首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
HT Editor 2.0.20 Buffer Overflow (ROP PoC)
  日期:2012-11-14 15:23:27 点击:98 评论:0
#!/usr/bin/perl =head1 TITLE HT Editor 2.0.20 Buffer Overflow (ROP PoC) =head2 DESCRIPTION Since version 2.0.18, the stack overflow vulnerability has not been corrected, which I assume would make it 0day? I consequently recoded an exploit, as memory
Jira Scriptrunner 2.0.7 <= CSRF/RCE Exploit
  日期:2012-11-14 15:22:47 点击:235 评论:0
#[Author] Ben 'highjack' Sheppard #[Title] Jira Scriptrunner 2.0.7 = CSRF/RCE #[Twitter] @highjack_ #[Author Url] http://bensheppard.net/jira-scriptrunner-2-0-7/ #[Vendor Url] https://marketplace.atlassian.com/plugins/com.onresolve.jira.groovy.groov
Invision IP.Board 3.3.4 unserialize() PHP Code Execution
  日期:2012-11-14 15:20:56 点击:84 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'r
Java Applet JAX-WS Remote Code Execution
  日期:2012-11-13 17:23:41 点击:51 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'r
Smadav Anti Virus 9.1 Crash PoC
  日期:2012-11-13 17:21:54 点击:161 评论:0
# Exploit Title: Smadav AntiVirus - Crash PoC # Date: 10/Nov/2012 # Exploit Author: Mada R Perdhana ( mada@spentera.com ) / Spentera Research Team # Vendor Homepage: http://www.smadav.net http://www.smadav.web.id # Software Link: http://www.smadav.n
Zoner Photo Studio v15 Build 3 (Zps.exe) Registry Value Parsing Exploit
  日期:2012-11-13 17:21:08 点击:42 评论:0
#!/usr/bin/python # Exploit Title: Zoner Photo Studio v15 Build 3 (Zps.exe) Registry Value Parsing Local Buffer Overflow # Version: 15 Build 3, Build 2 # Date: 2012-11-09 # Author: Julien Ahrens # Homepage: http://www.inshell.net # Software Link: ht
Apache downloader patch auto Execution Vulnerability
  日期:2012-11-13 17:18:54 点击:52 评论:0
######################################################################### # Exploit Title: Apache downloader patch auto Execution Vulnerability # Date: [12-11-2012] # Author: Hacker Alajman # Tested on: [Windows 7 ]# 1337day Exploits DataBase 1337da
A-PDF All to MP3 Converter v.2.3.0 buffer overflow
  日期:2012-11-13 17:16:55 点击:47 评论:0
#!/usr/bin/python # Exploit Title: A-PDF All to MP3 Converter v.2.3.0 buffer overflow # Software Link: http://www.a-pdf.com/all-to-mp3/download.htm # Version: = 2.3.0 # Tested on: Win7 German # Date: 12/11/2012 # Author: metacom #details: Open the ap
Microsoft Visio 2010 memory corruption
  日期:2012-11-13 17:15:32 点击:119 评论:0
Title : Microsoft Visio 2010 memory corruptionVersion : Microsoft Visio Premium 2010 SP1Date : 2012-11-12Vendor : http://office.microsoft.comImpact : Med/HighContact : coolkaveh [at] rocketmail.comTwitter : @coolkavehtested : Windows XP SP3 ENG#####
Microsoft Publisher 2013 memory corruption
  日期:2012-11-13 17:13:47 点击:28 评论:0
Title : Microsoft Publisher 2013 memory corruptionVersion : Microsoft Office Publisher professional Plus 2013Date : 2012-11-11Vendor : http://office.microsoft.comImpact : Med/HighContact : coolkaveh [at] rocketmail.comTwitter : @coolkavehtested : Wi
Microsoft Office Excel 2013 memory corruption
  日期:2012-11-13 17:13:23 点击:194 评论:0
Title : Microsoft Office Excel 2013 memory corruption Version : Microsoft Office professional Plus 2013Date : 2012-11-10Vendor : http://office.microsoft.com Impact : Med/High Contact : coolkaveh [at] rocketmail.com Twitter : @coolkaveh tested : Wind
Zoner Photo Studio 15 Buffer Overflow
  日期:2012-11-09 09:37:52 点击:48 评论:0
Inshell Security Advisoryhttp://www.inshell.net1. ADVISORY INFORMATION-----------------------Product: Zoner Photo StudioVendor URL: www.zoner.comType: Stack-based Buffer Overflow [CWE-121]Date found: 2012-10-17Date published: 2012-11-09CVSSv2 Score:
Microsoft Office Excel 2007 WriteAV Vulnerability
  日期:2012-11-09 09:36:35 点击:44 评论:0
Title : Microsoft Office Excel 2007 WriteAV Vulnerability Version : Microsoft Office professional Plus 2007 SP2Date : 2012-11-08Vendor : http://office.microsoft.com Impact : Med/High Contact : coolkaveh [at] rocketmail.com Twitter : @coolkaveh teste
Invision Power Board 3.3.4 Unserialize REGEX Bypass
  日期:2012-11-08 10:36:20 点击:47 评论:0
?php/* So this is the patch that sanitizes,static public function safeUnserialize( $serialized ) { // unserialize will return false for object declared with small cap o // as well as if there is any ws between O and : if ( is_string( $serialized ) s
LibreOffice Suite 3.5.5.3 Denial Of Service
  日期:2012-11-08 10:32:33 点击:60 评论:0
Advisory ID: HTB23106 Product: LibreOffice Suite Vendor: LibreOffice Vulnerable Version(s): 3.5.5.3 and probably prior Tested Version: 3.5.5.3 Vendor Notification: July 26, 2012 Public Disclosure: October 31, 2012 Vulnerability Type: NULL Pointer De
GOM Video Converter Buffer Overflow
  日期:2012-11-08 10:31:28 点击:35 评论:0
#!/usr/bin/python#=============================================================## GOM Video Converter .dll Buffer Overflow Exploit## Downloaded from: http://converter.gomlab.com/eng/download/## 11/06/2012## Ucha Gobejishvili## Tested Platform: Windo
BigAnt Server 2.52 Stack Overflow
  日期:2012-11-07 12:08:15 点击:101 评论:0
# Exploit Title: BigAnt Server 2.52 SP5 SEH Stack Overflow ROP-based exploit (ASLR + DEP bypass)# Date: 03/11/2012# Exploit Author: Lorenzo Cantoni# Vendor Homepage: http://www.bigantsoft.com/# Version: BigAnt Console 2.52 SP5# Tested on: Windows 7
WinRM VBS Remote Code Execution
  日期:2012-11-07 12:07:14 点击:199 评论:0
### $Id$##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require '
EMC Networker Format String
  日期:2012-11-07 12:06:10 点击:56 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
KMPlayer v3.3.0.33 Multiple Vulnerabilities
  日期:2012-11-06 11:22:47 点击:58 评论:0
# Exploit Title: The KMPlayer v3.3.0.33 Multiple Vulnerabilities # Date: October, 26, 2012 # Discovered By: Mr.XHat # Exploit Author: Mr.XHat # E-Mail: Mr.XHat {AT} Gmail.com # Vendor: http://www.kmplayer.com/ # Version: 3.3.0.33 # Tested On: WinXP
共637页/12733条记录 首页 上一页 [225] [226] [227] 228 [229] [230] [231] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved