首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Google Chrome Denial Of Service (DoS)
  日期:2011-10-25 12:04:41 点击:65 评论:0
/* GGGGGG GG __GG GG / __| aaaaaa rrrrrr aaaaaa gggggg eeeeee GG |GGGG ____aa rr __rr ____aa gg __gg ee __ee GG |_GG | aaaaaaa |rr | __|aaaaaaa |gg / gg |eeeeeeee | GG | GG |aa __aa |rr | aa __aa |gg | gg |ee ____| GGGGGG |aaaaaa
MS11-077 Win32k Null Pointer De-reference Vulnerability POC
  日期:2011-10-25 12:01:02 点击:42 评论:0
# Exploit Title: MS11-077 Win32k Null Pointer De-reference Vulnerability POC # Date: 10/19/2011 # Author: KiDebug # Version: Windows XP SP3 32bit # Tested on: Windows XP SP3 32bit # CVE : CVE-2011-1985 # Exploit Code. Only a single line of code can
Google Chrome PoC, killing thread
  日期:2011-10-25 11:59:51 点击:33 评论:0
## _ (`-') _ pigtail23 (`-') (`-') _ _ www.remoteshell.de ## ## -.(OO ) (_) .- ( OO).- (OO ).-/ (_) -. ## ## _.' ,-(`-') ,---(`-')/ '._ / ,---. ,-(`-'),--. ) .----. .----. ## ##(_...--'' | ( OO)' .-(OO )|'--...__)| /`. | ( OO)| (`-')_,-. |_.
Cyclope Internet Filtering Proxy 4.0 - CEPMServer.exe DoS (Poc)
  日期:2011-10-25 11:56:37 点击:33 评论:0
#!/usr/bin/python # Title: Cyclope Internet Filtering Proxy 4.0 - CEPMServer.exe DoS (Poc). # From: The eh?-Team || The Great White Fuzz (we're not sure yet) # Found by: loneferret # Software link: http://www.cyclope-series.com/download/index.aspx?p
HP Power Manager 'formExportDataLogs' Buffer Overflow
  日期:2011-10-21 16:33:55 点击:53 评论:0
### $Id: hp_power_manager_filename.rb 14016 2011-10-20 17:40:21Z sinn3r $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more in
Cyclope Internet Filtering Proxy - Stored XSS Vuln
  日期:2011-10-21 16:30:45 点击:37 评论:0
#!/usr/bin/python # Title: Cyclope Internet Filtering Proxy - Stored XSS Vuln.# From: The eh?-Team || The Great White Fuzz (we're not sure yet)# Found by: loneferret# Software link: http://www.cyclope-series.com/download/index.aspx?p=2 # Date Found:
Opera <= 11.51 Use After Free Crash PoC
  日期:2011-10-21 16:29:56 点击:23 评论:0
# Exploit Title: Opera Use After Free - Crash PoC # Date: 20 October 2011 # Author: Roberto Suggi Liverani # Software Link: www.opera.com # Version: 11.51 and previous versions # Tested on: Windows XP and Windows 7 # CVE : n/a # Link: http://maleris
UnrealIRCd 3.2.8.1 Local Configuration Stack Overflow
  日期:2011-10-21 16:29:02 点击:61 评论:0
# Exploit Title: UnrealIRCd local configuration stack overflow # Date: 20/10/2011 # Author: DiGMi ( http://digmi.org ) # Software Link: http://www.unrealircd.com/downloads/Unreal3.2.8.1.exe # Version: 3.2.8.1 and probably every previous version # Te
Opera <= 11.52 Stack Overflow
  日期:2011-10-21 16:27:53 点击:42 评论:0
## _ (`-') _ pigtail23 (`-') (`-') _ _ www.remoteshell.de ## ## -.(OO ) (_) .- ( OO).- (OO ).-/ (_) -. ## ## _.' ,-(`-') ,---(`-')/ '._ / ,---. ,-(`-'),--. ) .----. .----. ## ##(_...--'' | ( OO)' .-(OO )|'--...__)| /`. | ( OO)| (`-')_,-. |_.
Oracle DataDirect Multiple Native Wire Protocol ODBC Drivers HOST Attribute Stac
  日期:2011-10-21 16:27:00 点击:172 评论:0
Oracle DataDirect Multiple Native Wire Protocol ODBC Drivers HOST Attribute Stack Based Buffer Overflow Vulnerability tested against: Microsoft Windows 2k3 r2 sp2 Oracle Hyperion Performance Management and BI (v11.1.2.1.0) download url of the Oracle
Opera <= 11.52 PoC Denial of Service
  日期:2011-10-21 16:23:20 点击:46 评论:0
## _ (`-') _ (`-') (`-') _ _ ## ## -.(OO ) (_) .- ( OO).- (OO ).-/ (_) -. ## ## _.' ,-(`-') ,---(`-')/ '._ / ,---. ,-(`-'),--. ) .----. .----. ## ##(_...--'' | ( OO)' .-(OO )|'--...__)| /`. | ( OO)| (`-')_,-. |_.-, | ## ##| |_.' | | | )| | .
G-WAN 2.10.6 / 2.10.7 Remote Buffer Overflow
  日期:2011-10-19 10:35:21 点击:33 评论:0
#include stdio.h #include stdlib.h #include string.h #include unistd.h #include err.h #include sys/socket.h #include arpa/inet.h /* Shellcode written by gunslinger, http://www.shell-storm.org/shellcode/files/shellcode-679.php */ char code[] = %eb%11
Linux MIPS execve 52 bytes
  日期:2011-10-19 10:31:23 点击:47 评论:0
#include stdio.h/* entropy [at] phiral.net52 byte linux mips shellcodeoh werd entropy@phiral.mips {~/encode/1/2} cat s.s.section .text.globl __start.set noreorder__start: li $a2, 0x666p: bltzal $a2, p slti $a2, $zero, -1 addu $sp, $sp, -32 addu $a0,
MIPS Linux XOR Shellcode Encoder (60 Bytes)
  日期:2011-10-19 10:30:39 点击:63 评论:0
#include fcntl.h #include stdio.h #include unistd.h #include sys/types.h #include sys/stat.h #include stdlib.h #include string.h #define DEBUG 0 /* * * entropy [at] phiral.net * mips (linux) shellcode xor encoder * * xABxCD is overwritten with jmp
WM Downloader 3.0.0.9 (.pls) File Win7 Buffer Overflow Exploit
  日期:2011-10-19 10:29:11 点击:33 评论:0
#!/usr/bin/python# WM Downloader 3.0.0.9 (.pls) File Win7 Buffer Overflow Exploit# Author: TN_spl0!t3r ;) # # _ # (_) ____ ____ ___ _ __ ___# | |/ __|/ __| / _ | '_ ` _ # | |___ \___ (_| | | | | | |# |_||____/|____/ ___||_| |_| |_|# # ____
Apple Safari Webkit libxslt Arbitrary File Creation
  日期:2011-10-19 10:28:32 点击:58 评论:0
## # $Id: safari_xslt_output.rb 13987 2011-10-18 07:39:50Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more inf
Dolphin <= 7.0.7 (member_menu_queries.php) Remote PHP Code Injection
  日期:2011-10-19 10:26:16 点击:50 评论:0
?php /* ---------------------------------------------------------------------------- Dolphin = 7.0.7 (member_menu_queries.php) Remote PHP Code Injection Exploit ---------------------------------------------------------------------------- author.....
Dos BP Random Member Widget Plugin WordPress
  日期:2011-10-18 11:12:14 点击:46 评论:0
# Exploit Title: Dos BP Random Member Widget Plugin WordPress# Google Dork: allinurl: ?random-member# Author: a01001100e@gmail.com# Software Link: http://wordpress.org/extend/plugins/bp-random-member-widget/# Version: BP Random Member Widget Version
Real Networks Netzip Classic 7.5.1 86 File Parsing Buffer Overflow
  日期:2011-10-18 11:09:28 点击:22 评论:0
## # $Id: real_networks_netzip_bof.rb 13952 2011-10-16 15:47:04Z todb $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more
Apple Safari file:// Arbitrary Code Execution
  日期:2011-10-18 11:07:35 点击:59 评论:0
## # $Id: safari_file_policy.rb 13967 2011-10-17 03:49:49Z todb $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more infor
共637页/12733条记录 首页 上一页 [267] [268] [269] 270 [271] [272] [273] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved