首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Nortel Contact Recording Centralized Archive 6.5.1 SQL Injection Exploit
  日期:2011-09-16 08:55:55 点击:33 评论:0
?php /* Nortel Contact Recording Centralized Archive 6.5.1 EyrAPIConfiguration Web Service getSubKeys() Remote SQL Injection Exploit tested against: Microsoft Windows Server 2003 r2 sp2 Microsoft SQL Server 2005 Express download uri: ftp://ftp.avaya
ScadaTEC ScadaPhone <= v5.3.11.1230 Stack Buffer Overflow
  日期:2011-09-15 11:43:34 点击:35 评论:0
## # $Id: scadaphone_zip.rb 13728 2011-09-13 20:10:28Z swtornio $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more infor
All Media Fixer Pro Local Buffer Overflow Exploit
  日期:2011-09-15 11:42:45 点击:32 评论:0
#!/usr/bin/perl1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00
Reaper 245 (.m3u) Local Buffer Overflow (SEH)
  日期:2011-09-15 11:16:31 点击:31 评论:0
#!/usr/bin/perl1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00
Microsoft Windows NDISTAPI本地权限提升漏洞(MS11-062)
  日期:2011-09-14 10:46:29 点击:134 评论:0
#include stdio.h #include windows.h #define NTSTATUS int int main(int argc, char* argv[]) { PULONG pShellcode; char InputBuffer[4]={0}; ULONG AllocationSize,dwReturnSize; HANDLE dev_handle; SC_HANDLE hscmHandle = NULL; SC_HANDLE hscDriver = NULL; PR
Mod_FTPD Stack Buffer Overflow Exploit
  日期:2011-09-14 10:45:16 点击:42 评论:0
### $Id: Mod_FTPD_server.rb 16897 2011-9-12 19:03:24Z Iraq $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on
Apple TV Video Converter Local BOF Exploit
  日期:2011-09-14 10:44:18 点击:23 评论:0
#!/usr/bin/python1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00
TFTP Server Remote Buffer Overflow Exploit
  日期:2011-09-14 10:43:25 点击:35 评论:0
#!/usr/bin/perl -w1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00
Easy Audio Editor Local SEH Exploit
  日期:2011-09-14 10:42:32 点击:25 评论:0
#!/usr/bin/env python print#################################################################################print# Exploit Title: Easy Audio Editor Local SEH Exploit #print# Author: Angel Injection #print# Tested On: Windows xp sp3 #print# Usage: Im
File And Mp3 Tag Renamper Local Bufer Overflow(SEH)
  日期:2011-09-14 10:41:11 点击:22 评论:0
#!/usr/bin/python#Exploit Title: File And Mp3 Tag Renamper Local Bufer Overflow(SEH)#Author: Angel Injection#Thanks: r0073r // Sid3^effects // r4dc0re // CrosS || Inj3ct0r Team || SeeMe // XroGuE // gunslinger_ // indoushka // KnocKout // ZoRLu // a
Aimp (.m3u) Local Buffer Overflow
  日期:2011-09-14 10:40:18 点击:24 评论:0
#!/usr/bin/python#Exploit Title: Aimp (.m3u) Local Buffer Overflow#Author: Angel Injection#Thanks: r0073r // Sid3^effects // r4dc0re // CrosS || Inj3ct0r Team || SeeMe // XroGuE // gunslinger_ // indoushka // KnocKout // ZoRLu // anT!-Tr0J4n // eXeS
Cakewalk Rapture Local Buffer Overflow Exploit
  日期:2011-09-14 10:39:37 点击:29 评论:0
#!/usr/bin/perl# Exploit Title: Cakewalk Rapture Local Buffer Overflow Exploit# Author: Angel Injection# Thanks: r0073r // Sid3^effects // r4dc0re // CrosS || Inj3ct0r Team || SeeMe // XroGuE // gunslinger_ // indoushka // KnocKout // ZoRLu // anT!-
IZotope Rx Advanced Local Buffer Overflow
  日期:2011-09-14 10:38:43 点击:38 评论:0
#!/usr/bin/python#Exploit Title:IZotope Rx Advanced Local Buffer Overflow#Author: Angel Injection## Thanks: r0073r // Sid3^effects // r4dc0re // CrosS || Inj3ct0r Team || SeeMe // XroGuE // gunslinger_ // indoushka // KnocKout // ZoRLu // anT!-Tr0J4
YoGen Vocal Remover Local Buffer Overflow Exploit
  日期:2011-09-14 10:36:48 点击:38 评论:0
#!/usr/bin/perl# Exploit Title: YoGen Vocal Remover Local Buffer Overflow Exploit# Author: Angel Injection# Thanks: r0073r // Sid3^effects // r4dc0re // CrosS || Inj3ct0r Team || SeeMe // XroGuE // gunslinger_ // indoushka // KnocKout // ZoRLu // an
CrushFTP HTTP Server Stack Buffer Overflow (PWD)
  日期:2011-09-14 10:34:38 点击:74 评论:0
### $Id: CrushFTP_HTTP_Server.rb 11039 2010-11-14 19:03:24Z jduck $## ### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more informa
Mp3 Cutter Joiner Local Buffer Overflow
  日期:2011-09-14 10:33:30 点击:15 评论:0
/*Exploit Title: Mp3 Cutter Joiner Local Buffer OverflowAuthor: Angel InjectionDate: /9/9/2011Grups Inj3ct0r: http://www.facebook.com/groups/Inj3ct0r.Team/Thanks to : Inj3ct0r Team sec-krb.org team */#includestdio.h#includegetopt.h #define pausescre
WMV Cut And Split Local Buffer Overflow Exploit
  日期:2011-09-14 10:32:47 点击:65 评论:0
#!/usr/bin/python# Exploit Title: WMV Cut And Split Local Buffer Overflow Exploit# Author: Angel Injection# Date: 9/9/2011# Tested on: Windows XP SP3 En# Thanks To: Inj3ct0r Team , Sec-krb.org Team# Grups Inj3ct0r: http://www.facebook.com/groups/Inj
Super Scrren Recoder Local Buffer Overflow
  日期:2011-09-14 10:31:19 点击:38 评论:0
#!/usr/bin/python## Title: Super Scrren Recoder Local Buffer Overflow# Author: Angel Injection# Date: 9/9/2011# Tested on: Windows XP SP3# Thanks To: Inj3ct0r Team , Sec-krb.org Team# Grups Inj3ct0r: http://www.facebook.com/groups/Inj3ct0r.Team/# Gr
MS WINS ECommEndDlg Input Validation Error
  日期:2011-09-14 10:29:54 点击:50 评论:0
Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ WINS ECommEndDlg Input Validation Error MS 1. *Advisory Information* Title: MS WINS ECommEndDlg Input Validation Error Advisory ID: CORE-2011-0526 Advisory URL: http://www.coresecur
Microsoft WINS Service <= 5.2.3790.4520 Memory Corruption
  日期:2011-09-14 10:28:21 点击:39 评论:0
####################################################################### Luigi Auriemma Application: Microsoft WINS service http://www.microsoft.com Versions: = 5.2.3790.4520 Platforms: Windows Bug: arbitrary memory corruption Exploitation: remote, v
共637页/12733条记录 首页 上一页 [272] [273] [274] 275 [276] [277] [278] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved