首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Linux/x86 - netcat bindshell port 6666 - 69 bytes
  日期:2011-04-22 10:11:05 点击:51 评论:0
/* ** Title: Linux/x86 - netcat bindshell port 6666 - 69 bytes ** Date: 2011-04-20 ** Author: Jonathan Salwan ** ** http://shell-storm.org ** http://twitter.com/#!/shell_storm ** ** /usr/bin/netcat -ltp6666 -e/bin/sh ** ** 8048054 .text: ** 8048054:
docuFORM Mercury WebApp 6.16a/5.20 Multiple XSS Vulnerabilities
  日期:2011-04-21 11:26:01 点击:127 评论:0
!-- docuFORM Mercury WebApp 6.16a/5.20 Multiple Cross-Site Scripting Vulnerabilities Vendor: docuFORM GmbH Product web page: http://www.docuform.de Affected version: 6.16a and 5.20 Summary: Unlimited options for production printing and customer solu
Windows Media Player 11 .ogg Proof Of Concept
  日期:2011-04-20 14:23:21 点击:64 评论:0
#!/usr/bin/perlsub logo {print STDERR EOF; 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___
Media Player Classic 6.4.9.1 Proof Of Concept
  日期:2011-04-20 14:22:21 点击:39 评论:0
#!/usr/bin/perlsub logo {print STDERR EOF; 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___
Google Chrome 10.0.648.205 Stack Overflow
  日期:2011-04-20 14:20:44 点击:77 评论:0
#!/usr/bin/ruby##[+]Exploit Title: Google Chrome 10.0.648.205 Stack Overflow Vulnerability#[+]Date: 1742011#[+]Author: C4SS!0 G0M3S#[+]Software Link: http://www.google.com/chrome#[+]Version: 10.0.648.205#[+]Teste On: WIN-XP SP3 Brazilian Portugue
IBM Tivoli Directory Server SASL Bind Request Remote Code Execution
  日期:2011-04-20 14:16:01 点击:68 评论:0
Source: http://www.protekresearchlab.com/index.php?option=com_contentview=articleid=26Itemid=26 ##################################################################################### Application: IBM Tivoli Directory Server SASL Bind Request Remote C
Adobe Flash Player < 10.1.53 .64 Action Script Type Confusion Exploit (DEP+ASLR
  日期:2011-04-20 14:14:36 点击:82 评论:0
Source: http://www.abysssec.com/blog/2011/04/exploiting-adobe-flash-player-on-windows-7/ Adobe Flash player Action script type confusion exploit (DEP+ASLR bypass) advisory text : Here is another reliable windows 7 exploit . the main method used for
Wireshark <= 1.4.4 packet-dect.c Stack Buffer Overflow
  日期:2011-04-20 14:12:30 点击:68 评论:0
## # $Id: wireshark_packet_dect.rb 12364 2011-04-19 07:53:58Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more
Wireshark 1.4.1-1.4.4 SEH Overflow Exploit
  日期:2011-04-19 09:44:09 点击:53 评论:0
#!/usr/bin/env python # Vulnerable app: Wireshark 1.4.1-1.4.4 # Author: sickness # Download : # OS: Tested it on Windows XP SP2 and SP3 but it should work on every Windows with DEP off (still working on a ROP exploit) # DATE : 17.04.2011 # Fixed in
FiSH-irssi v0.99 Evil ircd Buffer Overflow (CVE-2007-1397)
  日期:2011-04-18 10:26:36 点击:57 评论:0
# FiSH IRC encryption evil ircd PoC exploit. # Abuses CVE-2007-1397 # Bad ircd, nasty bnc provider, nicknames over 100 char -- ruin. # Runs arbitrary code which which in this case shuts down irssi. # Tested on my own compiled FiSH with irssi/fedora/
MS Word Record Parsing Buffer Overflow MS09-027 (meta)
  日期:2011-04-18 10:15:44 点击:56 评论:1
Adobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability
  日期:2011-04-18 10:14:17 点击:56 评论:0
## # $Id: adobe_flashplayer_flash10o.rb 12330 2011-04-16 02:09:33Z sinn3r $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for
SimplyPlay v.66 .pls File Buffer Overflow Vulnerability
  日期:2011-04-15 10:51:44 点击:31 评论:0
#!/usr/bin/perl # #[+]Exploit Title: SimplyPlay V.66 .PLS File Buffer Overflow Vulnerability #[+]Date: 1442011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.softpedia.com/get/Multimedia/Audio/Audio-Players/SimplyPlay.shtml #[+]Version: R
NEdit 5.5 Format String Vulnerability
  日期:2011-04-15 10:51:12 点击:43 评论:0
# Exploit Title: Format string vulnerability in Nedit = 5.5. # Date: 04/13/2011 # Author: Tosh (The bug was already patched when I'd found the vuln) # Email: tosh@tuxfamily.org # Patch: http://nedit.cvs.sourceforge.net/viewvc/nedit/nedit/source/pref
Winamp 5.6.1 .pls Remote Command Execution
  日期:2011-04-15 10:50:39 点击:44 评论:0
#!/usr/bin/perl#### Title : Winamp 5.6.1 (.pls) Remote Command Execution# Author : KedAns-Dz# E-mail : ked-h@hotmail.com || ked-h@exploit-id.com# Home : HMD/AM (30008/04300) - Algeria -(00213555248701)# Twitter page : twitter.com/kedans# platform :
Winamp 5.6.1 Denial Of Service
  日期:2011-04-15 10:50:13 点击:29 评论:0
#!/usr/bin/perl# ---------# Winamp =5.6.1 (.au) Denial of Service Exploit# Author : KedAns-Dz ked-h@hotmail.com || ked-h@exploit-id.com# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team# ---------# Tested in Windows XP sp3
Media Player Classic 6.4.9.1 Denial Of Service
  日期:2011-04-15 10:49:51 点击:38 评论:0
#!/usr/bin/perl# ---------# Media Player Classic v6.4.9.1 (.au) Proof Of Concept Exploit# Author : KedAns-Dz ked-h@hotmail.com || ked-h@exploit-id.com# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team# ---------# Tested in
Xilisoft Video Converter Ultimate Denial Of Service
  日期:2011-04-15 10:49:29 点击:27 评论:0
#!/usr/bin/perl# ---------# Xilisoft Video Converter Ultimate (.au) Proof Of Concept Exploit# Author : KedAns-Dz ked-h@hotmail.com || ked-h@exploit-id.com# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team# ---------# Tested
TinyBB 1.4 Path Disclosure / Blind SQL Injection
  日期:2011-04-15 10:48:32 点击:43 评论:0
# Exploit Title : TinyBB 1.4 Sql Injection + Path Disclosure# Google Dork : Proudly powered by TinyBB# Date : 7 April 2011# Author : swami# Contact : flavio[dot]baldassi[at]gmail[dot]com# Version : 1.4# Tested on : Centos 5.5 with magic_quotes_gpc o
PlaylistMaker V1.5 .txt File Buffer Overflow Vulnerability
  日期:2011-04-14 09:37:24 点击:24 评论:0
#!/usr/bin/python # #[+]Exploit Title: PlaylistMaker V1.5 .TXT File Buffer Overflow Vulnerability #[+]Date: 1342011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.softpedia.com/get/Multimedia/Audio/Other-AUDIO-Tools/Playlistmaker.shtml #[
共637页/12733条记录 首页 上一页 [292] [293] [294] 295 [296] [297] [298] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved