代码搜索:exploit
找到约 10,000 项符合「exploit」的源代码
代码结果 10,000
www.eeworm.com/read/253602/12210170
txt microsoft color management module buffer overflow exploit (ms05-036).txt
/*
* Author: snooq [http://www.redpuffer.net/snooq/web/]
* Date: 21 July 2005
*
* When I looked at the PoC posted on bugtraq....
* I was basically quite disappointed. The 'PoC' fixed
* 'tag co
www.eeworm.com/read/253602/12210184
txt microsoft server message block (smb) remote exploit (ms05-011).txt
/*
* Windows SMB Client Transaction Response Handling
*
* MS05-011
* CAN-2005-0045
*
* This works against Win2k
*
* cybertronic[at]gmx[dot]net
* http://www.livejournal.com/users/cybertron
www.eeworm.com/read/253602/12210194
txt realplayer and helix player rp rt files remote format string exploit.txt
/*
*****************************************************************************
$ An open security advisory #13 - RealPlayer and Helix Player Remote Format String Exploit
*************************
www.eeworm.com/read/253602/12210208
txt microsoft jet database engine db file buffer overflow exploit2.txt
/*
* --------------------------------------
*
* Microsoft Jet (msjet40.dll) Exploit
*
* --------------------------------------
*
* Author:
* ----------
* S.Pearson
* Computer Terrorism (UK
www.eeworm.com/read/253602/12210211
txt slimftpd 小等 3.16 list command remote buffer overflow exploit.txt
/*
*
* Written by redsand
*
*
* Jul 22, 2005
* Vulnerable: SlimFtpd v3.15 and v3.16
* original vuln found by: Raphael Rigo
*
* Usage: ./redslim 127.0.0.1 [# OS RET ]
*
www.eeworm.com/read/253602/12210214
txt microsoft windows remote desktop protocol dos exploit (ms05-041).txt
// Windows XP SP2 'rdpwd.sys' Remote Kernel DoS
//
// Discovered by:
// Tom Ferris
// tommy[at]security-protocols[dot]com
//
// Tested on:
// Microsoft Windows XP SP2
//
// Usage (SPIKE) :
www.eeworm.com/read/253602/12210224
txt phpmyadmin grab_globals.lib.php remote directory traversal exploit.txt
#!/usr/bin/perl
use IO::Socket;
# SecurityReason.com TEAM
# Maksymilian Arciemowicz ( cXIb8O3 ) cxib@securtiyreason.com
#
# Local file inclusion (./$FILE)
# simple exploit phpMyAdmin 2.6.4-pl1
www.eeworm.com/read/253602/12210232
txt 4d webstar tomcat plugin remote buffer overflow exploit.txt
/* 4d buffer overflow
Braden Thomas
the buffer is copied byte by byte starting from the beginning of
the buffer
until a NULL byte is reached (or a couple other types of bytes)
the buffer is cop
www.eeworm.com/read/253602/12210240
txt microsoft internet explorer dhtml object handling exploit (ms05-020).txt
www.eeworm.com/read/253602/12210269
txt linux kernel 2.x setsockopt mcast_msfilter exploit.txt
/*
Vulnerable Systems:
-Linux kernel versions 2.4.22 up to 2.4.25, 2.6.1 up to 2.6.3
setsockopt proof of concept code by Julien TINNES (julien a.t cr0.org)
vulnerability found (as always by Paul