代码搜索:exploit
找到约 10,000 项符合「exploit」的源代码
代码结果 10,000
www.eeworm.com/read/253602/12210416
txt openbsd sudo 1.3.1 - 1.6.8p local root exploit.txt
#include
#include
#include
#include
#include
#define SUDO "/usr/bin/sudo"
#ifdef BUFSIZ
#undef BUFSIZ
#define BUFSIZ 128
www.eeworm.com/read/253602/12210418
txt mkdir buffer overflow unix 7th edition exploit.txt
/*
* Exploit for /bin/mkdir Unix V7 PDP-11.
* mkdir has a buffer overflow when checking if the directory
* in /arg/with/slashes/fname exists.
*
* This will run /bin/sh with euid 0, but not u
www.eeworm.com/read/253602/12210433
txt mambo user_rating parameter remote sql injection exploit.txt
#!/usr/bin/perl
### Mambo 4.1 sql injection exploit by RST/GHC
### ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
### Работает только на MySQL версии 4.1 и выше так как ис
www.eeworm.com/read/253602/12210444
txt linux kernel file offset pointer handling memory disclosure exploit.txt
/*
* CAN-2004-0415 / gcc -O3 proc_kmem_dump.c -o proc_kmem_dump
*
* Copyright (c) 2004 iSEC Security Research. All Rights Reserved.
*
* THIS PROGRAM IS FOR EDUCATIONAL PURPOSES *ONLY* I
www.eeworm.com/read/253602/12210499
txt veritas backup exec windows agent remote file access exploit.txt
##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file
www.eeworm.com/read/253602/12210542
txt bakbone netvault configure.cfg local buffer overflow exploit.txt
/*
for more informations class101.org/netv-locsbof.pdf
*/
#include
#include
#ifdef WIN32
#include "winsock2.h"
#pragma comment(lib, "ws2_32")
#else
#include
www.eeworm.com/read/253602/12210598
txt dameware mini remote control server remote buffer overflow exploit.txt
/********************************************************************************
* _ ______
* (_)___ ____ ____ / ____/
* / / __ \/ __ \/ __ \/___ \
* / / /_/ / / / / /_/ /___/ /
* __/ / .___/_
www.eeworm.com/read/253602/12210606
txt ipswitch imap server login command remote stack overflow exploit.txt
/*
IpSwitch IMAP Server LOGON stack overflow.
Software Hole discovered by iDEFENSE
POC written by nolimit and BuzzDee
First, some information for the few of you that know how this stuff wo
www.eeworm.com/read/253602/12210614
txt mysql maxdb webtool get command remote buffer overflow exploit.txt
##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file
www.eeworm.com/read/253602/12210617
txt novell zenworks 6.5 desktop or server management stack overflow exploit.txt
package Msf::Exploit::zenworks_desktop_agent;
use strict;
use base "Msf::Exploit";
use Pex::Text;
my $advanced = { };
my $info =
{
'Name' => 'ZENworks 6.5 Desktop/Server Management Remote S