2013-12-18 10:22:26 点击:352 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'rex' require 'msf/core/post/common' require 'msf/core/post/windows/priv' require 'msf
Ability Mail Server 2013 (3.1.1) - Stored XSS
  日期:2013-12-18 10:21:52 点击:29 评论:0
#!/usr/bin/env python ''' Exploit Title: Ability Mail Server 2013 Stored XSS Date: 12/20/2013 Exploit Author: David Um Vendor Homepage: http://www.code-crafters.com/ Software Link: http://download.code-crafters.com/ams.exe Version: 3.1.1 Tested on:
Adobe Reader ToolButton Use After Free
  日期:2013-12-18 10:18:30 点击:95 评论:0
require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::BrowserExploitServer def initialize(info={}) super(update_info(info, 'Name' = Adobe Reader ToolButton Use After Free , 'Description' = %q {
VUPlayer 2.49 - (.M3U) Universal Buffer Overflow (DEP Bypass)
  日期:2013-12-17 11:19:38 点击:54 评论:0
# VUPlayer 2.49 (.M3U) Exploit(Universal buffer overflow/DEP bypass) # Download: http://vuplayer.com/ # Tested on Wind0ws XP SP3 DEP:OptOut # Author: Lu_c_fer ------ Lu_c_fer@aol.com , Twitter.com/lu_cif_er (feel free to tell me your ideas!! :)) # A
PotPlayer 1.5.42509 Beta - DOS (Integer Division by Zero Exploit)
  日期:2013-12-17 11:17:15 点击:55 评论:0
########################################################### #[~] Exploit Title:PotPlayer 1.5.42509 Beta - DOS(Integer Division by Zero #Exploit) #[~] Author: sajith #[~] version: PotPlayer 1.5.42509 Beta #[~]Vendor Homepage: http://daumpotplayer.com
iScripts AutoHoster PHP Code Injection
  日期:2013-12-16 10:06:28 点击:130 评论:0
?php/*[+] iScripts AutoHoster[+] Multiple vulnerabilities , PHP Code injection Exploit[+] Author : i-Hmx[+] n0p1337@gmail.com[+] sec4ever.com , 1337s.ccI.Sql Injection Vuln/checktransferstatus.phpTable name : submit=fariscmbdomain=i-Hmx' /*!1337unio
Ability Web Server(ftp) - Remote Buffer Overflow Exploit
  日期:2013-12-16 10:04:44 点击:120 评论:0
#!/usr/bin/python #==================================================== # Exploit Title : Ability Web Server(ftp) Remote Buffer Overflow Exploit # Author : JoKeR_StEx # Version : 2.34 # 3 Algeria 3 #==================================================
Castripper 2.50.70 - (.pls) DEP Exploit
  日期:2013-12-13 11:01:02 点击:46 评论:0
# Castripper 2.50.70 (.pls) exploit (Stack buffer overflow/DEP bypass) # Download: http://www.mini-stream.net/castripper/ # Tested on Wind0ws XP SP3 DEP:OptOut # Author: Lu_c_fer ------ Lu_c_fer@aol.com # All ROP gadgets are from the APP's DLLs exce
Cisco Unified Communications Manager - TFTP Service
  日期:2013-12-13 10:58:01 点击:35 评论:0
#!/bin/bash ####################################################################### # Proof of Concept on how to get tftp config files from cisco phones # # This can be performed anonymously and privileges gathered relies on # # those assigned to th
Divide Error In Windows Kernel Vulnerability
  日期:2013-12-13 10:55:54 点击:259 评论:0
Divide Error in Windows Kernel 1. *Advisory Information* Title: Divide Error in Windows Kernel Advisory ID: CORE-2013-0807 Advisory URL: http: //www.coresecurity.com/advisories/divide-error-in-windows-kernel Date published: 2013-12-11 Date of last u
EMC Data Protection Advisor DPA Illuminator EJBInvokerServlet RCE
  日期:2013-12-12 14:22:02 点击:48 评论:0
EMC Data Protection Advisor DPA Illuminator EJBInvokerServlet RCE
Adobe ColdFusion 9 Administrative Login Bypass
  日期:2013-12-12 14:22:02 点击:54 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Msf::E
HP LoadRunner EmulationAdmin Web Service Directory Traversal
  日期:2013-12-12 14:22:02 点击:73 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'rexml/document' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking HttpFi
vBulletin index.php/ajax/api/reputation/vote nodeid Parameter SQL Injection
  日期:2013-12-11 10:24:58 点击:151 评论:0
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpCl
ad GOM Player 2.2.53.5169 - SEH Buffer Overflow (.reg)
  日期:2013-12-11 10:22:27 点击:147 评论:0
#!/usr/bin/perl ###################################################################################################### # Exploit Title: GOM Player 2.2.53.5169 - SEH Buffer Overflow (.reg) # Date: 11-26-2013 # Exploit Author: Mike Czumak (T_v3rn1x) -
共637页/12733条记录 首页 上一页 [187] [188] [189] 190 [191] [192] [193] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved