Welcome![Sign In][Sign Up]
Location:
Search - cve

Search list

[WinSock-NDISCVE-2011-0611

Description: CVE-2011-0611 poc,你懂的......
Platform: | Size: 1116 | Author: comewisdom@hotmail.com | Hits:

[Sniffer Package captureudpfraggle

Description: CVE-1999-0514 描述的 udp fraggle 攻击的代码 ,VC++源代码-CVE-1999-0514 described in udp fraggle attack code, VC++ Source code
Platform: | Size: 74752 | Author: 石大 | Hits:

[Internet-NetworkCVE_intrusion

Description: 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态,制订了国内统一的 CVE 标准,具有极大丰富的知识库,有效的解决了国内漏洞库不统一的问题.-The author also describes the architecture and functions and the design and the implement of the software. Intrusion detection system (IDS) is very important for network security. At present, the author systematically analyzes the composition and semantics of Snort rules, which may be of great help for creating signature database, then the paper studies the flexibility and self-controllability in the CVE-based Intrusion Detection System, emphasizes not only on analysis of the snort rules, but on the realization of intrusion detecting based on CVE rules and the implement of the sniffer. Especially, this paper covers the intrusion signature matching methods, and analyzes the weakness when only uses pattern matching in intrusion analysis and presents an improved approach that combines protocol analysis and pattern matching, to dectect attacks. At the same time it gives an example to show how to use this approach. The experimental results show that the rules surely reduce the rate of misd
Platform: | Size: 478208 | Author: 陈中 | Hits:

[ADO-ODBCCVE-2009-0927_package

Description: adobe acrobat/reader getIcon函数出错通用溢出程序-adobe acrobat/reader getIcon function universal exploit
Platform: | Size: 169984 | Author: avi | Hits:

[Windows DevelopCVE-2012-0177

Description: CVE-2012-0177 WPS文件转换功能堆溢出漏洞分析 Microsoft Office 2007 SP2版本、Works 9版本以及Works 6 acirc 9 File Converter中的Office Works File Converter中存在基于堆的缓冲区溢出漏洞-CVE-2012-0177 WPS file conversion feature Heap Overflow Vulnerability Analysis Microsoft Office 2007 SP2 version of the heap-based buffer overflow vulnerability exists in the Works 9 version of Office Works Works 6 acirc 9 File Converter, File Converter
Platform: | Size: 1205248 | Author: wuying | Hits:

[Internet-NetworkCVE-2014-0322

Description: CVE-2014-0322.zip IE10 0day漏洞利用-CVE-2014-0322.zip IE10 0day exploits
Platform: | Size: 14336 | Author: duckfly2 | Hits:

[Crack HackCVE-2011-1149

Description: CVE-2011-1149漏洞是 Android 2.3之前的版本没有正确的限制系统属性空间的访问权限,使得本地应用可以绕开应用沙箱提升与Android共享内存相关的特权,如KillingInTheNameOf 和psneuter。与Android共享内存(ashmem) 和ASHMEM_SET_PROT_MASK有关。-CVE-2011-1149 vulnerability is Android 2.3 versions prior to system properties is not properly restricted access to space, making the local application can bypass the sandbox upgrade and Android application shared memory-related privileges, such as KillingInTheNameOf and psneuter. Shared memory with Android (ashmem) and ASHMEM_SET_PROT_MASK related.
Platform: | Size: 260096 | Author: 王淖尔 | Hits:

[Crack HackCVE-2013-6282

Description: 漏洞属于Linux内核级别的漏洞,在android 2.x至4.3之前的版本中同样存在,可以用于系统提权,获得root权限。属于Linux系统API缺陷。Linux下漏洞的CVE编号为CVE-2013-6282。-Linux kernel level vulnerabilities are vulnerabilities also exist in android 2.x versions prior to 4.3, the system can be used to provide the right to obtain root privileges. Linux systems are API defects. Under Linux vulnerabilities CVE number CVE-2013-6282.
Platform: | Size: 3155968 | Author: 王淖尔 | Hits:

[OS programCVE-2014-0816-master

Description: Privilege Escalation (CVE-2014-0816) Source Code
Platform: | Size: 698368 | Author: johnsmith | Hits:

[ExploitCVE-2015-1701-exploit

Description: CVE-2015-1701提权漏洞源码 适用于未打补丁的Win7。-CVE-2015-1701 exploit source code
Platform: | Size: 32768 | Author: 李二 | Hits:

[ExploitCVE-2015-1701-win2003-exploit

Description: CVE-2015-1701试用win2003 SP2的提权漏洞源码,针对windows2003做了特别处理-CVE-2015-1701 exploit sourcecode for windows2003
Platform: | Size: 304128 | Author: 李二 | Hits:

[ExploitCVE-2014-4113-exp

Description: CVE-2014-4113提权漏洞利用代码,国外大牛将最初只能在win7上使用的代码扩展到了win8上可用。python开发~-CVE-2014-4113 exploit source code。write with python。win 8.
Platform: | Size: 6144 | Author: 李二 | Hits:

[OtherMS15-010(CVE-2015-0057)

Description: MS15-010, CVE-2015-0057 PoC source code
Platform: | Size: 14336 | Author: jmkim | Hits:

[OtherMS15-051(CVE-2015-1701)

Description: MS15-051, CVE-2015-1701 PoC Source Code
Platform: | Size: 40960 | Author: jmkim | Hits:

[OtherMS15-097(CVE-2015-2517)

Description: MS15-097, CVE-2015-2517 PoC Souce Code
Platform: | Size: 5120 | Author: jmkim | Hits:

[OtherMS14-058(CVE-2014-4113)

Description: MS14-058, CVE-2014-4113 PoC Source Code
Platform: | Size: 4096 | Author: jmkim | Hits:

[OtherCVE-2017-12617-master

Description: CVE-2017-12617 critical Remote Code Execution (RCE) vulnerability discovered in Apache Tomcat affect systems with HTTP PUTs enabled (via setting the "read-only" initialization parameter of the Default servlet to "false") are affected. Tomcat versions before 9.0.1 (Beta), 8.5.23, 8.0.47 and 7.0.82 contain a potentially dangerous remote code execution (RCE) vulnerability on all operating systems if the default servlet is configured with the parameter readonly set to false or the WebDAV servlet is enabled with the parameter readonly set to false
Platform: | Size: 849920 | Author: B0u3Zizi | Hits:

[OtherCVE-2017-3506-Poc

Description: CVE-2017-3506POC利用方式(Poc use CVE - 2017-2017)
Platform: | Size: 1024 | Author: 神哥个 | Hits:

[OtherCVE-2017-10271-EXP

Description: CVE-2017-10271-EXP 漏洞利用工具(Cve-2017-10271-exp vulnerability utilization tool.)
Platform: | Size: 1024 | Author: 神哥个 | Hits:

[Windows DevelopCVE-2018-8120-exp

Description: CVE-2018-8120 for all platforms
Platform: | Size: 109441 | Author: luofeidd | Hits:
« 12 3 »

CodeBus www.codebus.net