代码搜索:exploit
找到约 10,000 项符合「exploit」的源代码
代码结果 10,000
www.eeworm.com/read/253602/12210407
txt punbb 小等 v1.2.4 change_email remote sql injection exploit.txt
#!/usr/bin/python
################################################
# _ _ _ _ ___ _ _ ___
# | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \
# | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/
www.eeworm.com/read/253602/12210446
txt sudo 小等1.6.8p8 pathname validation local code execution exploit.txt
#include
#include
#include
#include
#include
#define SUDO "/usr/bin/sudo"
#ifdef BUFSIZ
#undef BUFSIZ
#define BUFSIZ 128
www.eeworm.com/read/253602/12210467
txt tcpdump v3.8.x rt_routing_info remote denial of service exploit.txt
/*[ tcpdump[3.8.x]: (BGP) RT_ROUTING_INFO infinite loop DOS. ]
*
* by: vade79/v9 v9@fakehalo.us (fakehalo/realhalo)
*
* compile:
* gcc xtcpdump-bgp-dos.c -o xtcpdump-bgp-dos
* gcc xtcpdump-
www.eeworm.com/read/253602/12210490
txt linux kernel 2.4.x or 2.6.x uselib() local privilege escalation exploit.txt
/*
* pwned.c - linux 2.4 and 2.6 sys_uselib local root exploit. PRIVATE.
* it's not the best one, the ldt approach is definitively better.
* discovered may 2004. no longer private because lorian/cl
www.eeworm.com/read/253602/12210567
txt linux kernel 2.4.x-2.6.x assembler inline function local dos exploit.txt
/* -----------------------------------------------------------------------------
* frstor Local Kernel exploit
* Crashes any kernel from 2.4.18
* to 2.6.7 because frstor in assembler inline offs
www.eeworm.com/read/253602/12210588
txt sudo 小等 1.6.8p8 pathname validation local code execution exploit.txt
#include
#include
#include
#include
#include
#define SUDO "/usr/bin/sudo"
#ifdef BUFSIZ
#undef BUFSIZ
#define BUFSIZ 128
www.eeworm.com/read/253602/12210595
txt microsoft windows 2k xp task scheduler .job exploit (ms04-022).txt
//*************************************************************
// Microsoft Windows 2K/XP Task Scheduler Vulnerability (MS04-022)
// Proof-of-Concept Exploit for English WinXP SP1
// 15 Jul 2004
www.eeworm.com/read/253602/12210680
txt gnu mailutils imap4d remote pre-auth format string exploit.txt
##
# This file is part of the Metasploit Framework and may be redistributed
# according to the licenses defined in the Authors field below. In the
# case of an unknown or missing license, this file
www.eeworm.com/read/152901/12074747
txt usage.txt
C:\>ms05-055 helper.exe
MS05-055 Windows Kernel APC Data-Free Local Privilege Escalation Vulnerability
Exploit
Create by SoBeIt.
Child ESP:be9a9c0c
PoolIndex:9b PoolType:9a
Perfe
www.eeworm.com/read/247748/12621447
txt mime头攻击程序.txt
#!/usr/bin/perl
#in bugtraq post User may be fooled to execute programs browsing with IE5.1
#so I write a script to exploit it, just a test, have fun :)
#
# http://www.xfocus.org
use Mail::Send