首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Linux Kernel 2.6.22 Local root Exploit
  日期:2011-10-08 11:20:02 点击:80 评论:0
#!/bin/sh=======================================Linux Kernel 2.6.22 Local root Exploit=======================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_,
Linux Kernel el5 Local root Exploit
  日期:2011-10-08 11:17:27 点击:160 评论:0
/* * * * 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 * 0 _ __ __ __ 1 * 1 /' __ /'__` / __ /'__` 0 * 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 * 1 /_/ /' _ ` / /_/___ /'___ / /`'__
Linux kernel-2.6.18-6 x86 Local Root Exploit
  日期:2011-10-08 11:15:58 点击:120 评论:0
====================================================Linux kernel-2.6.18-6 x86 Local Root Exploit====================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__`
Linux x86 Blind Port 1122 Connect shell code 101 bytes
  日期:2011-10-08 11:15:21 点击:54 评论:0
======================================================Linux x86 Blind Port 1122 Connect shell code 101 bytes======================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11
Linux X86 Addnew Users 'root' /etc/passwd shell code 79 bytes
  日期:2011-10-08 11:13:43 点击:41 评论:0
===============================================================Linux X86 Addnew Users 'root' /etc/passwd shell code 79 bytes===============================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Linux Kernel 2.6.17 x86i386 Local root Exploit
  日期:2011-10-08 11:11:35 点击:61 评论:0
/* * * * Linux Kernel 2.6.17 x86|i386 Local root Exploit1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` /
Linux Kernel 2.6.25 2009 Local Root Exploit
  日期:2011-10-08 11:09:43 点击:59 评论:0
====================================================kernel-2.6.25 Local Root Exploit====================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'_
AdvancedDvdPlayer Local Exploit
  日期:2011-10-08 11:08:27 点击:38 评论:0
/* Not so usual exploit method Local Heapoverflow exploit An Advanced Exploit For An AdvancedDvdPlayer ;) 02-10-2011 AdvancedDvdPlayer 3.03 Download Link : http://download.cnet.com/Advanced-DVD-Player/3000-2139_4-10310889.html?tag=mncol;3 Tested on
Quick easy ftp server 4.0.0 USER命令格式化串漏洞(D.O.S) POC
  日期:2011-10-08 11:06:50 点击:151 评论:0
# Exploit Title: Quick easy ftp server 4.0.0 USER command format string Vulnerability# Date: [date]# Vendor or Software Link:google can help you.^_^# Version: 4.0 other mybe effected also# Category:: [remote]# Tested on: win2k sp4 (cn) Description:Q
Destiny Media Player Local SEH overflow
  日期:2011-10-08 11:05:54 点击:25 评论:0
#!/usr/bin/perl1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00
Linux kernel 2.6.182 Local Root Exploit
  日期:2011-10-08 11:04:24 点击:82 评论:0
====================================================kernel-2.6.182 Local Root Exploit====================================================1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'
kernel-2.6.30 2010 Local Root Exploit
  日期:2011-10-08 11:01:51 点击:72 评论:0
====================================================kernel-2.6.30 2010 Local Root Exploit====================================================Author : Th3 L0rd Dilaw [GarA]Home : Mafia Hack Team www.Arhack.netExploit DataBase: 1337day.comGr33tz : Dr.
52 byte Linux MIPS execve
  日期:2011-10-08 11:01:17 点击:41 评论:0
#include stdio.h /* entropy [at] phiral.net 52 byte linux mips shellcode oh werd {~/encode/1/2} cat s.s .section .text .globl __start .set noreorder __start: li $a2, 0x666 p: bltzal $a2, p slti $a2, $zero, -1 addu $sp, $sp, -32 addu $a0, $ra, 4097 a
BlazeVideo HDTV Player 6.6 Professional Universal DEP+ASLR Bypass
  日期:2011-10-08 10:59:56 点击:76 评论:0
# Exploit Title: BlazeVideo HDTV Player 6.6 Professional (Universal DEP+ASLR Bypass) # Author: modpr0be # Software Download: http://www.blazevideo.com/download.php?product=blazevideo-hdtv-pro # Date: 07/10/2011 # Tested on: Windows XP SP3, Windows V
Opera 10/11 (bad nesting with frameset tag) Memory Corruption
  日期:2011-10-08 10:58:41 点击:68 评论:0
############################################################################################################### # Exploit for Opera 10/11 (bad nesting with frameset tag) Memory Corruption # # Vulnerability: # # Discovered: 2010-08-18 # Patched: 2011
DivX Plus Web Player "file://" Buffer Overflow Vulnerability PoC
  日期:2011-10-08 10:57:53 点击:61 评论:0
# Exploit Title: DivX Plus Web Player file:// Buffer Overflow Vulnerability PoC ( 0day ) # Date: 10/4/2011 # Author: Snake ( Shahriyar.j at gmail ) # Version: DivX Plus Web Player = 2.1.2.265 # Tested on: XP SP3 , IE6 # CVE : Not Assigned Yet # Ref
PolicyKit Pwnage: linux local privilege escalation on polkit-1 <= 0.101
  日期:2011-10-08 10:51:54 点击:52 评论:0
/* polkit-pwnage.c * * * ============================== * = PolicyKit Pwnage = * = by zx2c4 = * = Sept 2, 2011 = * ============================== * * * Howdy folks, * * This exploits CVE-2011-1485, a race condition in PolicyKit. * * davidz25 explain
Ashampoo Burning Studio Elements 10.0.9 (.ashprj) Heap Overflow
  日期:2011-10-08 10:48:34 点击:119 评论:0
#!/usr/bin/perl # # # Ashampoo Burning Studio Elements 10.0.9 (.ashprj) Heap Overflow Vulnerability # # # Vendor: Ashampoo GmbH Co. KG # Product web page: http://www.ashampoo.com # Affected version: 10.0.9 # # Summary: Ashampoo Burning Studio Elemen
FreeBSD UIPC socket heap overflow proof-of-concept
  日期:2011-10-08 10:47:10 点击:2085 评论:0
#!/bin/sh # # fbsd-uipcsock-heap.sh, by Shaun Colley scolley@ioactive.com , 29/09/11 # # proof-of-concept crash for the freebsd unix domain sockets heap # overflow. this was tested on freebsd 8.2-RELEASE. just a PoC for now. # # see advisory patches
eSignal / eSignal Pro 10.6.2425.1208 Buffer Overflow
  日期:2011-09-30 10:10:11 点击:47 评论:0
### $Id: esignal_styletemplate_bof.rb 13768 2011-09-21 11:55:56Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more
共637页/12733条记录 首页 上一页 [269] [270] [271] 272 [273] [274] [275] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved