首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Mutiny Remote Command Execution
  日期:2013-03-25 10:53:46 点击:24 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
Mageia Release 2 sock_diag_handlers Local Root
  日期:2013-03-25 10:47:27 点击:82 评论:0
/* Exploit Title: Mageia release 2 (32bit) sock_diag_handlers Local root exploit Date: 22-03-2013 Exploit Author: y3dips@echo.or.id | @y3dips Vendor Homepage: http://www.mageia.org/en/ Software Link: http://www.mageia.org/en/downloads/ Version: Mage
Apache Struts ParametersInterceptor Remote Code Execution
  日期:2013-03-22 12:35:03 点击:93 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
EastFTP ActiveX Control 0Day
  日期:2013-03-21 11:57:48 点击:64 评论:0
################################################################# # # EastFTP ActiveX Control 0Day # By: Dr_IDE # Vendor Homepage:http://www.ftpocx.com/download.htm # Version: 4.6.02 # # Self Promotion: http://irresponsibledisclosure.blogspot.com ##
TP-Link TL-WR740N Wireless Router Remote Denial Of Service
  日期:2013-03-21 11:56:30 点击:538 评论:0
#!/usr/local/bin/perl### TP-Link TL-WR740N Wireless Router Remote Denial Of Service Exploit### Vendor: TP-LINK Technologies Co., Ltd.# Product web page: http://www.tp-link.us## Affected version:## - Firmware version: 3.16.4 Build 130205 Rel.63875n (
BlazeVideo HDTV Player 6.6.0.2 Buffer Overflow
  日期:2013-03-21 11:55:15 点击:64 评论:0
# Exploit Title:BlazeVideo HDTV Player Standard 6.6.0.2 SEH Buffer Overflow# Date: 19-03-2013# Exploit Author: metacom# RST# Vendor Homepage: http://www.blazevideo.com/hdtv-player/# Download version 6.6.0.2: www.blazevideo.com/download.php?product=b
Cool PDF Image Stream Buffer Overflow
  日期:2013-03-20 16:05:17 点击:97 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
Sami FTP Server 2.0.1 PUT Command Buffer Overflow
  日期:2013-03-20 16:04:08 点击:98 评论:0
#!/usr/bin/python# Exploit Title: Sami FTP Server 2.0.1 PUT Command Buffer overflow (DEP Bypass)# Date: 17 Mar 2013# Exploit Author: ne0z# Vendor Homepage: http://www.hatsecure.com# Version: Sami FTP Server 2.0.1# Tested on: Windows XP Professional
Sami FTP Server LIST Command Buffer Overflow
  日期:2013-03-20 16:02:58 点击:69 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.#http://metasploit.com/framework/##
OpenPLI Webif Arbitrary Command Execution Vulnerability
  日期:2013-03-18 13:35:15 点击:449 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
Nitro Pro 8.0.3.1 - Crash PoC
  日期:2013-03-18 13:34:15 点击:30 评论:0
#!C:Python27python.exe # Exploit Title: Nitro Pro 8.0.3.1 - DoS # Date: 2012-10-07 # Exploit Author: John Cobb # Author Homepage: www.NoBytes.com # Vendor Homepage: www.nitropdf.com # Version: 8.0.3.1 # Tested on: Win7 64bit # CVE : None # When th
Google Chrome 21.0.1180.57 NULL Pointer
  日期:2013-03-15 12:15:42 点击:111 评论:0
---| overviewVulnerability: Chrome Null Pointer in InspectDataSource::StartDataRequestDate: 03/14/2012Author: @HeyderAndrade (heyder.andrade[at]gmail[dot]com)Chrome Version: = 21.0.1180.57 stableOperating System Tested: Win XP SP2, WIN7, Mac OS X 10
Fedora Linux SOCK_DIAG Local Root
  日期:2013-03-15 12:09:28 点击:349 评论:0
/* * CVE-2013-1763 SOCK_DIAG bug in kernel 3.3-3.8 * This exploit uses nl_table to jump to a known location */ #include unistd.h #include sys/socket.h #include linux/netlink.h #include netinet/tcp.h #include errno.h #include linux/if.h #include linu
Ruby Gem Curl Command Execution
  日期:2013-03-14 11:17:13 点击:74 评论:0
Curl Ruby Gem Remote command execution3/12/2013https://github.com/tg0/curlSpecially crafted URLs can result in remote code execution:In ./lib/curl.rb the following lines:131 cmd = curl #{cookies_store} #{browser_type} #{@setup_params} {ref} {url}
Ruby Gem Minimagic Command Execution
  日期:2013-03-14 11:16:36 点击:81 评论:0
MiniMagic ruby gem remote code execution 3/12/2013https://github.com/hcatlin/mini_magickA ruby wrapper for ImageMagick or GraphicsMagick command line.Tested on both Ruby 1.9.2 and Ruby 1.8.7.If a URL is from an untrusted source, commands can be inje
Ruby Gem Fastreader 1.0.8 Command Execution
  日期:2013-03-14 11:15:21 点击:57 评论:0
Ruby gem fastreader-1.0.8 remote code exec3/6/2013https://rubygems.org/gems/fastreaderif the url contains any ; characters code will be executed as the user when a web browser is launched.for example if fastreader is fed http://www.g;id;.com id will
Linux Kernel 'SCTP_GET_ASSOC_STATS()' - Stack-Based Buffer Overflow
  日期:2013-03-14 11:13:15 点击:74 评论:0
#include stdio.h #include string.h #include netinet/in.h #include sys/socket.h #define SCTP_GET_ASSOC_STATS 112 #define SOL_SCTP 132 int main(void) { char *buf = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Microsoft Office PowerPoint 2007 Memory Corruption
  日期:2013-03-14 11:10:01 点击:37 评论:0
#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0#0 _ __ __ __ 1#1 /' __ /'__` / __ /'__` 0#0 /_, ___ /_/_ ___ ,_/ / _ ___ 1#1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0#0 / /
Honeywell HSC Remote Deployer ActiveX Remote Code Execution
  日期:2013-03-12 11:22:10 点击:62 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
Fedora Ubuntu kernel 3.3-3.8 Local Root poc(CVE-2013-1763 )
  日期:2013-03-12 11:21:05 点击:183 评论:0
/* * quick'n'dirty poc for CVE-2013-1763 SOCK_DIAG bug in kernel 3.3-3.8 * bug found by Spender * poc by SynQ * * hard-coded for 3.5.0-17-generic #28-Ubuntu SMP Tue Oct 9 19:32:08 UTC 2012 i686 i686 i686 GNU/Linux * using nl_table-hash.rehash_time,
共637页/12733条记录 首页 上一页 [213] [214] [215] 216 [217] [218] [219] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved