代码搜索:exploit
找到约 10,000 项符合「exploit」的源代码
代码结果 10,000
www.eeworm.com/read/253602/12210343
txt gnu mailutils imap4d search command remote format string exploit.txt
/*
* GNU Mailutils 0.6 imap4d 'search' format string exploit.
* Ref: www.idefense.com/application/poi/display?id=303&type=vulnerabilities
*
* This silly exploit uses hardcoded values taken from GN
www.eeworm.com/read/253602/12210366
txt microsoft windows 2000 plug and play universal remote exploit #2 (ms05-039).txt
/* HOD-ms05039-pnp-expl.c: 2005-08-10: PUBLIC v.0.2
*
* Copyright (c) 2005 houseofdabus.
*
* (MS05-039) Microsoft Windows Plug-and-Play Service Remote Overflow
* Universal Exploit + no crash shel
www.eeworm.com/read/253602/12210377
txt linux kernel 小于等于 2.6.11 sys_epoll_waitlocal integer overflow exploit.txt
/*
* k-rad.c - linux 2.6.11 and below CPL 0 kernel exploit v2
* Discovered and exploit coded Jan 2005 by sd
*
* In memory of pwned.c (uselib)
*
* - Redistributions of source
www.eeworm.com/read/253602/12210427
txt i-mall commerce i-mall.cgi remote command execution exploit.txt
##############################################
# GFHost explo
# Spawn bash style Shell with webserver uid
# Greetz SPAX, foxtwo, Zone-H
# This Script is currently under development
##############
www.eeworm.com/read/253602/12210430
txt windows lsasrv.dll remote universal exploit xp2k 04001.txt
/* HOD-ms04011-lsasrv-expl.c:
*
* MS04011 Lsasrv.dll RPC buffer overflow remote exploit
* Version 0.1 coded by
*
*
* .::[ houseofdabus ]::.
*
*
* -----------------
www.eeworm.com/read/253602/12210508
txt mysql eventum 小等1.5.5 login.php remote sql injection exploit.txt
#!/usr/bin/perl -w
use IO::Socket;
use strict;
print "#################################\n";
print "# MySQL Eventum
www.eeworm.com/read/253602/12210513
txt tcpdump v3.8.x ldp_print() remote denial of service exploit.txt
/*[ tcpdump[3.8.x]: (LDP) ldp_print() infinite loop DOS. ]*********
*
* by: vade79/v9 v9@fakehalo.us (fakehalo/realhalo)
*
* compile:
* gcc xtcpdump-ldp-dos.c -o xtcpdump-ldp-dos
*
* tcp
www.eeworm.com/read/253602/12210518
txt kaspersky antivirus 5.x klif.sys local privilege escalation exploit.txt
#include
PUCHAR pCodeBase=(PUCHAR)0xBE9372C0;
PDWORD pJmpAddress=(PDWORD)0xBE9372B0;
PUCHAR pKAVRets[]={(PUCHAR)0xBE935087,(PUCHAR)0xBE935046};
PUCHAR pKAVRet;
unsigne
www.eeworm.com/read/253602/12210563
txt snort 小等 2.4.0 sack tcp option handling remote denial of service exploit.txt
/*_----------------------------------------------
||------+ Snort
www.eeworm.com/read/253602/12210610
txt microsoft internet explorer msdds.dll remote code execution exploit (0day).txt
Note : the "Msdds.dll" library is installed with Microsoft Office and Microsoft Visual Studio.
#!/usr/bin/perl
#######################################################
#
# Microsoft Internet Exp