时间标题CVE编号分类作者

N/A Windows/x86 - Download File (http://192.168.10.10/evil.exe "c:\\evil.exe") Via bitsadmin + Execute Shellcode (210 Bytes)

-
Exploit-DB
exploitexploit

N/A Windows/x86 - WinExec PopCalc PEB & Export Directory Table NullFree Dynamic Shellcode (178 bytes)

-
Exploit-DB
exploitexploit

N/A NetShareWatcher 1.5.8 - Denial of Service (PoC)

-
Exploit-DB
exploitexploit

N/A Windows/x86 - Download File and Execute / Dynamic PEB & EDT method Shellcode (458 bytes)

-
Exploit-DB
exploitexploit

N/A Windows/x86 - MessageBoxA PEB & Export Address Table NullFree/Dynamic Shellcode (230 bytes)

-
Exploit-DB
exploitexploit

N/A Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)

-
Exploit-DB
exploitexploit

N/A Adult Filter 1.0 - Denial of Service (PoC)

-
Exploit-DB
exploitexploit

CVE-2015-2365 Microsoft Windows Kernel - 'UserCommitDesktopMemory' Use-After-Free (MS15-073)

CVE-2015-2365
Exploit-DB
exploitexploit

N/A Softdisk 3.0.3 - Denial Of Service (PoC)

-
Exploit-DB
exploitexploit

N/A Windows/x86 (XP SP2) (French) - cmd.exe Shellcode (32 bytes)

-
Exploit-DB
exploitexploit

CVE-2014-1767 Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)

CVE-2014-1767
Exploit-DB
exploitexploit

CVE-2018-6947 NoMachine < 6.0.80 (x86) - 'nxfuse' Privilege Escalation

CVE-2018-6947
Exploit-DB
exploitexploit

CVE-2006-3252 PrivateWire Gateway 3.7 (Windows x86) - Remote Buffer Overflow (Metasploit)

CVE-2006-3252
Exploit-DB
exploitexploit

N/A Windows/x86 (PerfectXp-pc1/SP3 ) (Turkish) - Add Administrator User (kpss/12345) Shellcode (112 bytes)

-
Exploit-DB
exploitexploit

N/A PicaJet FX 2.6.5 - Denial of Service (PoC)

-
Exploit-DB
exploitexploit

N/A ALFTP 5.31 - Local Buffer Overflow (SEH Bypass)

-
Exploit-DB
exploitexploit

CVE-2003-0727 Oracle 9i XDB (Windows x86) - FTP UNLOCK Overflow (Metasploit)

CVE-2003-0727
Exploit-DB
exploitexploit

N/A NICO-FTP 3.0.1.19 - Buffer Overflow (SEH)

-
Exploit-DB
exploitexploit

CVE-2013-1300 Microsoft Windows - NTUserMessageCall Win32k Kernel Pool Overflow 'schlamperei.x86.dll' (MS13-053) (Metasploit)

CVE-2013-1300
Exploit-DB
exploitexploit

N/A Bypassing Export Address Table Filters

-
Exploit-DB
exploitexploit

N/A Windows/x86 - Add Administrator User (secuid0/m0nk) Shellcode (326 bytes)

-
Exploit-DB
exploitexploit

N/A CuteFTP 5.0 - Buffer Overflow

-
Exploit-DB
exploitexploit

N/A Socusoft 3GP Photo Slideshow 8.05 - Buffer Overflow (SEH)

-
Exploit-DB
exploitexploit

N/A Windows/x86 (2000) - Reverse (192.168.0.247:8721/TCP) Connect + Vampiric Import Shellcode (179 bytes)

-
Exploit-DB
exploitexploit
个人中心
购物车
优惠劵
今日签到
有新私信 私信列表
搜索