首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Nginx 1.3.9 / 1.4.0 Buffer Overflow
  日期:2013-07-19 13:51:42 点击:47 评论:0
# encoding: ASCIIabort(#{___FCKpd___0} host port) if ARGV.length 2require 'ronin'$count = 0# rop address taken from nginx binary (find in the repo)poprdi = 0x00427006 poprsi = 0x0043a00e poprdx = 0x0041b8fa poprax = 0x00442c80 mmap64 = 0x4029b0mmapg
Apple Quicktime 7 Invalid Atom Length Buffer Overflow
  日期:2013-07-19 13:50:29 点击:40 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
HP Managed Printing Administration jobAcct Remote Command Execution
  日期:2013-07-19 13:49:22 点击:39 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
Windows Movie Maker Version 2.1.4026.0 (.wav) - Crash POC
  日期:2013-07-19 13:47:02 点击:58 评论:0
# Exploit Title: Windows Movie Maker Version 2.1.4026.0 (.wav) - Crash POC # Date: 16-07-2013 # Exploit Author: ariarat # Vendor Homepage: http://www.microsoft.com # Software Link: included in windows xp sp2 and sp3 # Version: 2.1.4026.0 # Tested on:
Symantec Workspace Virtualization 6.4.1895.0 Local Kernel Mode Privilege Escalat
  日期:2013-07-19 13:45:47 点击:126 评论:0
# Symantec Workspace Virtualization 6.4.1895.0 Local Kernel Mode Privilege Escalation Exploit # Date: 2013-7-17 # Author : MJ0011 # Version: Symantec Workspace Virtualization 6.4.1895.0 # Tested on: Windows XP SP3 DETAILS: In fslx.sys 's hook functio
Microsoft Office PowerPoint 2007 - Crash PoC
  日期:2013-07-18 16:50:04 点击:62 评论:0
# Title : Microsoft Office PowerPoint 2007 Crash PoC # Date: 2013-01-12 # Software Link: http://office.microsoft.com/ # Author: Asesino04 # Tested on: Windows XP SP2 # Special Thanks To : Ness Oum El Bouaghi # Bug Description: when you insert a soun
BlazeDVD Pro player 6.1 - Stack Based Buffer Overflow (Direct Ret)
  日期:2013-07-18 16:49:34 点击:83 评论:0
#!/usr/bin/perl # BlazeDVD Pro player 6.1 Local stack based buffer overflow # Author: PuN1sh3r # Email: luiguibiker@gmail.com # Date: Mon Jul 15 03:01:37 EDT 2013 # Vendor link: http://www.blazevideo.com/download.htmm # Software Link: http://www.bla
Eglibc PTR MANGLE Bug
  日期:2013-07-17 10:54:16 点击:34 评论:0
/* * $FILE: bug-mangle.c * * Comment: Proof of concept * * $VERSION$ * * Author: Hector Marco hecmargi@upv.es * Ismael Ripoll iripoll@disca.upv.es * * $LICENSE: * This program is free software; you can redistribute it and/or modify * it under the te
Kate's Video Toolkit Version 7.0 (.wav) - Crash POC
  日期:2013-07-17 10:52:11 点击:61 评论:0
# Exploit Title: Kate's Video Toolkit Version 7.0 (.wav) - Crash POC # Date: 14-07-2013 # Exploit Author: ariarat # Vendor Homepage: http://fakewebcam.com/Free-Video-Toolkit.asp # Software Link: http://download.cnet.com/Kate-s-Video-Toolkit/3000-2139
Light Audio Mixer Version 1.0.12 (.wav) - Crash POC
  日期:2013-07-17 10:51:26 点击:30 评论:0
# Exploit Title: Light Audio Mixer Version 1.0.12 (.wav) - Crash POC # Date: 14-07-2013 # Exploit Author: ariarat # Software Link: http://download.cnet.com/Light-Audio-Mixer/3000-2139_4-10791607.html # Version: 1.0.12 # Tested on: [ Windows XP sp3]
rpcbind (CALLIT Procedure) UDP Crash PoC
  日期:2013-07-17 10:49:11 点击:100 评论:0
#!/usr/bin/ruby # # rpcbind_udp_crash_poc.rb # 07/15/2013 # Sean Verity veritysr1980 [at] gmail.com # CVE 2013-1950 # # rpcbind (CALLIT Procedure) UDP Crash PoC # Affected Software Package: rpcbind-0.2.0-19 # # Tested on: # Fedora 17 (3.9.8-100.fc17
Squid-3.3.5 DoS PoC
  日期:2013-07-16 10:31:21 点击:50 评论:0
#Squid Crash PoC#Copyright (C) Kingcope 2013#tested against squid-3.3.5#this seems to be the patch for the vulnerability:# http://www.squid-cache.org/Versions/v3/3.3/squid-3.3.8.patch #The squid-cache service will respawn, looks like a kind of asser
MediaCoder 0.8.23.5530 SEH Buffer Overflow Vulnerability
  日期:2013-07-15 18:13:54 点击:46 评论:0
#!/usr/bin/python print [+]Exploit Title: Mediacoder 0.8.23.5530 SEH Buffer Overflow [+]Download All Product: http://www.mediacoderhq.com/editions.html [+]Vulnerable Product:! [+]Mediacoder 0.8.23.5530 [+]Vulnerabilities File Format:lst,m3u [+]Other
MediaCoder .M3U Buffer Overflow Vulnerability
  日期:2013-07-15 18:12:36 点击:30 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
Microsoft Windows Authenticated Powershell Command Execution
  日期:2013-07-15 18:10:41 点击:66 评论:0
# -*- coding: binary -*- ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metaspl
Corel PDF Fusion Stack Buffer Overflow
  日期:2013-07-15 18:07:28 点击:64 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/c
Tri-PLC Nano-10 r81 - Denial of Service
  日期:2013-07-15 18:05:51 点击:86 评论:0
# Exploit Title: Tri-PLC Nano-10 DoS # Date: 07/11/2013 # Exploit Author: Sapling # Vendor Homepage: www.tri-plc.com # Version: Firmware Version r81 and prior # CVE : CVE-2013-2784 # ICSA: ICSA-13-189-02 /* The vulnerability exists due to a flaw in t
Ultra Mini HTTPD 1.21 - Stack Buffer Overflow
  日期:2013-07-12 10:59:46 点击:92 评论:0
# Exploit Title: Ultra Mini HTTPD stack buffer overflow # Date: 10 July 2013 # Exploit Author: superkojiman - http://www.techorganic.com # Vendor Homepage: http://www.picolix.jp/ # Software Link: http://www.vector.co.jp/soft/winnt/net/se275154.html
nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
  日期:2013-07-12 10:57:21 点击:157 评论:0
#nginx 1.3.9/1.4.0 x86 brute force remote exploit # copyright (c) 2013 kingcope #---------------------------- #fix for internet exploitation, set MTU: #ifconfig interface mtu 60000 up # ### # !!! WARNING !!! # this exploit is unlikely to succeed when
Jolix Media Player 1.1.0 (.m3u) - Denial of Service
  日期:2013-07-11 09:50:03 点击:48 评论:0
#!/usr/bin/python print [+]Judul Ledakan:Jolix Media Player (.m3u) Denial of Service Exploit [+]Celah versi: Version 1.1.0 [+]Mengunduh produk: http://www.jolixtools.com/downloads/jolix-media-player-setup.exe [+]Hari Tanggal Tahun: 09.07.2013 [+]Penu
共637页/12733条记录 首页 上一页 [201] [202] [203] 204 [205] [206] [207] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved