首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
TFTPDWIN v0.4.2 Directory Traversal Vulnerability
  日期:2010-09-02 11:02:17 点击:91 评论:0
+------------------------------------------------------------------------+ | ....... | | ..''xxxxxxxxxxxxxxx'... | | ..'xxxxxxxxxxxxxxxxxxxxxxxxxxx.. | | ..'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'. | | .'xxxxxxxxxxxxxxxxxxxxxxxxxxxx'''.......'. | | .'xxx
Adobe Acrobat Reader and Flash Player “newclass” invalid pointer
  日期:2010-09-02 11:01:03 点击:59 评论:0
''' __ __ ____ _ _ ____ | / |/ __ / | | | | _ | / | | | | / | | | | |_) | | |/| | | | |/ / | | | | _ Day 1 (Binary Analysis) | | | | |__| / ____ |__| | |_) | |_| |_|____/_/ _____/|____/ http://www.exploit-db.com/adobe-acrobat-newcl
Leadtools ActiveX Common Dialogs 16.5 Multiple Remote Vulnerabilities
  日期:2010-09-02 11:00:13 点击:94 评论:0
LEADTOOLS ActiveX Common Dialogs 16.5 Multiple Remote Vulnerabilities Vendor: LEAD Technologies, Inc. Product Web Page: http://www.leadtools.com Affected version: 16.5.0.2 Summary: With LEADTOOLS you can control any scanner, digital camera or captur
mBlogger v1.0.04 (viewpost.php) SQL Injection Exploit
  日期:2010-09-02 10:56:33 点击:29 评论:0
#!/usr/bin/python # # Exploit Title: mBlogger v1.0.04 (viewpost.php) SQL Injection Exploit # Date : 31 August 2010 # Author : Ptrace Security (Gianni Gnesa [gnix]) # Contact : research[at]ptrace-security[dot]com # Software Link: http://sourceforge.n
MPLAB IDE .mcp .mcw DLL Hijacking
  日期:2010-09-01 10:46:34 点击:353 评论:0
/* MPLAB IDE .mcw DLL Hijacking Date: August 31, 2010 Author: kB0]1_ Software: http://www.microchip.com/stellent/idcplg?IdcService=SS_GET_PAGEnodeId=1406dDocName=en019469part=SW007002 Version: v.8.56 Vulnerable Extensions: .mcp,.mcw Vulnerable dll's:
Spybot-S&D blindman.exe DLL Hijacking (wer.dll)
  日期:2010-09-01 10:45:09 点击:48 评论:0
/* Spybot-SD blindman.exe DLL Hijacking (wer.dll) Date: August 30, 2010 Author: kB0]1_ Software : http://www.safer-networking.org/en/faq/25.html Version: 1.6.2 Vulnerable Extension : .disabled Tested on: XP Pro SP2 */ #include windows.h int pwnme() {
SnackAmp 3.1.2 Malicious SMP Buffer Overflow Vulnerability (SEH)
  日期:2010-08-31 10:26:44 点击:26 评论:0
# Exploit Title: SnackAmp 3.1.2 Malicious SMP Buffer Overflow Vulnerability (SEH) # Date: 08/28/10 # Author: james [AT] learnsecurityonline [DOT] com # Software Link: http://sourceforge.net/projects/snackamp/ # Version: 3.1.2 # Tested on: Windows XP
Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution(meta)
  日期:2010-08-31 10:25:19 点击:124 评论:0
### $Id: apple_quicktime_marshaled_punk.rb 10196 2010-08-30 21:52:45Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for mor
Safari for windows Invalid SGV text style Webkit.dll DoS
  日期:2010-08-31 10:24:14 点击:79 评论:0
###################################################Safari for windows Invalid SGV text style Webkit.dll DoSVendor URL:www.apple.comAdvisore:http://lostmon.blogspot.com/2010/08/safari-for-windows-invalid-sgv-text.htmlVendor notify :Yes exploit availa
Apple QuickTime "_Marshaled_pUnk" Backdoor Param Client-Side Arbitrary Code Exec
  日期:2010-08-31 10:18:44 点击:83 评论:0
Original Source: http://reversemode.com/index.php?option=com_contenttask=viewid=69Itemid=1 Victim prerequisites: * Internet Explorer. * XP,Vista,W7. * Apple Quicktime 7.x, 6.x ( 2004 versions are also vulnerable, older versions not checked ) 1. Vict
Mereo v1.9.2 Remote HTTP Server Denial Of Service Vulnerability
  日期:2010-08-31 10:18:05 点击:31 评论:0
#!/usr/bin/python ########################################################################### # # Title: Mereo v1.9.2 Remote HTTP Server DoS (0day) # By: CwG GeNiuS # Email: cwggenius [at] gmail [dot] com # Tested: XPSP3 # Download: http://www.ohloh
Windows 7 / Vista Backup Utility sdclt.exe fveapi.dll DLL Hijacking
  日期:2010-08-30 10:16:58 点击:90 评论:0
/* Windows 7 and Vista Backup Utility sdclt.exe fveapi.dll DLL Hijacking Exploit Found by: Christian Heinrich (cmlh) Exploit by: Christian Heinrich (cmlh) Email: christianheinrich@live.com Web: http://www.twitter.com/cmlh Summary: Microsoft Windows B
Microsoft Internet explorer 8 DLL Hijacking (IESHIMS.DLL)
  日期:2010-08-30 10:16:14 点击:176 评论:0
Author: MantyCore Tested on: XP SP3 #include windows.h #define DLLIMPORT __declspec (dllexport) DLLIMPORT void IEShims_GetOriginatingThreadId() { MantyCore(); } DLLIMPORT void IEShims_InDllMainContext() { MantyCore(); } DLLIMPORT void IEShims_Initial
web wiz newspad v1.03 Database Disclosure Exploit
  日期:2010-08-30 10:15:26 点击:45 评论:0
#!/usr/bin/perl -w # # web wiz newspad v1.03 Database Disclosure Exploit # # Found Coded: indoushka # # Date: 25/07/2010 # # Home: www.sec4ever.com # # Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Mehe
Microsoft Windows Based Script Host (Plugin.ocx) DLL Hijacking
  日期:2010-08-30 10:14:46 点击:132 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
Camtasia Studio 7 (mfc90enu.dll, mfc90loc.dll) DLL Hijacking Exploit
  日期:2010-08-30 10:14:00 点击:49 评论:0
/*-------------------------------------------------------------------------*/ /** [*] Camtasia Studio 7 (mfc90enu.dll, mfc90loc.dll) DLL Hijacking Exploit [*] Date: 26/08/2010 [*] Author: p4r4n0id [*] Vendor: Techsmith [*] Product Web Page: http://ww
flash player 9.exe DLL Hijacking Exploit (schannel.dll)
  日期:2010-08-30 10:13:22 点击:60 评论:0
#flash player 9.exe DLL Hijacking Exploit (schannel.dll) #Author : Mohamed Clay #Greetz : linuxac.org isecur1ty.org security4arabs.com v4-team.com all My Friends #note : EveryOne is happy with DLL Hijacking YooooPiiii!!!! #Tested on: Windows XP #Vuln
Microsoft Windows wscript.exe (XP) DLL Hijacking Exploit (wshfra.dll)
  日期:2010-08-30 10:12:36 点击:57 评论:0
#Microsoft Windows wscript.exe (XP) DLL Hijacking Exploit (wshfra.dll) #Author : Mohamed Clay #Greetz : linuxac.org isecur1ty.org security4arabs.com v4-team.com all My Friends #note : EveryOne is happy with DLL Hijacking YooooPiiii!!!! #Tested on: Wi
Mozilla Firefox 3.6.8 Adobe Reader Plugin 9.3.4.218 (CoolType.dll)
  日期:2010-08-30 10:12:07 点击:130 评论:0
@echo off GOTO START * [*] * [*] Mozilla Firefox 3.6.8 Adobe Reader Plugin 9.3.4.218 DLL Hijacking Exploit (CoolType.dll) * [*] * [*] Author: Rh0 (Rh0[at].z1p.biz) * [*] Affected Software: Mozilla Firefox 3.6.8 with Adobe Reader Plugin 9.3.4.218 * [*
bsd/x86-bindshell on port 2525 shellcode 167 bytes
  日期:2010-08-30 10:05:03 点击:45 评论:0
/* -------------- bds/x86-bindshell on port 2525 167 bytes ------------------------- * AUTHOR : beosroot * OS : BSDx86 (Tested on FreeBSD) * EMAIL : beosroot@hotmail.fr beosroot@null.net * GR33TZ To : joseph-h, str0ke, MHIDO55,..... */ const char she
共637页/12733条记录 首页 上一页 [339] [340] [341] 342 [343] [344] [345] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved