首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Sus 2.0. local root exploit
  日期:2011-11-25 10:38:37 点击:27 评论:0
/*1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
记录su root帐号
  日期:2011-11-23 17:04:50 点击:113 评论:0
记录su root帐号 #include stdio.h #include unistd.h #include stdlib.h #include string.h #include sys/types.h #include sys/stat.h /* [ fakesu.c ] 2oo6 by OOZIE oozie[at]poczta.fm ~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Simple /bin/su fake-prog
bzexe (bzip2) race condition
  日期:2011-11-23 16:57:29 点击:36 评论:0
/* bzexec_PoC.c -- bzip2 (bzexe) race condition PoC Author: vladz ( http://vladz.devzero.fr ) Tested on: Debian 6.0.3 up to date (bzip2 version 1.0.5-6) This PoC exploits a race condition in the bzexe script. This tool is rarely used so I wasn't sup
Wireshark <= 1.4.4 , DECT Dissector Remote Buffer Overflow
  日期:2011-11-23 16:56:06 点击:111 评论:0
#!/usr/bin/env python # -*- coding: iso-8859-15 -*- a = nt-- CVE: 2011-1591 : Wireshark = 1.4.4 packet-dect.c dissect_dect() --n # # -------- Team : Consortium-of-Pwners # -------- Author : ipv # -------- Impact : high # -------- Target : Archlin
Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow
  日期:2011-11-23 16:55:17 点击:47 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
MS11-038 Microsoft Office Excel Malformed OBJ Record Handling Overflow
  日期:2011-11-23 16:53:33 点击:89 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
win7 keylayout Blue Screen Vulnerability
  日期:2011-11-23 16:51:13 点击:222 评论:0
Crash: /* win7 Access violation - code c0000005 (!!! second chance !!!) win32k!ReadLayoutFile+0x62: 9566d591 8b4834 mov ecx,dword ptr [eax+34h] kd r eax=ffffffe8 ebx=00000000 ecx=fe978b2e edx=000000e0 esi=fe4e0168 edi=00000000 eip=9566d591 esp=985ad
QQPLAYER PICT PnSize Buffer Overflow WIN7 DEP_ASLR BYPASS
  日期:2011-11-23 16:44:50 点击:55 评论:0
# Exploit Title: QQPLAYER PICT PnSize Buffer Overflow WIN7 DEP_ASLR BYPASS # Date: 2011,11,21 # Author: hellok # Software Link: http://dl_dir.qq.com/invc/qqplayer/QQPlayer_Setup_32_845.exe # Version: 32_845(lastest) # Tested on: WIN7 require 'msf/co
Viscom Software Movie Player Pro SDK ActiveX 6.8
  日期:2011-11-21 11:44:27 点击:40 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Wireshark console.lua pre-loading vulnerability
  日期:2011-11-21 11:43:46 点击:123 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Support Incident Tracker <= 3.65 (translate.php) Remote Code Execution Exploit
  日期:2011-11-21 11:42:51 点击:30 评论:0
?php /* ------------------------------------------------------------------------------ Support Incident Tracker = 3.65 (translate.php) Remote Code Execution Exploit ------------------------------------------------------------------------------ autho
Thunder kankan player Stack overflow/DOS Exploit
  日期:2011-11-21 11:37:36 点击:92 评论:0
#!/usr/bin/env python print #1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 #0 ___ ___ ___ ___ ___ ___ 1 #1 /__ / /__ /__ / /__ 0 #0 /:/ / /:: /:/ / /:/ / /:: /:/ / 1 #1 /:/__/ /:/: /:/ / /:/ /
Linux x86 cdda2cdr local disk exploit
  日期:2011-11-18 11:18:12 点击:46 评论:0
#! /bin/sh#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 /
Viscom Image Viewer CP Pro 8.0/Gold 6.0 ActiveX Control
  日期:2011-11-18 11:09:06 点击:86 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
FreeWebshop <= 2.2.9 R2 (ajax_save_name.php) Remote Code Execution
  日期:2011-11-17 11:10:03 点击:72 评论:0
?php /* -------------------------------------------------------------------------- FreeWebshop = 2.2.9 R2 (ajax_save_name.php) Remote Code Execution Exploit -------------------------------------------------------------------------- author...........
FleaHttpd Remote Denial Of Service Exploit
  日期:2011-11-17 11:09:21 点击:31 评论:0
#!/usr/bin/python FleaHttpd Remote Denial Of Service Exploit by condis FleaHttpd is a http daemon written from scratch in C. When working as a static file server, data show that under certain condition, fleahttpd's speed for static file retrieving c
Attachmate Reflection FTP Client Heap Overflow
  日期:2011-11-17 11:03:54 点击:84 评论:0
##################################################################################### Application: Attachmate Reflection FTP Client Heap Overflow Platforms: Windows Exploitation: Remote code execution CVE Number: {PRL}: 2011-09 Author: Francis Prove
SHOUTcast v1.8.* remote exploit exploit
  日期:2011-11-16 11:02:33 点击:40 评论:0
/*1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
procps 3.2.* vmstat argument stack overflow
  日期:2011-11-16 11:01:44 点击:61 评论:0
/*1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
FairStars Recorder Local Buffer Overflow
  日期:2011-11-16 11:00:02 点击:24 评论:0
#!/usr/bin/python1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00
共637页/12733条记录 首页 上一页 [263] [264] [265] 266 [267] [268] [269] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved