首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Microsoft Terminal Services Use After Free (MS12-020)
  日期:2012-03-19 11:22:56 点击:312 评论:0
####################################################################### Luigi Auriemma Application: Microsoft Terminal Services / Remote Desktop Services http://www.microsoft.com http://msdn.microsoft.com/en-us/library/aa383015(v=vs.85).aspx Versions
Pakyu Cenloder Microsoft Remote Desktop Denial Of Service
  日期:2012-03-19 11:21:44 点击:78 评论:0
# Exploit Title: Pakyu Cenloder# Date: March 16 2012# Author: BMario# Application Link: Microsoft Terminal Services / Remote Desktop Services# http://msdn.microsoft.com/en-us/library/aa383015(v=vs.85).aspx# Version: any Windows version before 13 Mar
Microsoft Remote Desktop Denial Of Service(python2)
  日期:2012-03-19 11:20:45 点击:87 评论:0
#!/usr/bin/env python # ms12-020 chinese shit PoC v2 (wireshark版) # 测试平台:win sp3(西班牙语), 据反馈Win7和win 2008也同样可用 # Silic Group - 技术自由 技术创新 技术共享 技术原创 技术进步 # BlackBap.Org # Win7_x64_sp1/Win_xp_sp3 bug修正 添加time.sl
Microsoft Remote Desktop Denial Of Service(python)
  日期:2012-03-19 11:18:45 点击:115 评论:0
#!/usr/bin/env python # ms12-020 chinese shit PoC v2 (wireshark版) # 测试平台:win sp3(西班牙语), 据反馈Win7和win 2008也同样可用 # Silic Group - 技术自由 技术创新 技术共享 技术原创 技术进步 # BlackBap.Org import socket import sys buf= buf+=x03x00x
Microsoft Remote Desktop Denial Of Service(ruby)
  日期:2012-03-19 11:17:04 点击:93 评论:0
#!/usr/bin/env ruby # ms12-020 PoC # NOTE: 本测试脚本基于中国民间流传的Chinese Shit而写,并且修正了数据包不符合协议的问题 # Author: Joshua J. Drake(jduck) # From: BlackBap.Org # Silic Group - 技术自由 技术创新 技术共享 技术原创 技术进步 require 'soc
MS12-020 DoS PoC (210 byte payload)
  日期:2012-03-19 11:15:49 点击:112 评论:0
#include stdio.h#include winsock2.h#pragma comment(lib, ws2_32.lib)const char hexData[210] ={ 0x03, 0x00, 0x00, 0x13, 0x0E, 0xE0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x6A, 0x02, 0xF0, 0x80,
WM Downloader Version 3.1.2.2.2010.04.15 (.m3u) Buffer Overflow (MSF)
  日期:2012-03-16 14:46:25 点击:27 评论:0
##require 'msf/core'class Metasploit3 Msf::Exploit::RemoteRank = NormalRankinginclude Msf::Exploit::FILEFORMATdef initialize(info = {})super(update_info(info,'Name' = 'WM Downloader Version 3.1.2.2.2010.04.15 (.m3u) Buffer Overflow (MSF)','Descripti
WM Downloader Version 3.1.2.2.2010.04.15 (.m3u) Buffer Overflow Exploit
  日期:2012-03-16 14:45:35 点击:31 评论:0
#!/usr/bin/perl#Title : WM Downloader Version 3.1.2.2.2010.04.15 (.m3u) Buffer Overflow Exploit#Author : KaHPeSeSe#Download : http://mini-stream.net/downloads/WMDownloader.exe#Tested : PERFECT XP PC1 / SP3#Date : 14/03/2012my $dosya = calc.m3u;my $o
FreeFloat FTP Server TEST Buffer Overflow
  日期:2012-03-16 14:43:44 点击:54 评论:0
##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = AverageRanking include Msf::Exploit::Remote::Ftp def initialize(info = {}) super(update_info(info, 'Name' = 'FreeFloat FTP Server TEST Buffer Overflow', 'Description' = %q{ This modul
VLC v. 1.1.11 .mxf Memory Corruption
  日期:2012-03-16 14:42:24 点击:37 评论:0
# Exploit Title: VLC v. 1.1.11 .mxf Memory Corruption# Date: 3/14/2012# Author: Dan Fosco# Vendor or Software Link: www.videolan.org# Version: 1.1.11# Category: local# Google dork: n/a# Tested on: Windows XP SP3 (64-bit)# Demo site: n/a#include stdi
VLC v. 1.1.11 .nsv DOS
  日期:2012-03-16 14:39:04 点击:24 评论:0
# Exploit Title: VLC v. 1.1.11 .nsv DOS# Date: 3/14/2012# Author: Dan Fosco# Vendor or Software Link: www.videolan.org# Version: 1.1.11# Category: local# Google dork: n/a# Tested on: Windows XP SP3 (64-bit)# Demo site: n/a#include stdio.hint main(){
VLC v. 1.1.11 .eac3 DOS
  日期:2012-03-16 14:35:05 点击:45 评论:0
# Exploit Title: VLC v. 1.1.11 .eac3 DOS# Date: 3/14/2012# Author: Dan Fosco# Vendor or Software Link: www.videolan.org# Version: 1.1.11# Category:: local# Google dork: n/a# Tested on: Windows XP SP3 (64-bit)# Demo site: n/a#include stdio.hint main(
NetDecision 4.5.1 HTTP Server Buffer Overflow
  日期:2012-03-16 14:33:31 点击:42 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
VLC v. 1.1.11 .3gp Memory Corruption
  日期:2012-03-15 12:25:26 点击:29 评论:0
# Exploit Title: VLC v. 1.1.11 .3gp Memory Corruption # Date: 3/14/2012 # Author: Dan Fosco # Vendor or Software Link: www.videolan.org # Version: 1.1.11 # Category:: local # Google dork: n/a # Tested on: Windows XP SP3 (64-bit) # Demo site: n/a #inc
VLC v. 1.1.11 .m4v Memory Corruption
  日期:2012-03-15 12:00:57 点击:29 评论:0
# Exploit Title: VLC v. 1.1.11 .m4v Memory Corruption # Date: 3/14/2012 # Author: Dan Fosco # Vendor or Software Link: www.videolan.org # Version: 1.1.11 # Category:: local # Google dork: n/a # Tested on: Windows XP SP3 (64-bit) # Demo site: n/a #inc
Bugtraq shutdown modsecurity -Linux/x86 shellcode 64 bytes
  日期:2012-03-15 12:00:07 点击:147 评论:0
# Title :Bugtraq shutdown modsecurity -Linux/x86 shellcode 64 bytes# Author : TrOoN# E-mail : http://www.facebook.com/alexydant ( my new facebook )# Home : city 617 logt Draria algeria# Web Site : www.1337day.com# Facebook : http://www.facebook.com/
Linux x86_64 - add user with passwd (189 bytes)
  日期:2012-03-13 10:04:55 点击:171 评论:0
;sc_adduser01.S ;Arch:x86_64, Linux ; ;Author:0_o -- null_null ;nu11.nu11 [at] yahoo.com ;Date:2012-03-05 ; ;compile an executable:nasm -f elf64 sc_adduser.S ;ld -o sc_adduser sc_adduser.o ;compile an object:nasm -o sc_adduser_obj sc_adduser.S ; ;Pur
VLC media player <= 1.1.11 (.flv) Denial of Service
  日期:2012-03-13 10:03:49 点击:76 评论:0
###########################################################################################################Application : VLC media player = 1.1.11 (.flv) Denial of ServiceDate : 12/03/2012Auther : Senator of PiratesE-Mail : Senator.of.Pirates.team@g
GOM Media Player 2.1.37 Buffer Overflow Vulnerability
  日期:2012-03-13 10:02:51 点击:194 评论:0
Introduction: ============= GOM Player (Gretech Online Movie Player) is a 32/64-bit media player for Microsoft Windows, distributed by the Gretech Corporation of South Korea. It is the primary client player for South Korean GOM-TV, and is more popula
PyPAM -- Python bindings for PAM - Double Free Corruption
  日期:2012-03-12 10:45:32 点击:136 评论:0
PyPAM -- Python bindings for PAM - Double Free Corruption- - ---------------------------------------------------------Affected Versions=================PyPAM = 0.4.2Red Hat PyPAM = 0.5.0-12Debian python-pam = 0.4.2-12.2Ubuntu python-pam = 0.4.2-12.2
共637页/12733条记录 首页 上一页 [255] [256] [257] 258 [259] [260] [261] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved