首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
QQPlayer 3.7.892 m2p quartz.dll Heap Pointer Overwrite PoC
  日期:2012-10-16 09:07:36 点击:71 评论:0
# Exploit Title: QQPlayer 3.7.892 m2p quartz.dll heap pointer overwrite PoC # Date: 10/14/2012 # Author: James Ritchey # Vendor Homepage: www.qq-player.com # Software Link: http://www.qq-player.com/download_en.php # Version: 3.7.892 # Tested on: Win
Huawei Technologies Internet Mobile Unicode SEH Exploit
  日期:2012-10-16 09:06:06 点击:62 评论:0
#!/usr/bin/perl # Souhail Hammou - Independant Security Researcher Penetration Tester . # Facebook : www.facebook.com/dark.puzzle.sec # E-mail : dark-puzzle@live.fr # Greetings to all moroccan researchers and white hats . ###########################
Project Pier Arbitrary File Upload
  日期:2012-10-15 10:12:41 点击:113 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
Metasploit < v4.4 pcap_log Plugin Privilege Escalation Exploit
  日期:2012-10-15 10:11:46 点击:150 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability
  日期:2012-10-12 13:52:30 点击:77 评论:1
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
Apple iOS MobileMail LibTIFF Buffer Overflow
  日期:2012-10-12 13:51:28 点击:139 评论:1
## # $Id: mobilemail_libtiff.rb 15950 2012-10-09 18:31:08Z rapid7 $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information o
Apple iOS MobileSafari LibTIFF Buffer Overflow
  日期:2012-10-12 13:50:37 点击:122 评论:1
## # $Id: safari_libtiff.rb 15950 2012-10-09 18:31:08Z rapid7 $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on li
Linux binfmt_script Disclosure
  日期:2012-10-12 13:48:54 点击:48 评论:1
#!/bin/bash # This software is provided by the copyright owner as is and any # expressed or implied warranties, including, but not limited to, # the implied warranties of merchantability and fitness for a particular # purpose are disclaimed. In no e
PHP 5.3.4 com_event_sink 0-Day
  日期:2012-10-11 11:16:31 点击:68 评论:1
?php //PHP 5.3.4 ////$eip =x44x43x42x41;$eip= x4bxe8x57x78;$eax =x80x01x8dx04;$deodrant=;$axespray = str_repeat($eip.$eax,0x80);//048d0190echo strlen($axespray);echo PHP 5.3.4 WIN Com Module COM_SINK 0-dayn ;echo By Rahul Sasi : http://
Microsoft Office Excel ReadAV Arbitrary Code Execution
  日期:2012-10-11 11:13:05 点击:45 评论:1
#!/usr/bin/perl # Microsoft Office Excel ReadAV Arbitrary Code Execution # Author: Jean Pascal Pereira [emailprotected] # Vendor URI: http://office.microsoft.com # Vendor Description:# Microsoft Excel is a commercial spreadsheet application written
MS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability
  日期:2012-10-11 11:10:57 点击:116 评论:1
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
HP Application Lifecycle Management XGO.ocx ActiveX SetShapeNodeType() Remote Co
  日期:2012-10-11 11:09:44 点击:71 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
Oracle Business Transaction Management FlashTunnelService Remote Code Execution
  日期:2012-10-11 11:08:52 点击:62 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/## require 'msf/core'
Windows Escalate UAC Execute RunAs
  日期:2012-10-11 11:07:06 点击:110 评论:0
### $Id$## ### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/
Apple iOS Default SSH Password
  日期:2012-10-10 14:39:16 点击:171 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
Arctic Torrent 1.2.3 Memory Corruption (DoS)
  日期:2012-10-10 14:33:27 点击:278 评论:0
#!/usr/bin/perl # Arctic Torrent 1.2.3 = Remote Memory Corruption (DoS) # Author: Jean Pascal Pereira pereira@secbiz.de # Vendor URI: http://int64.org/projects/arctic-torrent/ # Vendor Description: # A minimal BitTorrent client. It wont have all the
FL Studio 10 Producer Edition SEH Based Buffer Overflow PoC
  日期:2012-10-10 14:32:12 点击:47 评论:0
# Title : FL Studio 10 Producer Edition - SEH Based Buffer Overflow PoC # Author : Dark-Puzzle (Souhail Hammou) # Type : PoC # Risk : High # Vendor : Image Line: http://www.image-line.com/downloads/flstudiodownload.html # Versions : 10 Producer Edit
Gom Player 2.1.44.5123 (Unicode) NULL Pointer Dereference
  日期:2012-10-10 14:30:54 点击:60 评论:0
# Exploit Title: gom player 2.1.44.5123 (Unicode) NULL pointer dereference = vulnerability # Date: 2012.10.09 # Exploit Author: wh1ant # Software Link: http://app.gomtv.com/gom/GOMPLAYERSETUP.EXE # Version: 2.1.44.5123 (Unicode) # Tested on: windows
PLIB 1.8.5 ssg/ssgParser.cxx Buffer Overflow
  日期:2012-10-10 14:20:24 点击:118 评论:0
/* # Exploit Title: Plib + flightgear 3dconvert exploit # Date: 08/10/2012 # Author: Andres Gomez # Software Links: # Plib: http://plib.sourceforge.net/ # flightgear: http://www.flightgear.org/ # 3dconvert: ftp://ftp.ihg.uni-duisburg.de/FlightGear/W
Avaya IP Office Customer Call Reporter Command Execution
  日期:2012-10-10 14:07:35 点击:216 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'uri'requir
共637页/12733条记录 首页 上一页 [228] [229] [230] 231 [232] [233] [234] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved