首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Jira Atlassian File Attachment Download
  日期:2010-03-31 10:42:12 点击:108 评论:0
=======================================Jira Atlassian File Attachment Download=======================================# Exploit Title: Jira Atlassian# Date: 28/3/2010# Author: Ignacio Garrido# Mail: Ign.sec gmail com# Software Link: http://www.atlass
Firefox 3.5 Stack Overflow Exploit
  日期:2010-03-31 10:40:38 点击:50 评论:0
==================================Firefox 3.5 Stack Overflow Exploit==================================#!bin/ruby########################################################## Exploit : Shellcode Stack Overflow Firefox 3.5# Date : 23/03/2010# Author : Wh
xwine v1.0.1 (.exe file) Local Crash PoC Exploit
  日期:2010-03-30 10:41:40 点击:96 评论:0
# xwine v1.0.1 (.exe file) Local Crash PoC Exploit # Install: sudo apt-get install xwine # # Author: JosS Jose Luis Gongora Fernandez # mail: sys-project[at]hotmail[dot]com # site: http://hack0wn.com/ # team: Spanish Hackers Team - [SHT] # # This wa
ASX to MP3 Converter Version 3.0.0.100 Local Stack Overflow POC
  日期:2010-03-30 10:08:02 点击:38 评论:0
#!/usr/bin/perl # ASX to MP3 Converter Version 3.0.0.100 Local Stack Overflow POC # Exploited By mat # #EAX 00000001 #ECX 41414141 #EDX 00D30000 #EBX 00333ED8 #ESP 000F6C90 #EBP 000FBFB4 #ESI 77C2FCE0 msvcrt.77C2FCE0 #EDI 00006619 #EIP 41414141 ####
Stud_PE <= v2.6.05 Stack Overflow PoC exploit
  日期:2010-03-29 10:00:37 点击:88 评论:0
################################################################### # Exploit Title: Stud_PE = v2.6.05 Stack Overflow PoC exploit # Date: 03/28/2010 # Author: zha0 # Software Link: http://www.cgsoftlabs.ro/studpe.html # Version: Stud_PE = v2.6.05 #
Mini-stream Ripper 3.1.0.8 => Local stack overflow exploit
  日期:2010-03-29 09:59:59 点击:47 评论:0
# Mini-stream Ripper 3.1.0.8 = Local stack overflow exploit # Author: Hazem Mofeed # Download: http://www.mini-stream.net/mini-stream-ripper/download/ # Home: http://hakxer.wordpress.com # [BUFFER] + [ RET ] + [ RET ] + [SHELLCODE] -- Exploited .. #
JITed egg-hunter stage-0 shellcode Adjusted universal for xp/vista/win7
  日期:2010-03-29 09:59:21 点击:105 评论:0
// JITed egg-hunter stage-0 shellcode // (Permanent DEP bypass) // // By Alexey Sintsov // dookie@inbox.ru // a.sintsov@dsec.ru // // DSecRG - Digital Security Research Group [dsecrg.com]// // // TAG=3135330731353307 // its mean 0x07333531 twice! //
Mini-stream RM-MP3 Converter Version 3.0.0.7 (.pls) Universal Stack BoF
  日期:2010-03-29 09:58:41 点击:27 评论:0
#!/usr/bin/perl # Mini-stream RM-MP3 Converter Version 3.0.0.7 (.pls) Universal Stack Overflow Exploit # Author: mat # Mail: rahmat_punk@hotmail.com my $shellcode = xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49. x49x51x5ax56x5
tPop3d 1.5.3 DoS
  日期:2010-03-29 09:57:53 点击:68 评论:0
# Exploit Title: tPop3d 1.5.3 DoS # Date: 3/26/10 # Author: OrderZero # Software Link: http://www.ex-parrot.com/~chris/tpop3d/ # Download: http://www.ex-parrot.com/~chris/tpop3d/tpop3d-1.5.3.tar.gz # Version: 1.5.3 # Debug: Starting program: /usr/lo
Remote DoS on Safari for iPhone & iPod Touch
  日期:2010-03-29 09:57:25 点击:70 评论:0
# Exploit Title: Remote DoS on Safari for iPhone iPod Touch # Date: 26/03/2010 # Author: Nishant Das Patnaik # For more of Nishant's research, please visit: # http://nishantdaspatnaik.yolasite.com/research.php # Tested on: iPod Touch 3G (iPhone OS 3
Bad "VML" Remote DoS on Safari for iPhone & iPod Touch
  日期:2010-03-29 09:56:42 点击:43 评论:0
# Exploit Title: Bad VML Remote DoS on Safari for iPhone iPod Touch # Date: 26/03/2010 # Author: Nishant Das Patnaik # For more of Nishant's research, please visit: # http://nishantdaspatnaik.yolasite.com/research.php # Tested on: iPod Touch 3G (iPh
SAP MaxDB Malformed Handshake Request Remote Code Execution
  日期:2010-03-29 09:53:41 点击:48 评论:0
#!/usr/bin/python # Exploit title: SAP MaxDB Malformed Handshake Request Remote Code Execution # Date: 2010.03.26 # Author: S2 Crew [Hungary] # Software link: sap.com http://sap.com # Version: 7.7.06.09 # Tested on: Windows XP SP2 EN # CVE: ZDI-10-0
Lexmark Multiple Laser printer Remote Stack Overflow
  日期:2010-03-26 09:48:46 点击:56 评论:0
##################################################################################### Application: Lexmark Multiple Laser printer Remote Stack Overflow Platforms: Lexmark Multiple Laser printer Exploitation: Remote Exploitable CVE Number: CVE-2010-0
SAP GUI version 7.00 BExGlobal Active-X unsecure method
  日期:2010-03-26 09:47:24 点击:48 评论:0
Security vulnerability found in SAP GUI 7.10 and BI 7.0 that allows operating system functions to be called remotely. Application: SAP GUI Versions Affected: SAP GUI (SAP GUI 7.1) Vendor URL: http://SAP.com Bugs: Insecure method. Code Execution. Exp
Cisco TFTP Server 1.1 DoS
  日期:2010-03-26 09:46:35 点击:64 评论:0
# Exploit Title: [Cisco TFTP Server 1.1] # Date: [2010-03-25] # Author: [_SuBz3r0_] # Software Link: [http://www.oldversion.com/Cisco_TFTP_Server.html] # Version: [1.1] # Tested on: [XP SP3,Win2k3] # CVE : [if exists] # Code : #Cisco TFTP Server v1.
eDisplay Personal FTP server 1.0.0 Multiple Post-Authentication Stack BOF
  日期:2010-03-26 09:46:08 点击:27 评论:0
# Exploit Title : eDisplay Personal FTP server 1.0.0 Multiple Post-Authentication Stack BOF # Type of sploit: Remote Code Execution # Bug found by : loneferret (march 19, 2010) # Reference : http://www.exploit-db.com/exploits/11810 # Exploit date :
KenWard's Zipper v1.400 Buffer Overflow - Method 2
  日期:2010-03-26 09:44:12 点击:30 评论:0
#!/usr/bin/python ## KenWard's Zipper v1.400 File Name Buffer Overflow ## Coded by sinn3r (x90.sinner{at}gmail{d0t}com) ## Tested on: Windows XP SP3 ENG ## Reference: http://www.exploit-db.com/exploits/11834 ## Big thanks to mr_me, and corelanc0d3r.
Solaris Update manager and Sun Patch Cluster suffer from a symlink vulnerability
  日期:2010-03-26 09:43:32 点击:61 评论:0
Symlink attack with Solaris Update manager and Sun Patch ClusterLarry W. CashdollarVapid Labs http://vapid.dhs.org1/24/2010With the GUI Sun Update Manager being used to install patches on a systemlocal users can easily run scripts and create symlink
UltraISO CCD File Parsing Buffer Overflow(meta)
  日期:2010-03-26 09:42:25 点击:87 评论:0
### $Id: ultraiso_ccd.rb 8900 2010-03-24 19:35:29Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on li
Internet Explorer 7.0 0day
  日期:2010-03-25 10:18:00 点击:65 评论:0
script language=javascript if(navigator.userAgent.toLowerCase().indexOf(msie 7)==-1)location.replace(about:blank); function sleep(milliseconds) { var start=new Date().getTime(); for(var i=0;i1e7;i++) {if((new Date().getTime()-start)milliseconds) {bre
共637页/12733条记录 首页 上一页 [382] [383] [384] 385 [386] [387] [388] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved