首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
FreeTrim MP3 2.2.3 Denial of Service Vulnerability
  日期:2010-12-03 10:36:48 点击:26 评论:0
####Exploit Title: FreeTrim MP3 Local Crash PoC ####Software Link: http://www.freetrimmp3.com/downloads/FreeTrimMP3.exe ####Tested on: Win XP SP3 ####Date: 02-12-2010 ####Author: h1ch4m ####Email: h1ch4m@live.fr #####################################
J-Integra v2.11 ActiveX SetIdentity() Buffer Overflow Exploit
  日期:2010-12-02 11:04:03 点击:44 评论:0
!-- Exploit Title:J-Integra v2.11 ActiveX SetIdentity() Buffer Overflow Exploit Found By:Dr_IDE Download: http://j-integra.intrinsyc.com/ Greets: bz1p, bz1p@bshellz.net for finding the app. Tested on: XP SP3 IE7 CVE: (0day) Notes:This is not the sam
Apple Directory Services Memory Corruption
  日期:2010-12-02 11:03:31 点击:60 评论:0
Apple Directory Services Memory Corruption CVE-2010-1840 INTRODUCTION chfn, chpass and chsh dos not properly parse authname switch (-u), which causes the applications to crash when parsing a long string. Those binaries are setuid root by default. Th
HP Data Protector Manager A.06.11 MMD NULL Pointer Dereference Denial of Service
  日期:2010-12-02 11:02:53 点击:29 评论:0
#!/usr/bin/perl # ================================= # HP Data Protector Manager A.06.11 # ================================= # # Bug: NULL Pointer Dereference Remote Denial of Service Vulnerability # # Software: http://h71028.www7.hp.com/enterprise/w
J-Integra v2.11 Remote Code Execution Exploit
  日期:2010-12-02 11:02:04 点击:141 评论:0
html !-- j-integra v2.11 Remote code execution vulnerability Discovered on: Thursday, October 28, 2010, 10:10:12 PM Download: http://j-integra.intrinsyc.com/ Author: bz1p, bz1p@bshellz.net impact: LOW, due to the object NOT marked safe for scripting
Provj 5.1.5.5 (m3u) Buffer Overflow Vulnerability PoC
  日期:2010-12-01 10:35:59 点击:23 评论:0
# Exploit Title: Provj 5.1.5.5 (m3u) Buffer Overflow Vulnerability PoC # Date: 11/30/2010 # Author: 0v3r # Software Link: http://www.clubdjpro.com/files/provj5.exe # Version: 5.1.5.5 # Tested on: Windows XP SP3 EN # CVE: N/A #!/usr/bin/python buff =
VMware 2 Web Server Directory Traversal
  日期:2010-11-30 11:10:42 点击:45 评论:0
# Exploit Title:VMware 2 Web Server Directory Traversal # Date:15/11/2010 # Author: clshack # Software Link: http://www.vmware.com/products/server/ # Version:2.0.2 # Tested on: windows xp sp3 en # CVE : VMWARE: http://localhost:8307/ http://localhos
FoxPlayer v2.4.0 Denial of Service
  日期:2010-11-30 11:09:59 点击:33 评论:0
# Exploit Title: FoxPlayer 2.4.0 (.m3u) Denial of Service # Date: 30 / 11 / 2010 # Author: Oh Yaw Theng # Software Link: http://www.foxmediatools.com/installers/fox-player-setup.exe # Version: v2.4.0 # Tested on: Windows XP SP 2 # CVE : N / A # Desc
HP LaserJet Directory Traversal in PJL Interface
  日期:2010-11-30 11:07:48 点击:79 评论:0
n.runs AG http://www.nruns.com/ security(at)nruns.com n.runs-SA-2010.003 16-Nov-2010 ________________________________________________________________________ Vendor: Hewlett-Packard, http://www.hp.com Affected Products: Various HP LaserJet MFP devic
Mediacoder 0.7.5.4792 Buffer Overflow Exploit (SEH)
  日期:2010-11-30 11:07:11 点击:36 评论:0
# Exploit Title: Mediacoder 0.7.5.4792 SEH Buffer Overflow Exploit # Date: 11/29/2010 # Author: 0v3r # Software Link: http://www.mediacoderhq.com/mirrors.htm?file=MediaCoder-0.7.5.4792.exe # Version: 0.7.5.4792 # Tested on: Windows XP SP3 EN # CVE:
Hanso Player Version 1.4.0 (.m3u) Denial of Service Vulnerability
  日期:2010-11-29 10:23:58 点击:28 评论:0
=================================================== Hanso Player Version 1.4.0 (.m3u) Denial of Service Vulnerability =================================================== .....................X-SHADOW ; ThBa7 ; KloofQ8 ; LeGEnD ; abada ... ..........
OTSTurntables 1.00.048 (m3u/ofl) Local BOF Exploit (SEH)
  日期:2010-11-29 10:23:01 点击:55 评论:0
# Exploit Title: OTSTurntables 1.00.028 (m3u/ofl) Local BOF Exploit (SEH) # Date: 11/24/2010 # Author: 0v3r # Software Link: http://www.otsturntables.com/download-otsturntables-free/ # Version: 1.00.048 # Tested on: Windows XP SP3 EN # CVE: N/A #!/u
CA Internet Security Suite 2010 KmxSbx.sys Kernel Pool Overflow 0 day Exploit
  日期:2010-11-29 10:18:09 点击:172 评论:0
/* # Exploit Title: CA Internet Security Suite 2010 KmxSbx.sys Kernel Pool Overflow 0-day Exploit # Date: 2010-11-28 # Author: Nikita Tarakanov (CISS Research Team) # Software Link: http://shop.ca.com/ca/products/internetsecurity/internetsecurity_su
MemHT Portal 4.0.1 [user agent] Persistent Cross Site Scripting
  日期:2010-11-29 10:16:57 点击:77 评论:0
#!/usr/bin/perl # MemHT Portal 4.0.1 Persistent Cross Site Scripting Vulnerability [user agent] # by ZonTa - zontahackers[at]gmail[dot]com # # After successful inject wait for the admin to view statistic page. # Fix is available : http://www.memht.c
Linux Kernel Unix Sockets Local Denial of Service
  日期:2010-11-29 10:09:37 点击:78 评论:0
Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :( Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :( See source attached. Process become i
Local Root Privilege Escalation Vulnerability in systemtap
  日期:2010-11-29 10:01:25 点击:128 评论:0
CVE-2010-4170 printf install uprobes /bin/sh exploit.conf; MODPROBE_OPTIONS=-C exploit.conf staprun -u whatever RHEL Advisory: https://rhn.redhat.com/errata/RHSA-2010-0894.html
Linux Kernel 'setup_arg_pages()' Denial of Service Vulnerability
  日期:2010-11-26 13:54:33 点击:81 评论:0
Source: http://www.securityfocus.com/bid/44301/info /* known for over a year, fixed in grsec bug is due to a bad limit on the max size of the stack for 32bit apps on a 64bit OS. Instead of them being limited to 1/4th of a 32bit address space, they'r
OSX/Intel - setuid shell x86_64 - 51 bytes
  日期:2010-11-26 13:54:03 点击:93 评论:0
/* * Title: OSX/Intel - setuid shell x86_64 - 51 bytes * Date: 2010-11-25 * Tested on: Mac OS X 10.6.5 - Darwin Kernel Version 10.5.0 * Author: Dustin Schultz - twitter: @thexploit * * http://thexploit.com * * BITS 64 * * section .text * global star
Linux/ARM - add root user with password - 151 bytes
  日期:2010-11-26 13:53:24 点击:164 评论:0
/* ** Title: Linux/ARM - add root user with password - 151 bytes ** Date: 2010-11-25 ** Tested on: ARM926EJ-S rev 5 (v5l) ** Author: Jonathan Salwan - twitter: @shell_storm ** ** http://shell-storm.org ** ** Informations: ** ------------- ** - user:
NCH Officeintercom <= v5.20 Remote Denial of Service Vulnerability
  日期:2010-11-26 13:52:30 点击:58 评论:0
#!/usr/bin/python # Exploit Title: NCH Officeintercom = v5.20 Remote Denial of Service Vulnerability # Date: 11/24/2010 # Author: xsploited security # URL: http://www.x-sploited.com/ # Contact: xsploitedsecurity [at] x-sploited.com # Software Link:
共637页/12733条记录 首页 上一页 [316] [317] [318] 319 [320] [321] [322] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved