漏洞列表

漏洞类别:
漏洞等级:
SSV ID 漏洞名称
SSV-68893 Linux write() & exit(0) shellcode genearator with customizable text
SSV-68894 Linux x86 forkbombe
SSV-68895 34 bytes setreud(getuid(), getuid()) & execve("/bin/sh") Shellcode
SSV-68896 Linux/x86_64 reboot(POWER_OFF) 19 bytes shellcode
SSV-68897 Linux/x86_64 execve("/bin/sh"); 30 bytes shellcode
SSV-68898 linux/x86 sends "Phuck3d!" to all terminals (60 bytes) shellcode
SSV-68899 Linux x86 - execve("/bin/bash","-p",NULL) - 33 bytes
SSV-68900 Linux x86 - polymorphic execve("/bin/bash","-p",NULL) - 57 bytes
SSV-68901 WinXP SP2 Fr Download and Exec Shellcode
SSV-68902 Linux x86 execve("/usr/bin/wget", "aaaa"); - 42 bytes
SSV-68903 linux/x86 sys_execve("/bin/sh", "0", "0") with umask 16 (sys_umask(14)) 45 bytes
SSV-68904 Solaris/x86 - execve("/bin/sh","/bin/sh",NULL) - 27 bytes
SSV-68905 Solaris/x86 - Halt shellcode - 36 bytes
SSV-68906 Solaris/x86 - Reboot() - 37 bytes
SSV-68907 Solaris/x86 - Remote Download file - 79 bytes
SSV-68908 Linux/x86 - Disable randomize stack addresse - 106 bytes
SSV-68909 Linux/x86 pwrite("/etc/shadow", hash, 32, 8) Shellcode 83
SSV-68910 Windows Seven Pro SP1 64 Fr (Beep) Shellcode 39 Bytes
SSV-68911 linux/x86 Shellcode Polymorphic - setuid(0) + chmod("/etc/shadow", 0666) Shellcode 61 Bytes
SSV-68912 change mode 0777 of "/etc/shadow" with sys_chmod syscall