首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Windows Media Player 11.0.5721.5145 Denial Of Service
  日期:2011-04-02 10:59:56 点击:47 评论:0
#!/usr/bin/perl#(+)Exploit Title: Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit#(+)Software : Windows Media player#(+)Version : 11.0.5721.5145#(+)Tested On : WIN-XP SP3#(+) Date : 31.03.2011#(+) Hour : 13:37 #Similar Bug was found
IPComp encapsulation pre-auth kernel memory corruption
  日期:2011-04-02 10:54:32 点击:94 评论:0
from: http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080031.html BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload ------------------------------------------------------------------------------- Gruezi, t
GOM Media Player 2.1.6.3499 0Day Buffer overflow/DOS Exploit
  日期:2011-04-02 10:53:40 点击:49 评论:0
#!/usr/bin/perl #(+)Exploit Title: GOM Media Player 2.1.6.3499 0day Buffer overflow/DOS Exploit #(+)Software Link: download.cnet.com/GOM-Media-Player/3000-2139_4-10701768.html #(+)Software : GOM Media Player #(+)Version : 2.1.6.3499 #(+)Tested On :
Real player 14.0.2.633 0day Buffer overflow/DOS Exploit
  日期:2011-04-02 10:52:27 点击:43 评论:0
#!/usr/bin/perl #(+)Exploit Title: Real player 14.0.2.633 Buffer overflow/DOS Exploit #(+)Software Link: www.soft32.com/download_122615.html #(+)Software: Real player #(+)Version: 14.0.2.633 #(+)Tested On: WIN-XP SP3 #(+) Date : 31.03.2011 #(+) Hour
Word List Builder Buffer Overflow Exploit (SEH)
  日期:2011-04-02 10:50:20 点击:52 评论:0
# Exploit Title: Word List Builder Buffer Overflow Exploit(SEH) # Software Link: http://download.cnet.com/Word-List-Builder/3000-18541_4-10398336.html # Version: 1.0 # triggering details : open .dic file # Tested on: Win XP SP3 French # Date: 31/03/
HT Editor File openning Stack Overflow (0day)
  日期:2011-03-31 10:05:15 点击:5753 评论:0
# Exploit Title: HT Editor File openning Stack Overflow (0day) # Date: March 30th 2011 # Author: ZadYree # Software Link: http://hte.sourceforge.net/downloads.html # Version: = 2.0.18 # Tested on: Linux/Windows (buffer padding may differ on W32) # C
Zend Java Bridge - Remote Code Execution (ZDI-11-113)
  日期:2011-03-31 10:04:08 点击:61 评论:0
/* * Zend Java Bridge v3.1 - Remote Code Execution (ZDI-11-113) * Copyright (c) 2010 Luca Carettoni * * ZJB.java v0.2 - 4 August 2010 * * [Usage] * java -jar zjb.jar IP PORT 'CMD' (Default: 10001/tcp) * * [Version affected] * Zend Server v5.0.2, Zen
Pligg CMS 1.1.3 Multiple Vulnerabilities
  日期:2011-03-31 10:03:29 点击:102 评论:0
#### # # Exploit title: Pligg CMS file existence exploration/shared hosting privilege escalation # H.ackAck.net # Found by: Jelmer de Hen # ###### 15/03/2011 I released some Pligg exploits: http://h.ackack.net/the-pligg-cms-0dayset-1.html 22/03/2011
Media Player Classic Home Cinema 1.5.0.2827 AVI DoS PoC
  日期:2011-03-31 10:02:41 点击:105 评论:0
# done by BraniX branix@hackers.org.pl # www.hackers.org.pl # found: 2011.03.29 # published: 2011.03.29 # tested on: Windows XP SP3 Home Edition # App: Media Player Classic - Home Cinema 1.5.0.2827 # App Url: http://mpc-hc.sourceforge.net/download-m
Solaris 10 Port Stealing
  日期:2011-03-30 11:26:16 点击:120 评论:0
I reported this to Oracle, but I have been told that this is part of theBSD standard and a desire feature (!).In a nutshell, as an ordinary user, I can bind to a port using aspecific address even if another process is already bound to it with awildc
Easy File Sharing Web Server 5.8 Directory Traversal
  日期:2011-03-30 11:25:34 点击:80 评论:0
# ------------------------------------------------------------------------# Software................Easy File Sharing Web Server Version 5.8# Vulnerability...........Directory Traversal / Arbitrary File Creation# Threat Level............Very Critica
Winamp 5.61 - AVI DoS PoC
  日期:2011-03-30 11:20:26 点击:42 评论:0
# done by BraniX branix@hackers.org.pl # www.hackers.org.pl # found: 2011.03.27 # published: 2011.03.29 # tested on: Windows XP SP3 Home Edition # tested on: Windows XP SP3 Professional Edition # App: Winamp 5.61 # App Url: http://www.winamp.com # i
Windows Explorer 6.0.2900.5512 (Shmedia.dll 6.0.2900.5512) AVI Preview DoS PoC
  日期:2011-03-30 11:19:34 点击:118 评论:0
# done by BraniX branix@hackers.org.pl # www.hackers.org.pl # found: 2011.03.27 # published: 2011.03.29 # tested on: Windows XP SP3 Home Edition # tested on: Windows XP SP3 Professional Edition # App: Windows Explorer 6.0.2900.5512 (Shmedia.dll 6.0.
GOM Player 2.1.28.5039 - AVI DoS PoC
  日期:2011-03-30 11:18:47 点击:47 评论:0
# done by BraniX branix@hackers.org.pl # www.hackers.org.pl # found: 2011.03.29 # published: 2011.03.29 # tested on: Windows XP SP3 Home Edition # App: GOM Player 2.1.28.5039 # App Url: http://download.cnet.com/GOM-Media-Player/3000-13632_4-10551786
Rumble 0.25.2232 Denial of Service Vulnerability
  日期:2011-03-30 11:18:16 点击:49 评论:0
# ------------------------------------------------------------------------ # Software................Rumble 0.25.2232 # Vulnerability...........Denial Of Service # Threat Level............Serious (3/5) # Download................http://humbedooh.user
jHTTPd 0.1a Directory Traversal Vulnerability
  日期:2011-03-30 11:17:38 点击:41 评论:0
# ------------------------------------------------------------------------ # Software................jHTTPd 0.1a # Vulnerability...........Directory Traversal # Threat Level............Serious (3/5) # Download................http://developer.gauner.
IDEAL Administration 2011 v11.4 Local SEH Buffer Overflow Exploit
  日期:2011-03-30 11:16:57 点击:31 评论:0
#!/usr/bin/env python ################################################################# # # IDEAL Administration 2011 v11.4 Local SEH Buffer Overflow Exploit # Found By:Dr_IDE # Usage:Migrate - Open Migration Project - Bind Shell # Download: www.poi
Easy File Sharing Web Server 5.8 Multiple Vulnerabilities
  日期:2011-03-30 11:15:59 点击:55 评论:0
------------------------------------------------------------------------ Software................Easy File Sharing Web Server Version 5.8 Vulnerability...........Persistent Cross-site Scripting Threat Level............Moderate (2/5) Download........
Distributed Ruby Send instance_eval/syscall Code Execution
  日期:2011-03-29 09:29:32 点击:154 评论:0
## # $Id: drb_remote_codeexec.rb 12161 2011-03-27 20:00:06Z egypt $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more inf
Mozilla Firefox Crash Handler
  日期:2011-03-29 09:29:04 点击:93 评论:0
#=============================================================================== 80 8o 8oO80oO8 080808 080808080 80o 08 8080080880 08 0o 08 8 08 8O O8 08o8 O0 0O 80 0o 8o 0 0 0o o0 80 Oo 08 O0 08o0o 08 8 8 8O O8 08 0o 80 88 80o0o 8Oo80O80 0 0 0oOoOo
共637页/12733条记录 首页 上一页 [295] [296] [297] 298 [299] [300] [301] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved