首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Quartzo InterApp Control 3.22 Authentication Bypass
  日期:2012-02-09 11:30:11 点击:76 评论:0
/** Title: Quartzo InterApp Control 3.22 Authentication Bypass* Date: 02-07-12* Category: Local* Vendor website: http://www.quartzo.com.br/* Author: Rodrigo Santos* Contact: xsrv@hotmail.com* Tested on: Quartzo InterApp Control (free) version 3.22 o
Typsoft FTP Server 1.10 Multiple Commands DoS
  日期:2012-02-08 10:52:48 点击:52 评论:0
#!/usr/bin/perl # Exploit Title: Typsoft FTP Server DoS CWD command # Date: 02/06/2012 # Author: Balazs Makany # Software Link: http://sourceforge.net/projects/ftpserv/ # Version: 1.10 # Tested on: Windows 7 # (does not work on Windows XP) # # Please
Microsoft Internet Explorer 8 Stack Exhaustion
  日期:2012-02-07 11:38:54 点击:39 评论:0
!-- [+] Microsoft Internet Explorer 8 stack exhaust --!-- --!-- Vuln type: Denial of Service --!-- Author: Todor Donev --!-- Author mail: todor.donev@@gmail.com --!-- --!-- This is simple crash exploit for MS IE8, tested on Windows XP SP3 EN -- !--
PDF Viewer Component ActiveX DoS
  日期:2012-02-06 10:52:36 点击:68 评论:0
Title : PDF Viewer Component ActiveX DoS Auther : Senator of Pirates E-Mail : Senator.of.Pirates.team@gmail.com FaceBook : FaceBook.Com/SenatorofPirates Software link : http://www.ocxt.com/download/PDFViewerSetup.exe Date : 05/02/2012 Tested : Window
Edraw Diagram Component 5 ActiveX buffer overflow DoS
  日期:2012-02-06 10:51:47 点击:33 评论:0
Author : Senator of Pirates This exploit tested on Windows Xp SP3 EN http://www.edrawsoft.com/download/EDBoardSetup.exe -------------------------------------------------------------------------------------------------------- object classid='clsid:61
PHP 5.4.0RC6 64bit Denial of Service
  日期:2012-02-06 10:50:41 点击:41 评论:0
?php /* This script generates a POST header that makes PHP 5.4.0RC6 *64 bit* try to execute code at 0x1111111111111111 (C) Copyright 2012 Stefan Esser PHP 5.3.9 requires you to know the address of a writable address filled with NULL. 32bit requires y
HP 5.4SVN-2012-02-03 htmlspecialchars/entities Buffer Overflow
  日期:2012-02-06 10:49:56 点击:25 评论:0
From: cataphract Operating system: Any PHP version: 5.4SVN-2012-02-03 (SVN) Package: Reproducible crash Bug Type: Bug Bug description:Buffer overflow on htmlspecialchars/entities with $double=false Description: ------------ Long entities can cause a
torrent-stats httpd.c Denial of Service
  日期:2012-02-06 10:46:51 点击:132 评论:0
#!/usr/bin/python import socket, urllib, sys host = 'localhost' port = 8080 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, port)) s.settimeout(8) print 'Sending GET request' # size = sys.argv[1] # Crash at A * 16378 size = 163
Wireshark 1.4.4 Remote Stack Buffer Overflow
  日期:2012-02-03 10:11:09 点击:43 评论:0
### $Id$##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/f
Wireshark 1.4.4 Local Stack Buffer Overflow
  日期:2012-02-03 10:09:53 点击:50 评论:0
### $Id$##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/f
NetSarang Xlpd Printer Daemon 4 Denial of Service Vulnerability
  日期:2012-02-03 10:06:57 点击:50 评论:0
############################################################################## # # Title : NetSarang Xlpd Printer Daemon Denial of Service Vulnerability # Author : Prabhu S Angadi SecPod Technologies ( www.secpod.com ) # Vendor : http://www.netsarang
OfficeSIP Server 3.1 Denial Of Service Vulnerability
  日期:2012-02-03 10:04:41 点击:53 评论:0
############################################################################## # # Title : OfficeSIP Server Denial Of Service Vulnerability # Author : Prabhu S Angadi SecPod Technologies ( www.secpod.com ) # Vendor : http://www.officesip.com # Adviso
Icona SpA C6 Messenger DownloaderActiveX Control Arbitrary File Download and Exe
  日期:2012-02-03 10:03:43 点击:63 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
Sunway Forcecontrol SNMP NetDBServer.exe Opcode 0x57
  日期:2012-02-03 10:00:45 点击:111 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
windows xp sp2 [ arabic] mechanism shellcode 128 bytes+proxy=500bytes
  日期:2012-02-03 09:58:58 点击:69 评论:0
# Title :windows xp sp2 [ arabic] mechanism shellcode 128 bytes+proxy=500bytes# Author :TrOoN# E-mail : SOUrRce-x@live.fr | www.facebook.com/fysl.fyslm# Home : city 617 logts : Draria . algeria# Web Site : www.1337day.com | 1337Day is ThE best pente
frontpage_express2.02 Denial of Service winsock
  日期:2012-02-02 09:36:53 点击:42 评论:0
# Title :frontpage_express2.02 Denial of Service winsock# Author :TrOoN# E-mail : SOUrRce-x@live.fr | www.facebook.com/fysl.fyslm# Home : city 617 logts : Draria . algeria# Web Site : www.1337day.com |# platform : WinDows XP sp 2# Type : local explo
Mindjet MindManager 2012 10.0.493 Buffer Overflow / Denial Of Service
  日期:2012-02-02 09:34:21 点击:216 评论:0
Mindjet MindManager 2012 v10.0.493 Multiple Remote VulnerabilitiesVendor: MindjetProduct web page: http://www.mindjet.comAffected version: 10.0.493 (Windows)Summary: An intuitive visual framework that fosters clarity,innovative thinking communicatio
Apache httpOnly Cookie Disclosure
  日期:2012-02-01 11:10:02 点击:418 评论:0
// Source: https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08 // Most browsers limit cookies to 4k characters, so we need multiple function setCookies (good) { // Construct string for cookie value var str = ; for (v
EdrawSoft Office Viewer Component ActiveX 5.6 (officeviewermme.ocx) BoF PoC
  日期:2012-02-01 11:08:16 点击:272 评论:0
EdrawSoft Office Viewer Component ActiveX 5.6 (officeviewermme.ocx) BoF PoC Vendor: EdrawSoft Product web page: http://www.edrawsoft.com Affected version: 5.6.5781 Summary: Edraw Office Viewer Component contains a standard ActiveX control that acts a
Adobe Flash Player MP4 SequenceParameterSetNALUnit Remote Code Execution Exploit
  日期:2012-02-01 11:06:18 点击:103 评论:0
# Abysssec Public Exploit # CVE-2011-2140 # This exploit tested on Adobe Flash Player = 10.3.181.34 ( XP sp3 ) # twitter : @abysssec # contact : info [at] abysssec.com # http://www.abysssec.com/blog/2012/01/31/exploiting-cve-2011-2140-another-flash-p
共637页/12733条记录 首页 上一页 [259] [260] [261] 262 [263] [264] [265] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved