首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
A-PDF All to MP3 Converter 2.0.0 (.wav) Buffer Overflow (seh)
  日期:2011-01-30 14:20:31 点击:21 评论:0
# Exploit Title: A-PDF All to MP3 Converter v.2.0.0 SEH overflow # Software Link: http://www.a-pdf.com/all-to-mp3/download.htm # Version: = 2.0.0 # Tested on: Win XP SP2 English # Date: 29/01/2011 # Author: m0nna #Email: malware.monna@gmail.com # tr
WM Downloader 3.1.2.2 2010.04.15 (.m3u) Buffer Overflow + DEP Bypass
  日期:2011-01-30 14:19:54 点击:59 评论:0
#!/usr/bin/env python # WM Downloader 3.1.2.2 2010.04.15 (.m3u) Buffer Overflow + DEP Bypass # Author: sickness # Download : http://mini-stream.net/wm-downloader/ # Tested : Windows XP Professional SP3 (EN) latest updates with IE8 and IE7 # DATE : 2
Microsoft Internet Explorer MHTML Protocol Handler XSS
  日期:2011-01-30 14:19:21 点击:348 评论:0
Hacking with mhtml protocol handler Author: www.80vul.com [Email:5up3rh3i#gmail.com] Release Date: 2011/1/15 References: http://www.80vul.com/mhtml/Hacking%20with%20mhtml%20protocol%20handler.txt Ph4nt0m Webzine 0x05 ( http://secinn.appspot.com/pstz
Virtuosa Phoenix Edition 5.2 ASX SEH BOF
  日期:2011-01-30 14:18:39 点击:107 评论:0
#!/usr/bin/python # Exploit Title: Virtuosa Phoenix Edition 5.2 ASX BOF SEH Overwrite # Date found: Aug 16th 2010 # Author: Acidgen # Software Link: http://download1.virtuosa.com/VirtuosaTrial.exe # Version: 5.2 # Tested on: Windows XP SP2 # Virtuos
Polycom SoundPoint IP Devices Denial Of Service
  日期:2011-01-30 14:18:00 点击:21 评论:0
Source: http://packetstormsecurity.org/files/view/97948/polycomsoundpoint-dos.txt Hello, Polycom SoundPoint IP devices (IP phones) are vulnerable to Denial of Service attacks. Sending HTTP GET request with broken Authorization header effect a device
FreeBSD 8.0 Local Denial of Service (forced reboot)
  日期:2011-01-30 14:13:44 点击:66 评论:0
# Exploit Title: FreeBSD local denial of service - forced reboot # Date: 28. January 2011 # Author: Kingcope # Software Link: http://www.freebsd.org # Operating System: FreeBSD # Tested on: 8.0-RELEASE This source code when compiled and executed wil
YuQaIFS V1.0 漏洞0day
  日期:2011-01-28 09:17:43 点击:46 评论:0
能拿下webshell就叫0day算了 主页面 www.xxx.com/xx/index.asp (xx为此系统根目录) 出现漏洞的文件是YuQaIFS_Save.asp直接把提交的数据写入了数据库,毫无过滤。 部分漏洞代码 Select Case Send_id Case send Set rs=Server.CreateObject(ADODB.Recordset) Sql=Selec
Oracle Document Capture Insecure READ Method
  日期:2011-01-27 09:36:40 点击:51 评论:0
Source: http://packetstormsecurity.org/files/view/97872/DSECRG-11-007.txt Digital Security Research Group [DSecRG] Advisory DSECRG-11-007 (Internal #DSECRG-00117) Application: Oracle Document Capture Versions Affected: 10.1350.0005 Vendor URL: http:
Oracle Document Capture empop3.dll Insecure Methods
  日期:2011-01-27 09:36:13 点击:34 评论:0
Source: http://packetstormsecurity.org/files/view/97868/DSECRG-11-005.txt ActiveX components contain insecure methods. Digital Security Research Group [DSecRG] Advisory DSECRG-11-005 (internal #DSECRG-00154) Application: Oracle Document Capture Vers
Oracle Document Capture Actbar2.ocx Insecure Method
  日期:2011-01-27 09:35:23 点击:45 评论:0
Source: http://packetstormsecurity.org/files/view/97866/DSECRG-11-004.txt ActiveX components contain insecure methods. Digital Security Research Group [DSecRG] Advisory #DSECRG-00153 Application: Oracle Document Capture Versions Affected: Release 10
Oracle Document Capture 10.1.3.5 Insecure Method / Buffer Overflow
  日期:2011-01-27 09:34:11 点击:63 评论:0
Source: http://packetstormsecurity.org/files/view/97871/DSECRG-11-006.txt ActiveX components contain insecure methods. Digital Security Research Group [DSecRG] Advisory DSECRG-11-006 (internal #DSECRG-09-066) Application: Oracle Document Capture Ver
WordPress Recip.ly Plugin 1.1.7 Shell Upload
  日期:2011-01-26 09:51:09 点击:84 评论:0
# ------------------------------------------------------------------------# Software................WordPress Recip.ly Plugin 1.1.7# Vulnerability...........Arbitrary Upload# Download................http://wordpress.org/extend/plugins/uploader/# Rel
WordPress Uploader 1.0.0 Shell Upload
  日期:2011-01-26 09:50:18 点击:73 评论:0
# ------------------------------------------------------------------------# Software................WordPress Uploader 1.0.0# Vulnerability...........Arbitrary Upload# Download................http://wordpress.org/extend/plugins/uploader/# Release Da
Opera Web Browser 11.00 Integer Overflow Vulnerability
  日期:2011-01-26 09:48:45 点击:21 评论:0
# # #[+]Exploit Title: Exploit Integer Overflow Opera Web Browser 11.00 #[+]Date: 2412011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://get12.opera.com/pub/opera/win/1100/int/Opera_1100_int_Setup.exe #[+]Version: 11.00 #[+]Tested On: WIN-XP
Sun Microsystems SunScreen Firewall Root Exploit
  日期:2011-01-26 09:48:00 点击:37 评论:0
/* Sun Microsystems SunScreen Firewall Root Exploit discovered exploited by Kingcope January 2011 The SunScreen Firewall can be administrated remotely via a java protocol service which is running on port 3858 on a SunOS machine. This Java Service co
Automated Solutions Modbus/TCP OPC Server Remote Heap Corruption PoC
  日期:2011-01-26 09:47:25 点击:183 评论:0
#!/usr/bin/python # asmb-heap.py # Automated Solutions Modbus/TCP OPC Server Remote Heap Corruption PoC # Jeremy Brown [0xjbrown41-gmail-com] # Jan 2011 # # A specially crafted length field in a MODBUS packet header can trigger heap corruption. # #
Inetserv 3.23 POP3 Denial of Service
  日期:2011-01-25 09:34:14 点击:34 评论:0
#!/usr/bin/python # Exploit Title: Inetserv 3.23 POP3 DoS # Date: 1/24/2011 # Author: dmnt (thx G13 for base) # Software Link: http://www.avtronics.net/inetserv.php # Version: 3.23 # DoS in RETR and DELE import socket s = socket.socket(socket.AF_INE
Golden FTP Server v4.70 PASS Command Buffer Overflow Exploit
  日期:2011-01-24 09:40:09 点击:48 评论:0
#GoldenFTP 4.70 PASS Exploit #Authors: Craig Freyman (cd1zz) and Gerardo Iglesias Galvan (iglesiasgg) #Tested on XP SP3 #Vendor Contacted: 1/17/2011 (no response) #For this exploit to work correctly, you need to know the subnet that the server #is r
Inetserv 3.23 SMTP Denial of Service Vulnerability
  日期:2011-01-24 09:39:41 点击:21 评论:0
#!/usr/bin/python # Exploit Title: Inetserv 3.23 SMTP DoS # Date: 1/22/2011 # Author: G13 # Software Link: http://www.avtronics.net/inetserv.php # Version: 3.23 # Tested on: WinXP SP0 Eng import socket s = socket.socket(socket.AF_INET, socket.SOCK_S
BSD x86 portbind + fork shellcode (111 bytes)
  日期:2011-01-24 09:39:19 点击:37 评论:0
/* -------------- FreeBSD/x86 - portbind shell + fork (111 bytes)-------------------- * AUTHOR : Tosh * OS : BSDx86 (Tested on FreeBSD 8.1) * EMAIL : tosh@tuxfamily.org */ #include stdio.h #include string.h #include arpa/inet.h char shellcode [] =
共637页/12733条记录 首页 上一页 [307] [308] [309] 310 [311] [312] [313] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved