首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Kloxo 6.1.12 Privilege Escalation
  日期:2013-05-16 11:38:51 点击:46 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'r
ERS Viewer 2011 ERS File Handling Buffer Overflow
  日期:2013-05-15 10:18:41 点击:61 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewo
Avira Personal Privilege Escalation Vulnerability
  日期:2013-05-15 10:17:16 点击:31 评论:0
============================================Tested on OS:Microsoft Windows XP Professional 5.1.2600 Service Pack 2 2600============================================Vulnerable Software: Avira PersonalTested version of Avira:===========================
Linux PERF_EVENTS Local Root
  日期:2013-05-14 14:42:28 点击:88 评论:0
/* * linux 2.6.37-3.x.x x86_64, ~100 LOC * gcc-4.6 -O2 semtex.c ./a.out * 2010 sd@fucksheep.org, salut! * * update may 2013: * seems like centos 2.6.32 backported the perf bug, lol. * jewgold to 115T6jzGrVMgQ2Nt1Wnua7Ch1EuL9WXT2g if you insist. */#d
Kloxo 6.1.6 - Local Privilege Escalation
  日期:2013-05-14 14:41:24 点击:35 评论:0
#!/bin/sh # Exploit Title: Kloxo Local Privilege Escalation # Google Dork: inurl:kiddies # Date: August 2012 or so # Exploit Author: HTP # Vendor Homepage: http://lxcenter.org/ # Software Link: [download link if available] # Version: 6.1.6 (Latest) #
No-IP Dynamic Update Client (DUC) 2.1.9 - Local IP Address Stack Overflow
  日期:2013-05-14 14:40:35 点击:137 评论:0
#!/usr/bin/env python # Title: No-IP Dynamic Update Client (DUC) 2.1.9 local IPaddress stack overflow # Author: Alberto Ortega @a0rtega # alberto[@]pentbox[.]net # Date: May 11 2013 (vulnerability discovered) # Background: # # No-IP is probably the
SAP SOAP RFC SXPG_CALL_SYSTEM Remote Command Execution
  日期:2013-05-13 10:58:31 点击:124 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
SAP SOAP RFC SXPG_COMMAND_EXECUTE Remote Command Execution
  日期:2013-05-13 10:57:59 点击:160 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
Lan Messenger sending PM Buffer Overflow(UNICODE) - Overwrite SEH
  日期:2013-05-13 10:56:58 点击:18 评论:0
# Exploit Title: Lan Messenger Version 1.2 Buffer Overflow vulnerability - UNICODE(POC) # Date: 09-05-2013 # Exploit Author: ariarat # Vendor Homepage: http://lmadhavan.com # Software Link: http://lmadhavan.com/software/archive/lanmsg12.zip # Versio
ERS Viewer 2011 ERS File Handling Buffer Overflow
  日期:2013-05-10 10:33:23 点击:24 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/#
Linux Kernel open-time Capability file_ns_capable() - Privilege Escalation Vulne
  日期:2013-05-09 10:34:22 点击:245 评论:0
/* userns_root_sploit.c by */ /* Copyright (c) 2013 Andrew Lutomirski. All rights reserved. */ /* You may use, modify, and redistribute this code under the GPLv2. */ #define _GNU_SOURCE #include unistd.h #include sched.h #include sys/types.h #includ
Flightgear 2.0, 2.4 - Remote Format String Exploit
  日期:2013-05-09 10:29:35 点击:106 评论:0
/* # Exploit Title: Flightgear remote format string # Date: 21/04/2013 # Exploit Author: Kurono # email: andresgomezram7@gmail.com # Vendor Homepage: http://www.flightgear.org/ # Software Link: http://www.flightgear.org/download/ # Version: Tested o
ColdFusion 9 / 10 Remote Root Exploit
  日期:2013-05-09 10:28:26 点击:109 评论:0
#!/usr/bin/env python# -*- coding: utf-8 -*-intro= _ _ _______ _____ _ _ _______ Cold ,''' Fusion |_____| | |_____] / |______ Cold ,''' /-- Fusion | | | | / ______|. Cold -,__,' FusionName : ColdSub-Zero.pyFusion v2Description : CF9-10 Remote Roo
MoinMelt Arbitrary Command Execution Exploit
  日期:2013-05-09 10:27:11 点击:50 评论:0
#!/usr/bin/env python# -*- coding: utf-8 -*-ascii = 'x1b[1;31m'###########################################################################ascii +=' rn'#ascii +=' ██████████ ██████ ███ ███ ███ ██████████ ████
Dovecot with Exim sender_address Parameter - Remote Command Execution
  日期:2013-05-08 11:23:34 点击:64 评论:0
Advisory: Exim with Dovecot: Typical Misconfiguration Leads to Remote Command Execution During a penetration test a typical misconfiguration was found in the way Dovecot is used as a local delivery agent by Exim. A common use case for the Dovecot IM
Microsoft Internet Explorer CGenericElement Object Use-After-Free Vulnerability
  日期:2013-05-08 11:22:24 点击:73 评论:0
## # # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/frame
Huawei SNMPv3 Buffer Overflow Vulnerability
  日期:2013-05-07 10:35:18 点击:120 评论:0
Multiple buffer overflows on Huawei SNMPv3 service==================================================[ADVISORY INFORMATION]Title: Multiple buffer overflows on Huawei SNMPv3 serviceDiscovery date: 11/02/2013Release date: 06/05/2013Credits: Roberto Pal
AudioCoder .M3U Buffer Overflow
  日期:2013-05-06 10:51:29 点击:54 评论:0
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'c
Winarchiver 3.2 Buffer Overflow
  日期:2013-05-06 10:50:51 点击:55 评论:0
#/usr/bin/python# Exploit Title: Winarchiver V 3.2 SEH Overflow# Date: April 24, 2013# Exploit Author: Josep Pi Rodriguez, Pedro Guillen Nunez , Miguel Angel de Castro Simon# Organization: RealPentesting # Vendor Homepage: http://winarchiver.com# So
FuzeZip 1.0.0.131625 Buffer Overflow
  日期:2013-05-06 10:49:41 点击:71 评论:0
#!/usr/bin/python# Exploit Title: SEH BUFFER OVERFLOW IN FUZEZIP V.1.0# Date: 16.Apr.2013 Vulnerability reported# Exploit Author: Josep Pi Rodriguez, Pedro Guillen Nunez , Miguel Angel de Castro Simon# Organization: RealPentesting # Vendor Homepage:
共637页/12733条记录 首页 上一页 [208] [209] [210] 211 [212] [213] [214] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2025 VFocuS.Net All Rights Reserved