首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Kolibri v2.0 Buffer Overflow RET + SEH exploit (HEAD)
  日期:2010-12-27 10:48:57 点击:85 评论:0
#!/usr/bin/env python # _ ____ __ __ ___ # (_)____ _ __/ __ / /_____ ____/ / _/_/ | # / // __ | / / / / / //_/ _ / __ / / / / / # / // / / / |/ / /_/ / , / __/ /_/ / / / / / # /_//_/ /_/|___/____/_/|_|___/__,_/ / /_/_/ # Live by the byte |_/_
HttpBlitz Web Server Denial Of Service
  日期:2010-12-27 10:47:59 点击:31 评论:0
#!/usr/bin/python # Title: HttpBlitz DOS# Date: 12/24/2010# Author: otoy# Software Link: http://sourceforge.net/projects/httpblitz/files/HttpBlitz.msi/download# Tested on: Windows XP SP3## ============================================================
Mitel Audio and Web Conferencing Command Injection
  日期:2010-12-24 12:11:13 点击:102 评论:0
### $Id: mitel_awc_exec.rb 11389 2010-12-21 19:16:18Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
Microsoft WMI Administration Tools ActiveX Buffer Overflow
  日期:2010-12-24 12:10:45 点击:173 评论:0
### $Id: wmi_admintools.rb 11405 2010-12-23 01:36:54Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on
DorsaCms SQL Injection Vulnerability
  日期:2010-12-23 11:21:48 点击:68 评论:0
--------------------------------------------------------- Portal Name: DorsaCms SQL Injection Vulnerability software : http://dorsagroup.ir Author : d3c0der - d3c0der@hotmail.com Date : 16.12.2010 homepage : www.attackerz.ir spt : netqurd - maarek -
WMITools ActiveX Remote Command Execution Exploit 0day
  日期:2010-12-23 11:20:04 点击:98 评论:0
html object classid=clsid:2745E5F5-D234-11D0-847A-00C04FD7BB08 id=target/object SCRIPT language=JavaScript //run calc.exe var shellcode = unescape(%uc92b%ue983%ud9de%ud9ee%u2474%u5bf4%u7381%u0c13%u452b%u83df%ufceb%uf4e2%uc3f0%udf01%u2b0c%u9ace%ua030
Citrix Access Gateway Command Injection Vulnerability
  日期:2010-12-23 11:19:38 点击:84 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VSR Security Advisory http://www.vsecurity.com/ - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Advisory Name: Citrix Access Gateway Command Injection Vulnerability Rele
Apple iPhone Safari (JS .) Remote Crash
  日期:2010-12-23 11:18:54 点击:55 评论:0
?php # _ ____ __ __ ___ # (_)____ _ __/ __ / /_____ ____/ / _/_/ | # / // __ | / / / / / //_/ _ / __ / / / / / # / // / / / |/ / /_/ / , / __/ /_/ / / / / / # /_//_/ /_/|___/____/_/|_|___/__,_/ / /_/_/ # Live by the byte |_/_/ # # Members: # #
Windows 7 IIS7.5 FTPSVC UNAUTH'D Remote DoS PoC
  日期:2010-12-22 09:56:22 点击:184 评论:0
import socket, sys print n print ---------------------------------------------------------------- print | Windows 7 IIS7.5 FTPSVC UNAUTH'D REMOTE DOS POC | print | Matthew Bergin, Bergin Penetration Testing | print | Win7 Ultimate v6.1 build 7600,
Apple iPhone Safari (decodeURIComponent) Remote Crash
  日期:2010-12-22 09:55:46 点击:26 评论:0
?php # _ ____ __ __ ___ # (_)____ _ __/ __ / /_____ ____/ / _/_/ | # / // __ | / / / / / //_/ _ / __ / / / / / # / // / / / |/ / /_/ / , / __/ /_/ / / / / / # /_//_/ /_/|___/____/_/|_|___/__,_/ / /_/_/ # Live by the byte |_/_/ # # Members: # #
Internet Explorer CSS Recursive Import Use After Free
  日期:2010-12-22 09:54:04 点击:85 评论:0
### $Id: ms11_xxx_ie_css_import.rb 11383 2010-12-20 16:34:07Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more inform
Apple iPhone Safari (decodeURI) Remote Crash
  日期:2010-12-21 09:21:31 点击:48 评论:0
?php # _ ____ __ __ ___ # (_)____ _ __/ __ / /_____ ____/ / _/_/ | # / // __ | / / / / / //_/ _ / __ / / / / / # / // / / / |/ / /_/ / , / __/ /_/ / / / / / # /_//_/ /_/|___/____/_/|_|___/__,_/ / /_/_/ # Live by the byte |_/_/ # # Members: # #
Apple iPhone Safari (body alink) Remote Crash
  日期:2010-12-21 09:20:42 点击:31 评论:0
?php # _ ____ __ __ ___ # (_)____ _ __/ __ / /_____ ____/ / _/_/ | # / // __ | / / / / / //_/ _ / __ / / / / / # / // / / / |/ / /_/ / , / __/ /_/ / / / / / # /_//_/ /_/|___/____/_/|_|___/__,_/ / /_/_/ # Live by the byte |_/_/ # # Members: # #
Accmeware MP3 Cut 5.0.9 DoS PoC
  日期:2010-12-21 09:19:23 点击:19 评论:0
# Exploit Title: Accmeware MP3 Cut 5.0.9 DoS PoC # Date: 12/20/2010 # Author: 0v3r # Software Link: http://www.mp3-cutter-splitter.com/Files/MCSetup.exe # Version: 5.0.9 # Tested on: Windows XP SP3 EN (VirtualBxox) # CVE: N/A # The application crash
Accmeware MP3 Speed 5.0.9 DoS PoC
  日期:2010-12-21 09:18:45 点击:41 评论:0
# Exploit Title: Accmeware MP3 Speed 5.0.9 DoS PoC # Date: 12/20/2010 # Author: 0v3r # Software Link: http://www.mp3-cutter-splitter.com/Files/MSSetup.exe # Version: 5.0.9 # Tested on: Windows XP SP3 EN (VirtualBxox) # CVE: N/A # The application cra
Accmeware MP3 Joiner Pro 5.0.9 DoS PoC
  日期:2010-12-21 09:18:18 点击:35 评论:0
# Exploit Title: Accmeware MP3 Joiner Pro 5.0.9 DoS PoC # Date: 12/20/2010 # Author: 0v3r # Software Link: http://www.mp3-joiner.net/Files/MJPSetup.exe # Version: 5.0.9 # Tested on: Windows XP SP3 EN (VirtualBxox) # CVE: N/A # The application crashe
MP3 CD Converter Professional BoF (SEH)
  日期:2010-12-21 09:17:41 点击:40 评论:0
#!/usr/bin/python # # #Python File Created BY C4SS!0 G0MES #http://www.invasao.com.br #Louredo_@hotmail.com # # #[+]Exploit Titule: Exploit Buffer Overflow MP3 CD Converter Professional(SEH) #[+]Date: 12/20/2010 #[+]Author: C4SS!0 G0M3S #[+]Software
Word Splash Pro <= 9.5 Buffer Overflow
  日期:2010-12-21 09:13:29 点击:21 评论:0
# Exploit Title: Word Splash Pro = 9.5 Buffer Overflow -EggHunter- # Software Link: http://www.chronasoft.com/software/wordsplashpro # Version: = 9.5 # Tested on: Win XP SP3 French # Date: 20/12/2010 # Author: h1ch4m #Email: h1ch4m@live.fr #Home: Ne
Virtual Store Open 3.0 Acess SQL Injection
  日期:2010-12-20 10:25:21 点击:61 评论:0
#!/usr/bin/perl # # Script Name: Virtual Store Open = 3.0 # Link1 : http://www.virtuastore.com.br/shopping.asp?link=ShoppingVirtuaStore # Link2 : http://www.virtuastore2010.com.br/ # Link3 Yahoo Group : http://br.groups.yahoo.com/group/virtuastore/
Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation
  日期:2010-12-20 10:23:06 点击:209 评论:0
/* * american-sign-language.c * * Linux Kernel 2.6.37-rc2 ACPI custom_method Privilege Escalation * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4347 * * This
共637页/12733条记录 首页 上一页 [312] [313] [314] 315 [316] [317] [318] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved