首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
SnackAmp 3.1.2 Malicious WAV Buffer Overflow Vulnerability (POC)
  日期:2010-08-30 09:59:45 点击:30 评论:0
# Exploit Title: SnackAmp 3.1.2 Malicious WAV Buffer Overflow Vulnerability (POC) # Date: 08/28/10 # Author: james [AT] learnsecurityonline [DOT] com # Software Link: http://sourceforge.net/projects/snackamp/ # Version: 3.1.2 # Tested on: Windows XP
SnackAmp 3.1.2 Malicious SMP Buffer Overflow Vulnerability (SEH)
  日期:2010-08-30 09:58:10 点击:30 评论:0
# Exploit Title: SnackAmp 3.1.2 Malicious SMP Buffer Overflow Vulnerability (SEH) # Date: 08/28/10 # Author: james [AT] learnsecurityonline [DOT] com # Software Link: http://sourceforge.net/projects/snackamp/ # Version: 3.1.2 # Tested on: Windows XP
nginx v0.6.38 Heap Corruption Exploit
  日期:2010-08-30 09:57:14 点击:111 评论:0
#!/usr/bin/env python # # Exploit Title: nginx heap corruption # Date: 08/26/2010 # Author: aaron conole apconole@yahoo.com # Software Link: http://nginx.org/download/nginx-0.6.38.tar.gz # Version: = 0.6.38, = 0.7.61 # Tested on: BT4R1 running nginx
Blogman v0.7.1 (profile.php) SQL Injection Exploit
  日期:2010-08-30 09:56:29 点击:44 评论:0
#!/usr/bin/python # # Exploit Title: Blogman v0.7.1 (profile.php) SQL Injection Exploit # Date : 28 August 2010 # Author : Ptrace Security (Gianni Gnesa [gnix]) # Contact : research[at]ptrace-security[dot]com # Software Link: http://sourceforge.net/
Leadtools ActiveX Raster Twain v16.5 (LtocxTwainu.dll) Buffer Overflow Vulnerabi
  日期:2010-08-30 09:55:33 点击:179 评论:0
LEADTOOLS ActiveX Raster Twain v16.5 (LtocxTwainu.dll) Remote Buffer Overflow PoC Vendor: LEAD Technologies, Inc. Product Web Page: http://www.leadtools.com Affected Version: 16.5.0.2 Summary: With LEADTOOLS you can control any scanner, digital came
McAfee LinuxShield <= 1.5.1 Local/Remote Root Code Execution
  日期:2010-08-30 09:54:52 点击:56 评论:0
#!/usr/bin/perl ## # Title: McAfee LinuxShield = 1.5.1 Local/Remote Root Exploit # Name: nailsRoot.pl # Author: Nikolas Sotiriu (lofi) lofi[at]sotiriu.de # WARNING: This Exploit deletes the default Update Server # # Use it only for education or ethi
Linux Kernel < 2.6.36-rc1 CAN BCM Privilege Escalation Exploit
  日期:2010-08-30 09:51:45 点击:83 评论:0
/* * i-CAN-haz-MODHARDEN.c * * Linux Kernel 2.6.36-rc1 CAN BCM Privilege Escalation Exploit * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2959 * * Ben Hawkes
Exploit Title: Mozilla Thunderbird DLL Hijacking Exploit ( dwmapi.dll )
  日期:2010-08-27 12:07:37 点击:45 评论:0
/* Exploit Title: Mozilla Thunderbird DLL Hijacking Exploit ( dwmapi.dll )Date: 26/08/2010Author: h4ck3r#47 http://twitter.com/hxteamVersion: Latest Mozilla Thunderbird 3.1.2 Tested on: Windows XP SP3The code is based on the exploit from TheLeaderVu
mini CMS / News Script Light 1.0 Remote File Include Exploit
  日期:2010-08-27 12:05:13 点击:47 评论:0
#!/usr/bin/perl #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # mini CMS / News Script Light 1.0 Remote File Include Exploit # # Bug found and exploit written by bd0rk || SOH-Crew # # Vendor: http://www.h
Hycus CMS 1.0.1 Multiple Cross Site Request Forgery Vulnerabilities
  日期:2010-08-27 12:04:35 点击:48 评论:0
!--- Title: Hycus CMS 1.0.1 Multiple CSRF Vulnerabilities Author: 10n1z3d 10n1z3d[at]w[dot]cn Date: Thu 26 Aug 2010 07:53:22 PM EEST Vendor: http://www.hycus.com/ Download: http://www.hycus.com/download/hycuscms-1.0.1.zip --- -=[ CSRF PoC 1 - Change
PuTTY 0.60 DLL Hijacking Exploit (winmm.dll)
  日期:2010-08-27 12:04:00 点击:82 评论:0
/* Exploit Title: PuTTY DLL Hijacking Exploit (winmm.dll) Date: August 25, 2010 Author: storm ( storm@gonullyourself.org ) Version: 0.60 Tested on: Windows Vista SP2 http://www.gonullyourself.org/ gcc -shared -o winmm.dll PuTTY-DLL.c -DWIN32_LEAN_AN
bds/x86-bindshell on port 2525 shellcode 167 bytes
  日期:2010-08-27 12:01:35 点击:34 评论:0
================================================== bds/x86-bindshell on port 2525 shellcode 167 bytes ================================================== /* -------------- bds/x86-bindshell on port 2525 167 bytes ------------------------- * AUTHOR :
Teamviewer 5 DLL Hijacking
  日期:2010-08-26 10:36:41 点击:51 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
BS.Player <= 2.56 build 1043 DLL Hijacking Exploit (mfc71loc.dll)
  日期:2010-08-26 10:22:45 点击:30 评论:0
DDoS Attacks explaination, classification and suggested solutions
  日期:2010-08-26 10:22:37 点击:46 评论:0
Simple Forum PHP Multiple Vulnerabilities
  日期:2010-08-26 10:22:34 点击:33 评论:0
Adobe Dreamweaver CS4 DLL Hijacking Exploit (ibfs32.dll)
  日期:2010-08-26 10:22:28 点击:30 评论:0
TeamViewer <= 5.0.8703 DLL Hijacking Exploit (dwmapi.dll)
  日期:2010-08-26 10:22:26 点击:53 评论:0
Microsoft Windows 7 wab.exe DLL Hijacking Exploit (wab32res.dll)
  日期:2010-08-26 10:22:23 点击:79 评论:0
Microsoft Group Convertor DLL Hijacking Exploit (imm.dll)
  日期:2010-08-26 10:22:20 点击:94 评论:0
共637页/12733条记录 首页 上一页 [340] [341] [342] 343 [344] [345] [346] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved