首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MJM Core Player 2011 .s3m Stack Buffer Overflow
  日期:2011-05-04 14:07:58 点击:38 评论:0
## # $Id: mjm_coreplayer2011_s3m.rb 12473 2011-04-30 02:36:14Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more
Microsoft Office Excel Axis Properties Record Parsing Buffer Overflow PoC
  日期:2011-05-04 14:00:14 点击:329 评论:0
This is a PoC for MS11-021/CVE-2011-0978 Microsoft Office Excel Axis Properties Record Parsing Buffer Overflow w3bd3vil[at]gmail[dot].com twitter.com/w3bd3vil Modify bits at file location 0x39E7 0:000:x86 r eax=04dd6380 ebx=ffff5554 ecx=04ab5108 edx
Subtitle Processor 7.7.1 .M3U SEH Unicode Buffer Overflow
  日期:2011-05-04 13:58:36 点击:43 评论:0
## # $Id: subtitle_processor_m3u_bof.rb 12461 2011-04-28 08:12:32Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for
OSX/Intel reverse_tcp shell x86_64 - 131 bytes
  日期:2011-05-04 13:55:15 点击:215 评论:0
;osx x64 reverse tcp shellcode (131 bytes) ;Jacob Hammack ;jacob.hammack@hammackj.com ;http://www.hammackj.com ; ;props to http://www.thexploit.com/ for the blog posts on x64 osx asm ;I borrowed some of his code ; ;#OSX reverse tcp shell (131 bytes)
NetOp Remote Control 8.0, 9.1, 9.2, 9.5 Buffer Overflow
  日期:2011-04-29 10:30:04 点击:167 评论:0
# Exploit Title: NetOp Remote Control Buffer Overflow # Date: April 28, 2011 # Author: chap0 # Version: 8.0, 9.1, 9.2, 9.5 (Possibly anything before ver 10) # Upgrade to Version 10 for fix # Tested on: Windows XP SP3 # # Greetz to JJ IE by day Ninja
libmodplug <= 0.8.8.2 .abc Stack-Based Buffer Overflow PoC
  日期:2011-04-29 10:21:36 点击:68 评论:0
#include libmodplug/modplug.h #include stdio.h #include string.h /* libmodplug = 0.8.8.2 .abc stack-based buffer overflow poc http://modplug-xmms.sourceforge.net/ by: epiphant this exploits one of many overflows in load_abc.cpp lol vlc media player
EMC HomeBase Server Directory Traversal Remote Code Execution
  日期:2011-04-29 10:19:45 点击:61 评论:0
## # $Id: emc_homebase_exec.rb 12458 2011-04-27 20:29:27Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more informat
Subtitle Processor 7.7.1 SEH Unicode Buffer Overflow Exploit
  日期:2011-04-28 15:10:46 点击:78 评论:0
#!/usr/bin/python # I wanted to first of all thank all the people who took the time to help me. # Peter Van Eeckhoutte AKA corelanc0d3r. Awesome tutorials and thanks for putting up with me! # Jason Kratzer. Thanks a lot for helping me finish this ex
WordPress SermonBrowser Plugin 0.43 SQL Injection
  日期:2011-04-27 09:36:34 点击:26 评论:0
?php if(!$argv[1]) die( Usage : php exploit.php [site] Example : php exploit.php http://site.com/wp/ ); print_r( # Tilte......: [ WordPress SermonBrowser Plugin 0.43 SQL Injection ] # Author.....: [ Ma3sTr0-Dz ] # Date.......: [ 25-o4-2o11 ] # Locat
Maxthon Browser 3.22.2000 Denial Of Service
  日期:2011-04-26 15:14:51 点击:30 评论:0
#(+)Exploit Title: Maxthon Browser 3.22.2000 0day BOF/DOS Exploit #(+)Created By: ^Xecuti0n3r#(+)Software : Maxthon Browser#(+)Version : 3.22.2000 #(+)Tested On : Win-XP-Sp3#(+) Date : 23.04.2011#(+) Hour : 13:37 PM#(+) E-mail : xecuti0n3r()yahoo.co
RealPlayer 11 Browser Active-X Code Execution
  日期:2011-04-26 15:12:14 点击:40 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
eXPert PDF Editor 7 Professional Denial Of Service
  日期:2011-04-26 15:11:40 点击:34 评论:0
#!/usr/bin/perlsub logo {print STDERR EOF; 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___
eZip Wizard 3.0 Stack Buffer Overflow
  日期:2011-04-26 15:10:41 点击:48 评论:0
## # $Id: ezip_wizard_bof.rb 12428 2011-04-25 01:06:34Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more inform
AT-TFTP Server 1.8 Denial Of Service
  日期:2011-04-26 15:07:26 点击:53 评论:0
-----------------------------secpod_at_tftp_dos.txt---------------------- ############################################################################### AT-TFTP Server v1.8 Remote Denial of Service Vulnerability SecPod Technologies ( www.secpod.com
PHP phar extension 1.1.1 Heap Overflow
  日期:2011-04-25 11:33:37 点击:82 评论:0
from: http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html version PHP: 5.3.6 version phar ext.: 1.1.1 site: http://php.net/ source code: http://windows.php.net/downloads/releases/php-5.3.6-src.zip An integer overflow vulnerabil
Spreecommerce Arbitrary Command Execution
  日期:2011-04-22 10:37:15 点击:36 评论:0
### $Id: spree_searchlogic_exec.rb 12397 2011-04-21 19:38:42Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more inf
KMPlayer 2.9.x (.kpl) Stack Buffer Overflow
  日期:2011-04-22 10:36:43 点击:43 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
QtWeb Browser 3.7.2 Denial Of Service
  日期:2011-04-22 10:36:08 点击:30 评论:0
**Legion Of Xtremers Hackers Garage** **QtWeb Browser Remote Denial of Service** Product Description: QtWeb Browser Version: 3.7.2 (latest) Tested on: Windows Xp SP2/ Windows 7 ultimate Author: Prashant a.k.a t3rm!n4t0r (happyterminator@gmail.com) S
Gesytec ElonFmt ActiveX 1.1.14 (ElonFmt.ocx) pid Item Buffer Overflow (SEH)
  日期:2011-04-22 10:22:22 点击:82 评论:0
!-- Gesytec ElonFmt ActiveX 1.1.14 (ElonFmt.ocx) pid Item Buffer Overflow (SEH) Vendor: Gesytec GmbH Product web page: http://www.gesytec.de Affected version: 1.1.14.1 Summary: Connects LonWorks networks to process control, visualization, SCADA and
Wireshark <= 1.4.4 packet-dect.c Stack Buffer Overflow
  日期:2011-04-22 10:21:52 点击:38 评论:0
## # $Id: wireshark_packet_dect.rb 12371 2011-04-19 16:41:58Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more
共637页/12733条记录 首页 上一页 [291] [292] [293] 294 [295] [296] [297] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved