首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Multiple Browsers Audio Tag DoS Vulnerability
  日期:2010-04-22 10:19:36 点击:39 评论:0
#!/usr/bin/python #Multiple Browsers Audio Tag Denial of Service Vulnerability #any ogg file can be used for the DoS as long as it is a valid file on the server #crash reporter for Mac seems to think this is a EXEC_BAD_ACCESS #This script acts as a
Mozilla Firefox/Thunderbird/Seamonkey CVE-2010-0167 Multiple Memory Corruption V
  日期:2010-04-22 10:15:41 点击:60 评论:0
Mozilla Firefox/Thunderbird/Seamonkey CVE-2010-0167 Multiple Memory Corruption Vulnerabilities Mozilla Firefox, Thunderbird and Seamonkey are prone to multiple remote memory-corruption vulnerabilities. Successful exploits may allow an attacker to ex
Speed Commander 13.10 (.zip) Memory Corruption
  日期:2010-04-21 10:14:12 点击:35 评论:0
#!/usr/bin/python # ####################################################################### # Title: Speed Commander 13.10 (.zip) Memory Corruption # Author: TecR0c - http://tecninja.net/blog http://twitter.com/TecR0c # Found by: TecR0c # Download:
Linux write() & exit(0) shellcode genearator with customizable text
  日期:2010-04-21 10:13:45 点击:64 评论:0
#!/usr/bin/python # Linux write() exit(0) shellcode genearator with customizable text # Usage: ./generator msg # Author: Stoke # Tested on: Ubuntu 8.10 # E-mail: stoke95[at]yahoo[dot]it # Web: hack2web.altervista.org # Visit: blasterhacking.forumcom
Acritum Femitter v1.03 Directory Traversal Exploit
  日期:2010-04-21 10:13:17 点击:64 评论:0
############################################################ # # Acritum Femitter v1.03 Directory Traversal Exploit # Found By: Dr_IDE # Date: Apr. 20, 2010 # Tested On: Windows 7 # Download: http://acritum.com/fem/download.htm # ###################
Mongoose Web Server v2.8 Multiple Directory Traversal Exploits
  日期:2010-04-21 10:12:49 点击:55 评论:0
################################################################ # # Mongoose Web Server v2.8 Multiple Directory Traversal Exploits # Found By: Dr_IDE # Date: Apr. 20, 2010 # Tested On: Windows 7 # Download: http://code.google.com/p/mongoose/downloa
MultiThreaded HTTP Server v1.1 Source Disclosure
  日期:2010-04-21 10:12:13 点击:39 评论:0
################################################################ # # Exploit Title: MultiThreaded HTTP Server v1.1 Source Disclosure # Found By: Dr_IDE # Date: Apr. 20, 2010 # Download: http://voxel.dl.sourceforge.net/project/http/version1.1/%5BUnna
MultiThreaded HTTP Server v1.1 Directory Traversal
  日期:2010-04-21 10:11:26 点击:73 评论:0
################################################################################ # # +------------------------------------------------------------------------+ # | ....... | # | ..''xxxxxxxxxxxxxxx'... | # | ..'xxxxxxxxxxxxxxxxxxxxxxxxxxx.. | # | ..
HP Operations Manager <= v8.16 - (srcvw4.dll) LoadFile()/SaveFile() Remote Unico
  日期:2010-04-21 10:11:01 点击:80 评论:0
html !-- |------------------------------------------------------------------| | __ __ | | _________ ________ / /___ _____ / /____ ____ _____ ___ | | / ___/ __ / ___/ _ / / __ `/ __ / __/ _ / __ `/ __ `__ | | / /__/ /_/ / / / __/ / /_/ / / / /
EasyFTP Server <= 1.7.0.2 CWD Buffer Overflow (Metasploit)
  日期:2010-04-21 10:06:09 点击:215 评论:0
# Exploit Title: EasyFTP Server = 1.7.0.2 CWD Buffer Overflow (Metasploit)# Date: April 19th, 2010# Author: Paul Makowski (my.hndl@gmail.com || http://paulmakowski.wordpress.com)# Software Link: http://easyftpsvr.googlecode.com/files/easyftpsvr-1.7.
Viscom Software Movie Player Pro SDK version 6.8 suffers from an Active-X relate
  日期:2010-04-21 10:04:22 点击:49 评论:0
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- ----------------------------------------------------------------------------- Viscom Software Movie Player Pro SDK ActiveX 6.8 Remote Buffer Overflow url: http://www.viscomsoft.com/ Author:shinnai mail:s
Local kernel 2.6.2x kernel panic via pthread
  日期:2010-04-20 09:39:03 点击:220 评论:0
============================================ Local kernel 2.6.2x kernel panic via pthread ============================================ # Exploit Title: Pthread Local Kernel 2.6.2x Kernel Panic Exploit # Date: 20 April 2010 # Author: mywisdom # Organ
29 bytes chmod("/etc/shadow", 0777) shellcode
  日期:2010-04-20 09:38:37 点击:53 评论:0
#include stdio.h #include string.h /* by Magnefikko 20.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 29 bytes chmod(/etc/shadow, 0777) shellcode Platform: Linux x86 chmod(/etc/shadow, 0777); gcc -Wl,-z,execstack filename.c she
Huawei EchoLife HG520 Remote Information Disclosure
  日期:2010-04-20 09:38:06 点击:101 评论:0
# Exploit Title: Huawei EchoLife HG520 Remote Information Disclosure # Date: 2010-04-19 # Author: hkm # Product Link: http://www.huawei.com/mobileweb/en/products/view.do?id=660 # Firmware Versions: 3.10.18.7-1.0.7.0 # 3.10.18.5-1.0.7.0 # 3.10.18.4 #
Huawei EchoLife HG520c Denial of Service and Modem Reset
  日期:2010-04-20 09:37:34 点击:268 评论:0
# Exploit Title: Huawei EchoLife HG520c Denial of Service and Modem Reset # Date: 2010-04-19 # Author: hkm # Product Link: http://www.huawei.com/mobileweb/en/products/view.do?id=660 # Firmware Versions: 3.10.18.7-1.0.7.0 # 3.10.18.5-1.0.7.0 # 3.10.1
AVTECH Software (AVC781Viewer.dll) ActiveX Multiple Remote Vulnerabilities
  日期:2010-04-20 09:36:41 点击:385 评论:0
Title: AVTECH Software (AVC781Viewer.dll) ActiveX Multiple Remote Vulnerabilities Vendor: AVTECH Software, Inc. Product Web Page: http://www.avtech.com Summary: AVTECH Software, a private corporation founded in 1988, is a computer software and hardw
TweakFS 1.0 (FSX Edition) Stack buffer overflow
  日期:2010-04-20 09:36:04 点击:28 评论:0
# Exploit Title : TweakFS 1.0 (FSX Edition) # CVE : CVE-2010-1458 # Corelan : http://www.corelan.be:8800/advisories.php?id=CORELAN-10-026 # Date : April 7th, 2010 # Author : corelanc0d3r # Bug found by : TecR0c # Software Link : http://tweakfs.com/
33 Bytes chmod("/etc/shadow", 0777) Shellcode
  日期:2010-04-19 10:41:23 点击:58 评论:0
# 5m0k3.digital.3scape@gmail.com # http://plasticsouptaste.blogspot.com # Name: 33 bytes chmod(/etc/shadow, 0777) shellcode # Platform: Linux x86 #include stdio.h int main(int argc, char *argv[]) { char shellcode[] =x31xc0x50xb0x0fx68x61x64
14 Bytes execve("a->/bin/sh") Local-only Shellcode
  日期:2010-04-19 10:40:18 点击:35 评论:0
#include stdio.h #include string.h /* by Magnefikko 17.04.2010 magnefikko@gmail.com Promhyl Studies :: http://promhyl.oz.pl Subgroup: #PRekambr Name: 14 bytes execve(a-/bin/sh) local-only shellcode Platform: Linux x86 execve(a, 0, 0); $ ln -s /bin/s
Multiple Vendor AgentX++ Stack Buffer Overflow
  日期:2010-04-19 10:39:46 点击:87 评论:0
# Exploit Title: Multiple Vendor AgentX++ Stack Buffer Overflow Vulnerability # Date: 2010-04-17 # Author: ZSploit.com # Software Link: N/A # Version: N/A # Tested on: RealNetworks Helix Server v11 # CVE : CVE-2010-1318 #! /usr/bin/env python ######
共637页/12733条记录 首页 上一页 [375] [376] [377] 378 [379] [380] [381] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved