首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
BSD x86 connect back Shellcode (81 bytes)
  日期:2011-01-24 09:38:55 点击:52 评论:0
/* -------------- FreeBSD/x86 - connect back /bin/sh. 81 bytes ---------------- * AUTHOR : Tosh * OS : BSDx86 (Tested on FreeBSD 8.1) * EMAIL : tosh@tuxfamily.org */ #include stdio.h #include string.h #include arpa/inet.h char shellcode [] = x31xc
Panda Global Protection 2010 local Dos (unfiltered wcscpy())
  日期:2011-01-24 09:38:26 点击:79 评论:0
#include windows.h #include string.h #include ddk/ntapi.h #include tlhelp32.h #define SystemModuleInfo 11 /* Program : Panda Global Protection 2010 (3.01.00) Homepage : http://www.pandasecurity.com Discovery : 2010/04/09 Author Contacted : 2010/07/1
Panda Global Protection 2010 local Dos
  日期:2011-01-24 09:38:02 点击:57 评论:0
#include stdio.h #include windows.h #include winioctl.h #include stdlib.h #include string.h /* Program : Panda Global Protection 2010 (3.01.00) Homepage : http://www.pandasecurity.com Discovery : 2010/04/09 Author Contacted : 2010/07/15 Status of vu
Look n stop 0day Local Dos
  日期:2011-01-24 09:37:07 点击:51 评论:0
#include stdio.h #include windows.h #include winioctl.h #include stdlib.h #include string.h /* Program : Look 'n' Stop 2.06p4 / 2.07 (6.0.2900.5512) Homepage : http://www.looknstop.com Discovery : 2009/11/08 Author Contacted : 2010/07/15 ... no repl
ALZip 8.12.0.3 Buffer Overflow (SEH)
  日期:2011-01-24 09:30:48 点击:63 评论:0
# # #[+]Exploit Title: Exploit Buffer Overflow AlZip(SEH) #[+]Date: 01192010 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.altools.com/al/downloads/alzip/ALZip812.exe #[+]Version: 8.12.0.3 #[+]Tested on: WIN-XP SP3 PORTUGUESE BRAZILIAN #[
Novell iPrint <= 5.52 ActiveX GetDriverSettings() Remote Exploit (ZDI-10-256)
  日期:2011-01-24 09:29:58 点击:37 评论:0
!-- Novell iPrint = 5.52 ActiveX GetDriverSettings() Remote Exploit (ZDI-10-256) Coded By:Dr_IDE Reference: http://www.zerodayinitiative.com/advisories/ZDI-10-256/ Reference: http://www.vupen.com/english/advisories/2010/3023 Tested On:Windows XP SP3
Google Chrome v8.0.552.237 address overflow DoS
  日期:2011-01-19 13:12:01 点击:32 评论:0
html head # Title: Google Chrome v8.0.552.237 address overflow DoS # CVE-ID: () # OSVDB-ID: () # Author: Vuk Ivanovic # Published: 2011-01-17 # Verified: yes # Google Chrome v8.0.552.237 address overflow DoS # # Tested on: Windows XP, SP2 (EN), Wind
CakePHP <= 1.3.5 / 1.2.8 unserialize() Vulnerability
  日期:2011-01-19 13:11:21 点击:96 评论:0
Source: http://securityreason.com/securityalert/8026 CakePHP = 1.3.5 / 1.2.8 unserialize() Vulnerability felix |at| malloc.im =========================================================================== ==== Overview: CakePHP is a rapid development f
A-PDF All to MP3 Converter 2.0.0 (.wav) Buffer Overflow Exploit
  日期:2011-01-19 13:10:14 点击:35 评论:0
# Exploit Title: A-PDF All to MP3 Converter v.2.0.0 stack based buffer overflow # Software Link: http://www.a-pdf.com/all-to-mp3/download.htm # Version: = 2.0.0 # Tested on: Win XP SP3 French # Date: 17/01/2011 # Author: h1ch4m #Email: h1ch4m@live.f
Mini-Stream RM-MP3 Converter Buffer Overflow
  日期:2011-01-19 13:01:11 点击:4183 评论:0
# Title : Mini-stream RM-MP3 Converter Buffer Overflow Exploit# Author : ZoRLu# Proof : http://img843.imageshack.us/img843/3144/buffer.jpg# Desc. : usr: zrl , pass: 123456 , localgroup: Administrator#Tested : xp/sp3# mail-msn : admin@yildirimordular
ActiveX UserManager 2.03 Buffer Overflow
  日期:2011-01-17 10:28:47 点击:30 评论:0
htmlobject classid='clsid:E5D2CE27-5FA0-11D2-A666-204C4F4F5020' id='target'/objectscript language='vbscript'' Exploit Title: ActiveX UserManager 2.03 Buffer Overflow' Date: January 16, 2011' Author: Blake' Software Link: http://www.brothersoft.com/a
Kingsoft AntiVirus 2011 SP5.2 KisKrnl.sys <= 2011.1.13.89 Local Kernel Mode DoS
  日期:2011-01-17 10:27:15 点击:26 评论:0
# Kingsoft AntiVirus 2011 SP5.2 KisKrnl.sys = 2011.1.13.89 Local Kernel Mode D.O.S Exploit# Date: 2011-1-16# Author: MJ0011# Software Link: http://cd001.www.duba.net/duba/install/2011/once/KAV110114_DOWN_9_13.exe# Version: KingSoft AntiVirus 2011 SP
MeshCMS v3.5 Remote Code Execution Exploit
  日期:2011-01-17 10:25:33 点击:114 评论:0
#!/usr/bin/python# MeshCMS v3.5 remote code execution exploit# Environment:# Tomcat 7.02/ubuntu 10.04## 1) details:# There is a add member/editor/admin CSRF vulnerability in this CMS which is very clean for an attacker. # The admin will not be told
eXtremeMP3 Player Buffer Overflow (SEH)
  日期:2011-01-17 10:25:00 点击:30 评论:0
###[+]Exploit Title: Exploit Bufer Overflow eXtremeMP3 Player(SEH)#[+]Date: 01152010#[+]Author: C4SS!0 G0M3S#[+]Software Link: http://ukms.tucows.com/files2/xtremv20RC1.exe#[+]Version: 2.0#[+]Tested on: WIN-XP SP3 BRAZILIAN#[+]CVE: N/A##Create by
Real Networks RealPlayer SP 'RecordClip' Method Remote Code Execution
  日期:2011-01-17 10:22:33 点击:26 评论:0
Sources: http://www.securityfocus.com/bid/44443/info http://packetstormsecurity.org/files/view/97522/recordingmanager-ie.txthtmlpWritten by Sean de Regge (seanderegge hotmail.com)Exploit for the parameter injection bug in Realplayers RecordClip() ac
Blackmoon FTP 3.1 Denial Of Service
  日期:2011-01-17 10:21:47 点击:18 评论:0
#!/usr/bin/python # Exploit Title: BlackmoonFTP Server DOS# Date: 12/28/2010# Author: Craig Freyman (cd1zz)# Software Link: http://www.mediafire.com/?bnc4d00myymmx55# Version: 3.1 Release 6 - Build 1735 and 1736# Tested On: Windows XP SP3# Vendor Co
VMWare Denial Of Service / Privilege Escalation
  日期:2011-01-14 17:24:22 点击:94 评论:0
two security relevant vulnerabilities have been discovered affecting arange of the VMWare virtualization product line.- Denial of Service vulnerability allowing an unprivileged user to crash- Vulnerability allowing an unprivileged user to escalate p
Objectivity/DB Lack of Authentication Remote Exploit
  日期:2011-01-14 17:23:34 点击:67 评论:0
#!/usr/bin/python # obj.py # Objectivity/DB Lack of Authentication Remote Exploit # Jeremy Brown [0xjbrown41-gmail-com] # Jan 2011 # # Objectivity, Inc. is a leader in distributed, scalable database technology. # Our patented data management engine
SiteScape Enterprise Forum 7 TCL Injection
  日期:2011-01-14 17:22:30 点击:61 评论:0
# Exploit Title: SiteScape TCL Injection # Date: December 7, 2010 # Author: Spencer McIntyre (zeroSteiner) SecureState RD Team # Version: SiteScape Enterprise Forums version 7 # Tested on: SunOS spitfire 5.10 # CVE : 2007-6515 #!/usr/bin/env python
MS10-073: Win32k Keyboard Layout Vulnerability
  日期:2011-01-14 17:20:37 点击:63 评论:0
// My koala is staring at you CgD // Source: http://reversemode.com/index.php?option=com_contenttask=viewid=71Itemid=1 #include windows.h #include stdio.h #include ntsecapi.h #define MAGIC_OFFSET 0x6261 #define InitializeUnicodeStr(p,s) { (p)-Lengt
共637页/12733条记录 首页 上一页 [308] [309] [310] 311 [312] [313] [314] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved