首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Novell GroupWise Messenger <= 2.1.0 DoS
  日期:2012-07-02 11:01:52 点击:54 评论:0
winerr.h/* Header file used for manage errors in Windows It support socket and errno too (this header replace the previous sock_errX.h)*/#include string.h#include errno.hvoid std_err(void) { char *error; switch(WSAGetLastError()) { case 10004: error
xArrow <= 3.2 multiple vulnerabilities
  日期:2012-07-02 11:00:43 点击:58 评论:0
------------- winerr.h-------------/* Header file used for manage errors in Windows It support socket and errno too (this header replace the previous sock_errX.h)*/#include string.h#include errno.hvoid std_err(void) { char *error; switch(WSAGetLastE
Chrome Engine 4 Denial of Service 0.1
  日期:2012-07-02 10:50:40 点击:62 评论:0
---------------- chromerda.c----------------/* by Luigi Auriemma*/#include stdio.h#include stdlib.h#include string.h#include stdint.h#include time.h#ifdef WIN32 #include winsock.h #include winerr.h #define close closesocket #define sleep Sleep #defi
python-wrapper untrusted search path/code execution
  日期:2012-07-02 10:49:56 点击:94 评论:0
# Exploit Title: python-wrapper untrusted search path/code executionvulnerability# Date: 06-30-12# Exploit Author: ShadowHatesYou# Vendor Homepage: python.org# Software Link: http://python.org/download/# Version: Python 2.7.3 and earlier# Tested on:
Zoom Player 4.51 Standard - ".avi" Denial Of Service
  日期:2012-07-02 10:48:49 点击:25 评论:0
#!/usr/bin/perl#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0#0 _ __ __ __ 1#1 /' __ /'__` / __ /'__` 0#0 /_, ___ /_/_ ___ ,_/ / _ ___ 1#1 /_/ /' _ ` / /_/___ /'___ / /`'__
PC Tools Firewall Plus 7.0.0.123 Local DoS
  日期:2012-07-02 10:46:14 点击:31 评论:0
/*Exploit Title: PC Tools Firewall Plus Local DoSVersion: 7.0.0.123Author: 0in (Maksymilian Motyl)Software Link: www.pctools.comTested on: Windows XP SP3Vendor was notified 25.06.2012 - No reply*/ // After executing this small code, PC Tools Firewal
Linux Kernel 2.6.18-374 Local root Exploit
  日期:2012-07-02 10:41:26 点击:320 评论:0
/* * 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 * 0 _ __ __ __ 1 * 1 /' __ /'__` / __ /'__` 0 * 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 * 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 *
Apple QuickTime TeXML Stack Buffer Overflow
  日期:2012-07-02 10:36:54 点击:56 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/## require 'msf/core'
Symantec PcAnywhere 12.5.0 Login and Password Field Buffer Overflow
  日期:2012-07-02 10:35:57 点击:75 评论:0
#!/usr/bin/python # Exploit Title: Symantec PcAnywhere login and password field buffer overflow# Date: 2012.06.27# Author: S2 Crew [Hungary]# Software Link: symantec.com# Version: 12.5.0# Tested on: Windows XP SP2# CVE: CVE-2011-3478 # Code :import
Real Player 10 GOLD - Exception Handling Vulnerability
  日期:2012-07-02 10:34:08 点击:38 评论:0
#!/usr/bin/perl#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0#0 _ __ __ __ 1#1 /' __ /'__` / __ /'__` 0#0 /_, ___ /_/_ ___ ,_/ / _ ___ 1#1 /_/ /' _ ` / /_/___ /'___ / /`'__
Linux 3.x.x Executable File Read Exploit
  日期:2012-06-27 14:26:20 点击:96 评论:0
# Exploit Title: Linux 3.x.x Executable File Read Exploit# Date: 6/26/12# Author: Blade# Version: 3.x.x# Category:: Local Root Exploit# Tested on: Linux, Ubuntu# Demo site: [3 vulnerable site, this will speed up check]#!/bin/sh## 3.x.x local root ex
VLC 2.0.1 - .avi playlist plugins DoS (Explanation + PoC)
  日期:2012-06-27 14:25:32 点击:57 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
Root Exploit Western Digital's WD TV Live SMP/Hub
  日期:2012-06-27 14:24:05 点击:63 评论:0
Introduction ============ The WD TV Live Streaming Media Player is a consumer device to play various audio and video formats. Additionally it allows access to multiple video streaming services like Netflix, Hulu or Youtube.[1] The device allows cust
Western Digital TV (WD-TV) Live Remote Code Execution
  日期:2012-06-26 13:17:25 点击:89 评论:0
Introduction============The WD TV Live Streaming Media Player is a consumer device to play various audio and video formats.Additionally it allows access to multiple video streaming services like Netflix, Hulu or Youtube.[1]The device allows customiz
Winmap 5.13 Full- Exception Handling Vulnerablity
  日期:2012-06-26 13:16:17 点击:23 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
Able2Doc and Able2Doc Professional v 6.0 Memory Corruption
  日期:2012-06-26 13:10:38 点击:18 评论:0
# Exploit Title: Able2Doc and Able2Doc Professional v 6.0 memory corruption # Date: June 24 2012 # Exploit Author: Carlos Mario Penagos Hollmann # Vendor Homepage: www.investintech.com # Version:6.0 # Tested on: Windows 7 # CVE : cve-2011-4221 paylo
Able2Extract and Able2Extract Server v 6.0 Memory Corruption
  日期:2012-06-26 13:09:55 点击:17 评论:0
# Exploit Title: Able2Extract and Able2Extract Server v 6.0 Memory Corruption # Date: June 24 2012 # Exploit Author: Carlos Mario Penagos Hollmann # Vendor Homepage: www.investintech.com # Version:6.0 # Tested on: Windows 7 # CVE : cve-2011-4222 pay
Slimpdf Reader 1.0 Memory Corruption
  日期:2012-06-26 13:08:49 点击:20 评论:0
# Exploit Title: # Date: June 24 2012 # Exploit Author: Carlos Mario Penagos Hollmann # Vendor Homepage: www.investintech.com # Version:1.0 # Tested on: Windows 7 # CVE : cve-2011-4220 payload =A*10000 crash=startxref pdf=payload+crash filename = sl
Kingview Touchview 6.53 Multiple Heap Overflow Vulnerabilities
  日期:2012-06-26 13:06:59 点击:62 评论:0
# Exploit Title: Kingview 6.53 touchview.exe heap overflow 2 # Date: June 24 2012 # Exploit Author: Carlos Mario Penagos Hollmann # Vendor Homepage: www.kingview.com # Version: 6.53 # Tested on: Windows SP 1 # CVE : Open kingivew click on Make choos
Kingview Touchview 6.53 EIP Overwrite
  日期:2012-06-26 13:06:59 点击:45 评论:0
# Exploit Title: Kingview Touchview EIP direct control # Date: June 24 2012 # Exploit Author: Carlos Mario Penagos Hollmann # Vendor Homepage: www.kingview.com # Version: 6.53 # Tested on: Windows SP 1 # CVE : Open kingivew click on Make choose netw
共637页/12733条记录 首页 上一页 [240] [241] [242] 243 [244] [245] [246] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved