首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
ABBS Audio Media Player v3.0 Buffer Overflow Exploit (MSF)
  日期:2011-08-05 10:43:36 点击:26 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
am4ss v1.1 Remote Code Execution
  日期:2011-08-05 10:42:20 点击:59 评论:0
#!/usr/bin/perl -w# Exploit Title: am4ss v1.1 Remote Code Execution# Version: 1.1# Author : Or4nG.M4n i-Hmx Dev Exploit# Big Thnks 2 : i-Hmx , sA^Dev!L# Big dicks to : Duck lamerz Team :))# Tested on: Windows 8 use MIME::Base64;use LWP::UserAgent;us
Omnicom Alpha 4.0e LPD Server DoS
  日期:2011-08-04 12:17:08 点击:44 评论:0
#!/usr/bin/python #Title: Omnicom Alpha 4.0e LPD Server DoS #Author: Craig Freyman (@cd1zz) #Software Download: http://www.omnicomtech.com/download/bin/lpd.exe #Tested on: Windows XP SP3 (English), Server 2003 SP2 (English) #Dates: Bug Found 7/27/20
Zinf Audio Player v2.2.1 PLS File Buffer Overflow Vulnerability (DEP BYPASS)
  日期:2011-08-04 12:15:44 点击:2096 评论:0
#!/usr/bin/ruby # #[+]Exploit Title: Zinf Audio Player v2.2.1 PLS File Buffer Overflow Vulnerability(DEP BYPASS) #[+]Date: 0382011 #[+]Author: C4SS!0 and h1ch4m #[+]Found by: Delikon( http://www.exploit-db.com/exploits/559/ ) or also Metasploit(
cPanel 11.x (Fantastico) Local File Include / SM-b0x
  日期:2011-08-04 12:13:10 点击:862 评论:0
?php# cPanel 11.x (Fantastico) Local File Include / SM-b0x # Author : ZxH-Labs# Site : Sec4ever.CoM | Sec-L4b.OrG | Tryag.Cc | 1337r1z.wordpress.Com# Greet'z 2 Tw1st3r | I-Hmx | Sec4Ever | MaestRo_Dz | The Injector | H311COD3 | Red ViRuS | Dr.SilEnT
CA Arcserve D2D GWT RPC Credential Information Disclosure
  日期:2011-08-03 11:54:31 点击:75 评论:0
## # $Id: ca_arcserve_rpc_authbypass.rb 13467 2011-08-01 21:20:29Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for
Actfax FTP Server <= v4.27 USER Command 0day Stack Buffer Overflow (MSF)
  日期:2011-08-01 12:50:45 点击:64 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Citrix XenApp / XenDesktop XML Service Heap Corruption
  日期:2011-07-29 10:00:38 点击:97 评论:0
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2011.002 28-Jul-2011 ___________________________________________________________________________ Vendor: Citrix, http://www.citrix.com Affected Products: XenApp and XenDesktop Affected
Citrix XenApp / XenDesktop Stack-Based Buffer Overflow
  日期:2011-07-29 10:00:00 点击:87 评论:0
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2011.001 28-Jul-2011 ___________________________________________________________________________ Vendor: Citrix, http://www.citrix.com Affected Products: XenApp and XenDesktop Affected
MyWebServer v1.0.3 Denial Of Service
  日期:2011-07-29 09:57:58 点击:38 评论:0
# ######################################################################### #~ Title : MyWebServer v1.0.3 Denial Of Service #~ Software : http://www.softpedia.com/get/Internet/Servers/WEB-Servers/MyWebServer.shtml #~ Tested on : Windows 7 (home prem
Joomla 1.5 com_virtuemart <= 1.1.7 Blind time-based SQL Injection (MSF)
  日期:2011-07-29 09:56:25 点击:107 评论:0
# Exploit Title: Joomla 1.5 com_virtuemart = 1.1.7 blind time-based sql injection MSF module # Date: Thu Jul 28, 2011 # Author: TecR0c - tecr0c.mythsec [@] gmail.com # Version: = 1.1.7 # Download: http://dev.virtuemart.net/projects/virtuemart/files
MinaliC Webserver v2.0 Remote Source Disclosure
  日期:2011-07-28 11:17:23 点击:110 评论:0
# Exploit Title : MinaliC Webserver v2.0 Remote Source Disclosure # Software link : http://sourceforge.net/projects/minalic/ # Version : 2.0 # Tested on : Windows 7 (Home Premium) # Date : 27/07/2011 # Author : X-h4ck # Website : http://www.pirate.al
Archos OS 2.0.45 File Manager MIDI Denial Of Service Exploit
  日期:2011-07-28 11:15:43 点击:66 评论:0
#include stdio.husing namespace std;/*---------------------------------------------------------------- 888 .d8888b. 888 d88P Y88b 888 .d88P .d8888b .d88b. 88888b.d88b. 88888b. 888 8888 888 888d88P d8888b 888 888 88b 888 88b 888 Y8b. `Y8bd8P'888 888
Ciscokits 1.0 TFTP Server File Name DoS
  日期:2011-07-27 10:27:14 点击:50 评论:0
#!/usr/bin/python #Title: Ciscokits 1.0 TFTP Long Filename DoS #Author: Craig Freyman (@cd1zz) #Date: July 22, 2011 #Software Link: http://www.certificationkits.com/tftpserver/tftpserver.zip #Tested on: Windows XP SP3 #Vendor notified: July 22, 2010
SLP (Service Location Protocol) Denial Of Service
  日期:2011-07-27 10:25:38 点击:86 评论:0
#!/usr/bin/python''' ================================== Pseudo documentation ================================== '''# SLPick, extension DoS release# by Nicolas Gregoire''' ================================== Imports ==================================
MPlayer Lite r33064 m3u Buffer Overflow Exploit (DEP Bypass)
  日期:2011-07-25 11:13:42 点击:48 评论:0
#!/usr/bin/perl # #[+]Exploit Title: MPlayer Lite r33064 m3u Buffer Overflow Exploit(DEP BYPASS) #[+]Date: 2472011 #[+]Author: C4SS!0 and h1ch4m #[+]Software Link: http://sourceforge.net/projects/mplayer-ww/files/MPlayer_Release/Revision%2033064/
OSX universal ROP shellcode
  日期:2011-07-25 11:12:36 点击:93 评论:0
; universal OSX dyld ROP shellcode ; tested on OS X 10.6.8 ; ; if you don't want to compile, copy stage0 code from precompiled.txt ; and append your normal shellcode to it. ; ; usage: ; - put your 'normal' shellcode in x64_shellcode.asm ; - make ; -
Download Accelerator plus (DAP) 9.7 M3U File Buffer Overflow Exploit (Unicode SE
  日期:2011-07-25 11:11:09 点击:33 评论:0
#!/usr/bin/python # #[+]Exploit Title: Download Accelarator plus(DAP) 9.7 M3U File Buffer Overflow Exploit(UNICODE-SEH) #[+]Date: 2372011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://download.speedbit.com/dap97_baix.exe #[+]Version: 9.7 #[+
ExtCalendar2 (Auth Bypass/Cookie) SQL Injection
  日期:2011-07-25 11:10:20 点击:61 评论:0
? if(!$argv[1]) die( Usage : php exploit.php [site] Example : php exploit.php http://site.tld/calendar/ ); print_r( # Exploit....: [ ExtCalendar2 (Auth Bypass/Cookie) SQL Injection ] # Author.....: [ Lagripe-Dz ] # Date.......: [ 05-o6-2o11 ] # Twit
Kingsoft AntiVirus 2012 KisKrnl.sys <= 2011.7.8.913 Local Kernel Mode Privilege
  日期:2011-07-25 11:08:17 点击:102 评论:0
# Kingsoft AntiVirus 2012 KisKrnl.sys = 2011.7.8.913 Local Kernel Mode Privilege Escalation Exploit # Date: 2011-7-23 # Author : MJ0011 # Version: Kingsoft AntiVirus 2012 # Tested on: Windows XP SP3 DETAILS: In KisKrnl.sys 's hook function of NtQuer
共637页/12733条记录 首页 上一页 [279] [280] [281] 282 [283] [284] [285] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved