首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Ektron 8.02 XSLT Transform Remote Code Execution
  日期:2012-12-06 09:51:19 点击:74 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
Centrify Deployment Manager v2.1.0.283 File Overwrite Vulnerability
  日期:2012-12-05 12:08:28 点击:133 评论:0
Centrify Deployment Manager v2.1.0.283锘 While at a training session for centrify, I noticed poor handling of files in /tmp. I was able to overwrite /etc/shadow with the contents of adcheckDMoutput. I am sure there are more vulnerabilities to be exp
MySQL Windows Remote System Level Exploit (Stuxnet technique) 0day
  日期:2012-12-03 10:57:29 点击:82 评论:0
MySQL Scanner MySQL Server for Windows Remote SYSTEM Level Exploit Version 1.0 By Kingcope In the Year of 2012 http://www.exploit-db.com/sploits/23083.zip use this on a fast scan server! How to use. pnscan: the file accounts holds the user/password
MySQL 5.1/5.5 WiNDOWS REMOTE R00T (mysqljackpot)
  日期:2012-12-03 10:56:58 点击:75 评论:0
*** FARLiGHT ELiTE HACKERS LEGACY R3L3ASE *** Attached is the MySQL Windows Remote Exploit (post-auth, udf technique) including the previously released mass scanner. The exploit is mirrored at the farlight website http://www.farlight.org. Oracle MySQ
MySQL Remote Preauth User Enumeration Zeroday
  日期:2012-12-03 10:45:21 点击:82 评论:0
# MySQL User Account Enumeration Utility # When an attacker authenticates using an incorrect password # with the old authentication mechanism from mysql 4.x and below to a mysql 5.x server # the mysql server will respond with a different message tha
FreeSSHD Remote Authentication Bypass Zeroday Exploit
  日期:2012-12-03 10:44:51 点击:177 评论:0
FreeSSHD all version Remote Authentication Bypass ZERODAY Discovered Exploited by Kingcope Year 2011 http://www.exploit-db.com/sploits/23080.zip Run like: ssh.exe -lvalid username host valid username might be: root admin administrator webadmin sysad
FreeFTPD Remote Authentication Bypass Zeroday Exploit
  日期:2012-12-03 10:44:11 点击:140 评论:0
FreeFTPD all versions Remote System Level Exploit Zero-Day -- No username needed, straightforward rooting! Discovered Exploited By Kingcope Year 2011 -- http://www.exploit-db.com/sploits/23079.zip Example banner: WeOnlyDo-wodFTPD 2.3.6.165 This pack
MySQL Denial of Service Zeroday PoC
  日期:2012-12-03 10:43:02 点击:63 评论:0
5.5.19-log on SuSE Linux DoS exploit: -------------------------------------------------------------------------------------------------------- use Net::MySQL; use Unicode::UTF8 qw[decode_utf8 encode_utf8]; $|=1; my $mysql = Net::MySQL-new( hostname
MySQL (Linux) Database Privilege Elevation Zeroday Exploit
  日期:2012-12-03 10:40:27 点击:100 评论:0
use DBI(); $|=1; =for comment MySQL privilege elevation Exploit This exploit adds a new admin user. By Kingcope Tested on * Debian Lenny (mysql-5.0.51a) * OpenSuSE 11.4 (5.1.53-log) How it works: This exploit makes use of several things: *The attack
MySQL (Linux) Heap Based Overrun PoC Zeroday
  日期:2012-12-03 10:39:43 点击:51 评论:0
# MySQL Heap Overrun # tested for the latest version of mysql server on a SuSE Linux system # # As seen below $edx and $edi are fully controlled, # the current instruction is # = 0x83a6b24 free_root+180: mov (%edx),%edi # this means we landed in a p
MySQL (Linux) Stack Based Buffer Overrun PoC Zeroday
  日期:2012-12-03 10:38:28 点击:73 评论:0
#!/usr/bin/perl =for comment MySQL Server exploitable stack based overrun Ver 5.5.19-log for Linux and below (tested with Ver 5.1.53-log for suse-linux-gnu too) unprivileged user (any account (anonymous account?), post auth) as illustrated below the
IBM System Director Remote System Level Exploit
  日期:2012-12-03 10:32:20 点击:48 评论:0
IBM System Director Remote System Level Exploit (CVE-2009-0880 extended zeroday) Copyright (C) 2012 Kingcope IBM System Director has the port 6988 open. By using a special request to a vulnerable server, the attacker can force to load a dll remotely
Android 4.0.3 <= Browser Remote Crash Exploit
  日期:2012-12-03 10:31:18 点击:60 评论:0
!DOCTYPE html!-----------------------------------------------Android 4.0.3 = Browser Remote Crash Exploit---------------------------------------------Credit: Jean Pascal Pereira pereira@secbiz.dehttp://www.0xffe4.org--htmlbodyscript type=text/javasc
Free WMA to MP3 converter v1.6 - Local buffer overflow (SEH)
  日期:2012-12-03 10:25:48 点击:35 评论:0
#!/usr/bin/python -w# In the name of allah# Title : Local buffer overflow - SEH# Infected program: [Free WMA to MP3 converter 1.6]# Date: 30/11/2012# Exploit Author: [R3ZN0V]# Software : [www.eusing.com]# Download Link: [http://www.eusing.com/free_w
Windows AlwaysInstallElevated MSI
  日期:2012-11-30 09:40:50 点击:141 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
Network Shutdown Module <= 3.21 (sort_values) Remote PHP Code Injection
  日期:2012-11-30 09:39:54 点击:63 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
UMPlayer Portable 0.95 Crash PoC
  日期:2012-11-30 09:31:54 点击:41 评论:0
# Exploit Title: UMPlayer (Portable Edition) # Date: 2012-11-28 # Exploit Author: p3kok # Vendor Homepage: http://www.umplayer.com/ # Software Link: http://sourceforge.net/projects/umplayer/ or http://www.umplayer.com/download/ # Version: 0.95(Porta
Apple QuickTime 7.7.2 MIME Type Buffer Overflow
  日期:2012-11-29 10:11:11 点击:74 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
mcrypt <= 2.6.8 stack-based buffer overflow poc
  日期:2012-11-27 14:27:36 点击:72 评论:0
#!/usr/bin/env python # mcrypt = 2.6.8 stack-based buffer overflow poc # http://mcrypt.sourceforge.net/ # (the command line tool, not the library) # # date: 2012-09-04 # exploit author: _ishikawa # tested on: ubuntu 12.04.1 # tech: it overflows in c
Aviosoft Digital TV Player Professional 1.x (Direct Retn)
  日期:2012-11-27 14:26:57 点击:43 评论:0
# Exploit Title: Aviosoft Digital TV Player Professional 1.x (Direct Retn) # Date: 11-25-2012 # Exploit Author: Nezim (@nezimlufni) # Vendor Homepage: http://www.aviosoft.com/ # Version: Aviosoft Digital TV Player Professional 1.x # Tested on: Windo
共637页/12733条记录 首页 上一页 [223] [224] [225] 226 [227] [228] [229] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved