Welcome![Sign In][Sign Up]
Location:
Search - adobe exploit

Search list

[ADO-ODBCCVE-2009-0927_package

Description: adobe acrobat/reader getIcon函数出错通用溢出程序-adobe acrobat/reader getIcon function universal exploit
Platform: | Size: 169984 | Author: avi | Hits:

[WEB Codebleedinglife-2.nk

Description: Bleeding Life 2 is an exploit pack that affects the web browsers on the Microsoft Windows operating system with remote code execution buffer overflows. Features Bleeding Life 2 has a variety of exploits and statistics features. Exploits Adobe CVE-2008-2992 CVE-2010-1297 CVE-2010-2884 CVE-2010-0188 Java CVE-2010-0842 CVE-2010-3552 Signed Applet Statistics Statistics by Exploit Statistics by Browser Statistics by OS Version Server Requirements MySQL PHP HTTPD (apache, lighttpd, nginx, etc)
Platform: | Size: 547840 | Author: n3d | Hits:

[Linux-Unix近三年的漏洞复现与防范(修改)

Description: POC: POC,Proof ofConcept,中文意思是“观点证明”。这个短语会在漏洞报告中使用,漏洞报告中的POC则是一段说明或者一个攻击的样例,使得读者能够确认这个漏洞是真实存在的。 EXP: EXP,Exploit,中文意思是“漏洞利用”。意思是一段对漏洞如何利用的详细说明或者一个演示的漏洞攻击代码,可以使得读者完全了解漏洞的机理以及利用的方法。 漏洞概述: 2018年2月1日,Adobe官方发布安全通报(APSA18-01),声明Adobe Flash 28.0.0.137及其之前的版本,存在高危漏洞(CVE-2018-4878)(POC: POC, Proof ofConcept, Chinese means "proof of opinion". This phrase is used in vulnerability reports, and POC in vulnerability reports is a description or an example of an attack that allows the reader to confirm that the vulnerability is real. EXP: EXP, Exploit, Chinese means "exploit". This means a detailed description of how vulnerabilities are exploited or a demo of vulnerability attack code that allows readers to fully understand the mechanism of vulnerabilities and how to exploit them. Vulnerability overview: On February 1, 2018, Adobe issued an official security bulletin (APSA18-01), stating that Adobe Flash 28.0.0.137 and its previous versions had high-risk vulnerabilities (CVE-2018-4878).)
Platform: | Size: 1327104 | Author: zz_1 | Hits:

CodeBus www.codebus.net