首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MS11-002: Microsoft Data Access Components Vulnerability
  日期:2011-01-14 17:19:43 点击:115 评论:0
html xmlns:t = urn:schemas-microsoft-com:time head meta name=License content=Q Public License;http://en.wikipedia.org/wiki/Q_Public_License style .body { } #test { } /style script src=heapLib.js/script script // This code has been released under the
Sinowal/Mebroot Bootkit Password Stealing Exploit
  日期:2011-01-14 17:10:56 点击:57 评论:0
#!/usr/bin/env pythonimport sysfrom socket import *xpsp2_ret = xe5x38xC8x74 # 0x74C838E5 OLEACCshort_jmp = xEBxD3x90x90detection_packet = x * 10beepshellcode = x55x89xE5x83xECx18xC7x45xFC \x77x7Ax83x7C \xC7x44x24x04 \xD0x0
Nokia Multimedia Player 1.0 SEH Unicode Exploit
  日期:2011-01-12 10:35:39 点击:58 评论:0
# Exploit Title: Nokia Multimedia player SEH Unicode # Date: January 11 2011 # Author: Carlos Mario Penagos Hollmann # Software Link: http://www.brothersoft.com/nokia-multimedia-player-download-46238.html # Version: 1.00.55.5010 # Tested on: Windows
Mono/Moonlight Generic Type Argument Local Privilege Escalation
  日期:2011-01-12 10:34:52 点击:51 评论:0
Source: http://www.securityfocus.com/bid/45051/info Mono and Moonlight is prone to a local privilege-escalation vulnerability. Local attackers can exploit this issue to execute arbitrary code with elevated privileges. Successful exploits will compro
ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
  日期:2011-01-12 10:32:20 点击:151 评论:0
### $Id: proftp_sreplace.rb 11526 2011-01-09 23:33:53Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information o
Solar FTP Server 2.1 Buffer Overflow
  日期:2011-01-12 10:31:42 点击:39 评论:0
# ------------------------------------------------------------------------# Software................Solar FTP Server 2.1# Vulnerability...........Buffer Overflow# Download................http://www.solarftp.com/# Release Date............1/10/2011# T
DriveCrypt <= 5.3 local kernel ring0 SYSTEM exploit
  日期:2011-01-12 10:30:49 点击:86 评论:0
/* drivecrypt-dcr.c * * Copyright (c) 2009 by mu-b@digit-labs.org * * DriveCrypt = 5.3 local kernel ring0 SYSTEM exploit * by mu-b - Sun 16 Aug 2009 * * - Tested on: DCR.sys * * Compile: MinGW + -lntdll * * - Private Source Code -DO NOT DISTRIBUTE -
DriveCrypt <= 5.3 local kernel arbitrary file read/write exploit
  日期:2011-01-12 10:30:09 点击:76 评论:0
/* drivecrypt-fopen.c * * Copyright (c) 2009 by mu-b@digit-labs.org * * DriveCrypt = 5.3 local kernel arbitrary file read/write exploit * by mu-b - Sun 16 Aug 2009 * * - Tested on: DCR.sys * * Compile: MinGW + -lntdll * * - Private Source Code -DO N
Utimaco Safeware AG (Sophos) - SafeGuard PrivateDisk write header exploit
  日期:2011-01-12 10:29:29 点击:200 评论:0
/* safeguard-pdisk-write-header.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * Utimaco Safeware AG (Sophos) - SafeGuard PrivateDisk write header exploit * by mu-b - Wed 05 Mar 2008 * * - Tested on: privatediskm.sys 2.2.0.16 * (= Utimaco Safewar
Utimaco Safeware AG (Sophos) - SafeGuard PrivateDisk unmount exploit
  日期:2011-01-12 10:28:15 点击:103 评论:0
/* safeguard-pdisk-unmount.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * Utimaco Safeware AG (Sophos) - SafeGuard PrivateDisk unmount exploit * by mu-b - Wed 05 Mar 2008 * * - Tested on: privatediskm.sys 2.2.0.16 * (= Utimaco Safeware AG (Soph
Lotus CMS Fraise v3.0 LFI - Remote Code Execution Exploit
  日期:2011-01-11 09:46:27 点击:165 评论:0
#!/usr/bin/python # Lotus CMS Fraise v3.0 LFI - Remote Code Execution Exploit # greetz Tecr0C :0) # # Vuln: lines 15-23 in core/lib/router.php #---------- sof # //Get page request (if any) # $page = $this-getInputString(page, index); # # //Get plugi
MS10-081: Windows Common Control Library (Comctl32) Heap Overflow
  日期:2011-01-11 09:45:48 点击:114 评论:0
#!/usr/bin/env ruby # http://breakingpointsystems.com/community/blog/microsoft-vulnerability-proof-of-concept # Nephi Johnson require 'socket' def http_send(sock, data, opts={}) defaults = {:code=200, :message=OK, :type=text/html, :desc=content} opt
LOCAL SOLARIS KERNEL ROOT EXPLOIT (< 5.10 138888-01)
  日期:2011-01-11 09:45:09 点击:144 评论:0
/*********************************************************** * hoagie_solaris_siocgtunparam.c * LOCAL SOLARIS KERNEL ROOT EXPLOIT ( 5.10 138888-01) - CVE-2008-568 * * Bug reported by Tobias Klein * http://www.trapkit.de/advisories/TKADV2008-015.txt
Macro Express Pro 4.2.2.1 MXE File Syntactic Analysis Buffer Overflow PoC
  日期:2011-01-11 09:44:22 点击:103 评论:0
#!/usr/local/bin/perl # # # Macro Express Pro 4.2.2.1 MXE File Syntactic Analysis Buffer Overflow PoC # # # Vendor: Insight Software Solutions, Inc. # Product web page: http://www.macros.com # Affected version: 4.2.2.1 and 4.2.1.1 # # Summary: Macro
KingView 6.5.3 SCADA HMI Heap Overflow PoC
  日期:2011-01-10 09:25:37 点击:127 评论:0
## Exploit Title: KingView 6.5.3 SCADA HMI Heap Overflow PoC ## Date: 9/28/2010 ## Author: Dillon Beresford ## Software Link: http://download.kingview.com/software/kingview%20English%20Version/kingview6.53_EN.rar ## Version: 6.53 (English) ## Tested
IrfanView 4.28 Multiple Denial of Service Vulnerabilities
  日期:2011-01-10 09:24:41 点击:58 评论:0
# done by BraniX branix@hackers.org.pl # www.hackers.org.pl # found: 2011.01.06 # published: 2011.01.08 # tested on: Windows XP SP3 Home Edition # Windows XP SP3 Professional # App: IrfanView 4.28 # DoS, Integer division by zero. Unhandled exception
Linux Kernel CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit)
  日期:2011-01-10 09:22:48 点击:142 评论:0
/* * Linux Kernel CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit) * by Joe Sylve * @jtsylve on twitter * * Released: Jan 7, 2011 * * Based on the bug found by Dan Rosenberg (@djrbliss) * only loosly based on his exploit http://www.exploit-db.com/exp
Winamp 5.5.8 (in_mod plugin) Stack Overflow Exploit (SEH)
  日期:2011-01-10 09:22:13 点击:47 评论:0
#!/usr/bin/python # finally got time to finish what I started... # Winamp 5.5.8.2985 (in_mod plugin) Stack Overflow (SEH) # WINDOWS XP SP3 EN Fully Patched # Bug found by http://www.exploit-db.com/exploits/15248/ # POC and Exploit by fdisk # This PO
HP Data Protector Manager v6.11 Remote DoS in RDS Service
  日期:2011-01-10 09:21:32 点击:69 评论:0
HP Data Protector Manager v6.11 Remote DoS in RDS Service # =============================== # HP Data Protector Manager v6.11 # =============================== # # Bug: Remote Denial of Service Vulnerabilities (RDS Service) # # Software: http://h710
NetSupport Manager Agent Remote Buffer Overflow
  日期:2011-01-10 09:20:52 点击:43 评论:0
#!/usr/bin/perl # # NetSupport Manager Agent Remote Buffer Overflow # Product details: http://www.netsupportmanager.com/ # # This vulnerability affects the following software: # # [Vulnerable] # NetSupport Manager for Linux v11.00 and likely all pre
共637页/12733条记录 首页 上一页 [309] [310] [311] 312 [313] [314] [315] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved