首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Mocha LPD v1.9 Remote Buffer Overflow DoS PoC
  日期:2010-04-15 10:36:10 点击:34 评论:0
#!/usr/bin/python # ################################################################# # Mocha LPD v1.9 Remote Buffer Overflow DoS PoC # Author: mr_me # Software Link: http://mochasoft.dk/lpd.htm # Version: 1.9 # Tested on: Windows XP SP3 # Advisory:
Book Library v1.4.162 Local Dos .bkd File
  日期:2010-04-15 10:35:49 点击:62 评论:0
# Exploit Title: Book Library Local Dos .bkd file # Date: April 14, 2010 # Software Link: [http://wensoftware.com/] # Version: v1.4.162 # Tested on: Windows XP SP3 # Author: chap0 # Email: chap0x90[at]gmail[dot]com # Site: [www.setfreesecurity.com]
MovieLibrary v1.4.401 Local Dos .dmv File
  日期:2010-04-15 10:34:44 点击:46 评论:0
# Exploit Title: MovieLibrary Local Dos .dmv file # Date: April 14, 2010 # Software Link: [http://wensoftware.com/] # Version: v1.4.401 # Tested on: Windows XP SP3 # Author: chap0 # Email: chap0x90[at]gmail[dot]com # Site: [www.setfreesecurity.com]
55 bytes SLoc-DoS shellcode by Magnefikko
  日期:2010-04-15 10:33:36 点击:52 评论:0
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com Promhyl Studies :: http://promhyl.oz.pl Subgroup: #PRekambr Name: 55 bytes SLoc-DoS shellcode Platform: Linux x86 unlink(/etc/shadow); execve(poweroff, 0, 0); gcc -W
6 bytes DoS-Badger-Game shellcode
  日期:2010-04-15 10:32:37 点击:32 评论:0
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 6 bytes DoS-Badger-Game shellcode Platform: Linux x86 pause() gcc -Wl,-z,execstack filename.c shellcode: x31xc0xb0x1dxcd
25 bytes execve("/bin/sh") shellcode
  日期:2010-04-15 10:31:56 点击:55 评论:0
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 25 bytes execve(/bin/sh) shellcode Platform: Linux x86 execve(/bin/sh, 0, 0); gcc -Wl,-z,execstack filename.c shellcode: xeb
36 bytes chmod("/etc/shadow", 0666) shellcode
  日期:2010-04-15 10:31:12 点击:40 评论:0
#include stdio.h #include string.h /* by Magnefikko 14.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 36 bytes chmod(/etc/shadow, 0666) shellcode Platform: Linux x86 chmod(/etc/shadow, 0666); gcc -Wl,-z,execstack filename.c she
Micropoint Proactive Denfense Mp110013.sys <= 1.3.10123.0 Local Privilege Escala
  日期:2010-04-15 10:30:34 点击:110 评论:0
Micropoint Proactive Denfense Mp110013.sys = 1.3.10123.0 Local Privilege Escalation Exploit VULNERABLE PRODUCTS Micropoint Proactive Denfense = 100323.1.2.10581.0285.r1 mp110013.sys = 1.3.10123.0 DETAILS: mp110013.sys handles DeviceIoControl request
Aircrack-NG Tools svn r1675 Remote Exploit
  日期:2010-04-15 10:28:38 点击:112 评论:0
========================================== Aircrack-NG Tools svn r1675 Remote Exploit ========================================== #!/usr/bin/env python # -*- coding: UTF-8 -*- ''' A remote-exploit against the aircrack-ng tools. Tested up to svn r1675.
Bild Flirt <= version 1.0 SQL Injection Vulnerability Exploit
  日期:2010-04-15 10:25:49 点击:45 评论:0
=============================================================Bild Flirt = version 1.0 SQL Injection Vulnerability Exploit=============================================================----------------------------Information----------------------------
Joelz Bulletin Board versions 0.9.9rc3 suffers from multiple remote SQL injectio
  日期:2010-04-15 10:23:04 点击:29 评论:0
----------------------------Information------------------------------------------------+Name : joelz bulletin board = 0.9.9rc3 multiple SQL Injection Exploit+Autor : Easy Laster+ICQ : 11-051-551+Email : exploit@gaza.net+Date : 13.04.2010+Script : jo
微点主动防御 Mp110013.sys <= 1.3.10123.0 本地内核权限提升漏洞
  日期:2010-04-14 10:36:55 点击:198 评论:0
漏洞涉及产品:微点主动防御100323.1.2.10581.0278.r1及以下版本 mp110013.sys = 1.3.10123.0 漏洞影响: 通过漏洞攻击者在最低系统权限下执行内核权限代码,从而可以突破任何存在的安全防护软件,包括沙盘、主动防御、杀毒软件、防火墙、HIPS、UAC和系统安全设置 漏洞
MagnetoSoft NetworkResources ActiveX NetConnectionEnum SEH Overwrite POC
  日期:2010-04-14 10:36:28 点击:26 评论:0
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetConnectionEnum SEH Overwrite POC 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Di
MagnetoSoft NetworkResources ActiveX NetShareEnum SEH Overwrite POC
  日期:2010-04-14 10:35:41 点击:37 评论:0
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetShareEnum SEH Overwrite POC 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Discove
MagnetoSoft NetworkResources ActiveX NetFileClose SEH Overwrite POC
  日期:2010-04-14 10:35:06 点击:30 评论:0
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetFileClose SEH Overwrite POC 'Discovered by: s4squatch of SecureState RD Team 'Site: www.secure
MagnetoSoft NetworkResources ActiveX NetSessionDel POC
  日期:2010-04-14 10:34:35 点击:44 评论:0
html object classid='clsid:61251370-92BF-4A0E-8236-5904AC6FC9F2' id='target' //object script language='vbscript' 'Magneto Software Net Resource ActiveX NetSessionDel BOF 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Discovered: 02/11/10
MagnetoSoft SNTP ActiveX SntpSendRequest Crash POC
  日期:2010-04-14 10:31:51 点击:27 评论:0
html object classid='clsid:A3010B66-C229-11D5-B7BA-00C0F02DFC67' id='target' //object script language='vbscript' 'Magneto Software SNTP ActiveX SntpSendRequest BOF POC 'Discovered by: s4squatch 'Site: www.securestate.com 'www: http://www.magnetosoft
MagnetoSoft SNTP ActiveX SntpGetReply BOF
  日期:2010-04-14 10:28:21 点击:35 评论:0
html object classid='clsid:A3010B66-C229-11D5-B7BA-00C0F02DFC67' id='target' //object script language='vbscript' 'Magneto Software SNTP ActiveX SntpGetReply BOF 'Discovered by: s4squatch 'Site: www.securestate.com 'File Name = SKSntp.ocx 'www: http:
MagnetoSoft ICMP ActiveX AddDestinationEntry BOF
  日期:2010-04-14 10:24:09 点击:32 评论:0
html object classid='clsid:3A86F1F2-4921-4C75-AF2C-A1AA241E12BA' id='target'/object script language='vbscript' 'Magneto Software ICMP ActiveX Control Buffer Overflow 'Discovered by: s4squatch 'website: www.securestate.com 'Date Discovered: 03/11/09
MagnetoSoft DNS ActiveX DNSLookupHostWithServer POC
  日期:2010-04-14 10:23:26 点击:32 评论:0
html object classid='clsid:B5ED1577-4576-11D5-851F-00D0B7A934F6' id='target' //object script language='vbscript' 'Magneto Software ActiveX Control ICMP Crash POC 'Discovered by: s4squatch 'Site: www.securestate.com 'Date Discovered: 02/11/10 'Vendor
共637页/12733条记录 首页 上一页 [377] [378] [379] 380 [381] [382] [383] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved