首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
VideoSpirit Pro <= v1.68 Local BoF Exploit
  日期:2011-01-10 09:19:46 点击:43 评论:0
# Exploit Title: VideoSpirit Pro v1.68 Local BoF Exploit # Date: 01/08/2011 # Author: xsploitedsec # URL: http://www.x-sploited.com/ # Contact: xsploitedsec[at]x-sploited.com # Software Link: http://www.verytools.com/videospirit/download.html # Vuln
BS.Player 2.57 Buffer Overflow Exploit (Unicode SEH)
  日期:2011-01-10 09:19:18 点击:43 评论:0
# # #[+]Exploit Title: Exploit Buffer Overfloe Bsplayer 2.57(UNICODE-SEH) #[+]Date: 0172010 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.bsplayer.com/services/downlad-free-bsplayer.php?type=2 #[+]Version: 2.57 #[+]Tested on: WIN-XP SP3
Enzip 3.00 Buffer Overflow
  日期:2011-01-10 09:18:41 点击:50 评论:0
#[+]Exploit Title: Exploit Buffer Overflow Enzip 3.00#[+]Date: 0162011#[+]Author: C4SS!0 G0M3S#[+]Software Link: http://www.bcuc.ac.uk/files/enzip300.exe#[+]Version: 3.00#[+]Tested on: WIN-XP SP3 PORTUGUESE BRAZILIAN#[+]CVE: N/A###Create BY C4SS!
proftpd multiple exploit for VU#912279 (only with GNU libc/regcomp(3))
  日期:2011-01-10 09:08:43 点击:60 评论:0
#include stdio.h#include stdlib.h#include string.h#include sys/types.h#include sys/socket.h#include netinet/in.h#include netdb.h/* proftpd multiple exploit for VU#912279 (only with GNU libc/regcomp(3))by Maksymilian ArciemowiczReferences:http://www.
Enzip 3.00 Buffer Overflow Exploit
  日期:2011-01-07 09:56:14 点击:30 评论:0
#[+]Exploit Title: Exploit Buffer Overflow Enzip 3.00 #[+]Date: 0162011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.bcuc.ac.uk/files/enzip300.exe #[+]Version: 3.00 #[+]Tested on: WIN-XP SP3 PORTUGUESE BRAZILIAN #[+]CVE: N/A # # #Create
Microsoft Windows CreateSizedDIBSECTION Stack Buffer Overflow
  日期:2011-01-07 09:55:37 点击:75 评论:0
### $Id: ms11_xxx_createsizeddibsection.rb 11473 2011-01-04 23:00:45Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for mor
Concrete CMS 5.4.1.1 XSS / Code Execution
  日期:2011-01-07 09:49:39 点击:76 评论:0
#!/usr/bin/python# Concrete CMS v5.4.1.1 xss/remote code execution exploit# Download: http://www.concrete5.org/# Special Zeitgeist pre release - Moving Forward - 15th Jan 2011# They must find it difficult, those who take authority as the truth inste
Linux Kernel CAP_SYS_ADMIN to root Exploit
  日期:2011-01-06 10:26:48 点击:242 评论:0
/* * Linux Kernel CAP_SYS_ADMIN to root exploit * by Dan Rosenberg * @djrbliss on twitter * * Usage: * gcc -w caps-to-root.c -o caps-to-root * sudo setcap cap_sys_admin+ep caps-to-root * ./caps-to-root * * This exploit is NOT stable: * * * It only w
Concrete CMS v5.4.1.1 XSS/Remote Code Execution Exploit
  日期:2011-01-06 10:23:21 点击:84 评论:0
#!/usr/bin/python # Concrete CMS v5.4.1.1 xss/remote code execution exploit # Download: http://www.concrete5.org/ # Special Zeitgeist pre release - Moving Forward - 15th Jan 2011 # They must find it difficult, those who take authority as the truth i
PhpGedView <= 4.2.3 Local File Inclusion Vulnerability
  日期:2011-01-06 10:22:08 点击:41 评论:0
#!/usr/bin/perl -w # :::::::-. ... ::::::. :::. # ;;, `';, ;; ;;;`;;;;, `;;; # `[[ [[[[' [[[ [[[[[. '[[ # $$, $$$$ $$$ $$$ Y$c$$ # 888_,o8P'88 .d888 888 Y88 # MMMMP` YmmMMMM MMM YM # [ Discovered by dun posdub[at]gmail.com ] # ####################
Xynph 1.0 USER Denial of Service Exploit
  日期:2011-01-06 10:19:31 点击:28 评论:0
# Exploit Title: Xynph 1.0 USER Denial of Service Exploit # Date: 04.01.2011 # Author: freak_out # Version: 1.0 # Tested on: Windows XP SP3 # Type: DOS/POC # Greetings: anco, mahjong, puddy, st!x, war10ck, fraggle, DarthShredder, krzym, starslayer,
Music Animation Machine MIDI Player SEH BOF
  日期:2011-01-05 09:57:34 点击:89 评论:0
# Exploit Title: Music Animation Machine MIDI Player MAMX SEH BOF # Date 1/4/2011 # Author: Acidgen mailto:spam(a t h)grayhat.se # Software Link: http://www.musanim.com/player/MAMPlayer2006aug19_035.zip # Version: 2006aug19 Release 035 # Tested on:
CSAW CTF Kernel Exploitation Challenge
  日期:2011-01-04 10:31:01 点击:941 评论:0
Jon Oberheide在CTF上给出了一个kernel exploitation的挑战: http://jon.oberheide.org/blog/2010/11/02/csaw-ctf-kernel-exploitation-challenge/ , 其实就是一个kernel stack overflow的溢出, 据说在给定期间只有一支队伍完成了exploit程序, 拿到了通关文件。 我周
Wireshark ENTTEC DMX Data RLE Buffer Overflow Vulnerability
  日期:2011-01-04 10:23:23 点击:53 评论:0
Source: http://www.securityfocus.com/bid/45634/info #!/usr/bin/env python # Wireshark ENTTEC DMX Data (UDP) Buffer Overflow PoC # by non-customers crew in 2010 # http://rock-madrid.com/ import socket, sys try: host = sys.argv[1] except: print usage:
Music Animation Machine MIDI Player Local Crash PoC
  日期:2011-01-04 10:22:51 点击:57 评论:0
# Exploit Title: Music Animation Machine MIDI Player Local Crash PoC # Date: 1/3/2011 # Author: c0d3R'Z # Software Link: http://www.musanim.com/player/MAMPlayer2006aug19_035.zip # Version: Release 035 # Tested on: Windows XP SP2 EN (VirtualBox) # Th
CoolPlayer 2.18 DEP Bypass
  日期:2011-01-04 10:22:21 点击:75 评论:0
# Exploit Title: CoolPlayer 2.18 DEP Bypass # Date: January 2, 2011 # Author: Blake # Version: 2.18 # Tested on: Windows XP SP3 running in Virtualbox # Uses SetProcessDEPPolicy() to disable DEP for the process # Thanks to mr_me for the encouragement
MS10-073 Windows Class Handling Vulnerability
  日期:2011-01-04 10:21:55 点击:59 评论:0
#include windows.h /* Source: http://mista.nu/blog/2010/12/01/windows-class-handling-gone-wrong/ */ int main(int argc, char **argv) { WNDCLASSA Class = {0}; CREATESTRUCTA Cs = {0}; FARPROC MenuWindowProcA; HMODULE hModule; HWND hWindow; Class.lpfnWn
Amoeba CMS v1.01 multiple remote vulnerabilities
  日期:2011-01-04 10:20:45 点击:71 评论:0
#!/usr/bin/python Amoeba CMS v1.01 multiple remote vulnerabilities: Vendor: http://www.amoebacms.com/ Found by: mr_me Contact date: 20/12/2010 2:37pm EST SQL Injection: ============= There is quite a few instances of pre/post auth SQL Injection in t
Bywifi 2.8.1 Stack Buffer Overflow Exploit
  日期:2011-01-04 10:20:13 点击:40 评论:0
# Exploit Title: [bywifi 2.8.1 stack buffer overflow] # Author: [Anonymous] # Software Link: [bywifi.com] # Version: [2.8.1] # Tested on: [windows xp Professional French ] # CVE : [N/a] #include windows.h #include string.h #include stdio.h int main(
HP Photo Creative 2.x audio.Record.1 ActiveX Control Remote Stack Based Buffer O
  日期:2011-01-04 10:19:42 点击:67 评论:0
!-- HP Photo Creative v 2.x audio.Record.1 ActiveX Control (ContentMan.dll 1.0.0.4272) Remote Stack Based Buffer Overflow poc by rgod tested against Windows Vista / IE 7 download url: http://www.hp.com/global/us/en/consumer/digital_photography/free/
共637页/12733条记录 首页 上一页 [310] [311] [312] 313 [314] [315] [316] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved