首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
WinMerge v2.12.4 Project File Handling Stack Overflow Vulnerability
  日期:2011-02-23 10:56:01 点击:29 评论:0
#!/usr/bin/perl # # # Title: WinMerge v2.12.4 Project File Handling Stack Overflow Vulnerability # # # Vendor: Thingamahoochie Software # Product web page: http://www.winmerge.org # Affected version: 2.12.4.0 Unicode # # Summary: WinMerge is an Open
JAKCMS <= v2.01 RC1 Blind SQL Injection Exploit
  日期:2011-02-23 10:54:04 点击:22 评论:0
#!/usr/bin/python # # jakCMS = v2.01 RC1 Blind SQL Injection Exploit # # Understanding: # The parameters 'JAK_COOKIE_NAME' and 'JAK_COOKIE_PASS' are parsed via cookies to the application # and are unchecked for malicious characters. The contents of
BEES企业网站管理系统 v1.6后台写SHELL ODAY
  日期:2011-02-22 10:01:29 点击:75 评论:0
晚上无聊。然后呢到网上搜了下,无意中搜到此系统。于是就有了以下文章。方便大家以后拿SHELL。呵呵~!顺便和大家一起成长,一起学习。 我会将原程序解释的详细写,以便大家能看到漏洞的形成原因。能更进一步学习。 漏洞文件:/admin/admin_template.php 然后我们看看
JAKCMS <= v2.01 RC1 Blind SQL Injection Exploit
  日期:2011-02-21 11:09:07 点击:46 评论:0
#!/usr/bin/python # # jakCMS = v2.01 RC1 Blind SQL Injection Exploit # # Understanding: # The parameters 'JAK_COOKIE_NAME' and 'JAK_COOKIE_PASS' are parsed via cookies to the application # and are unchecked for malicious characters. The contents of
JAKCMS <= v2.01 Code Execution Exploit
  日期:2011-02-21 11:08:38 点击:42 评论:0
#!/usr/bin/python # # JAKCMS = v2.01 Code Execution Exploit # Explanation: # # During the authentication process, a check is performed to ensure that the user accessing the page is not already logged in. # This process is done by validating the cook
Avira AntVir QUA file in (avcenter.exe) Local Crash PoC
  日期:2011-02-21 11:07:59 点击:104 评论:0
#!/usr/bin/perl #================================================================================= | #| # Title : Avira AntVir QUA file in ( avcenter.exe) Local Crash PoC | #| # Author : KedAns-Dz | #| # email : Ked-h@hotmail.com | #| # Home : HMD/AM
Novell Iprint LPD Remote Code Execution Vulnerability
  日期:2011-02-21 11:07:07 点击:30 评论:0
#!/usr/bin/perl ## Source: ## http://www.protekresearchlab.com/index.php?option=com_contentview=articleid=21Itemid=21 use Getopt::Std; use IO::Socket::INET; $SIG{INT} = abort; my $host = '10.102.3.79'; my $port = 515; my $proto = 'tcp'; my $sockTyp
Novell ZenWorks 10 & 11 TFTPD Remote Code Execution Vulnerability
  日期:2011-02-21 11:06:36 点击:29 评论:0
#!/usr/bin/perl ## Source: ## http://www.protekresearchlab.com/index.php?option=com_contentview=articleid=22Itemid=22 use Getopt::Std; use IO::Socket::INET; $SIG{INT} = abort; my $host = '192.168.100.24'; my $port = 69; my $proto = 'udp'; my $sockT
Mozilla Firefox Interleaving document.write / appendChild Code Execution (meta)
  日期:2011-02-21 11:04:27 点击:64 评论:0
### $Id: mozilla_interleaved_write.rb 11773 2011-02-18 02:23:10Z scriptjunkie $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for m
IBM Lotus Domino LDAP Bind Request Remote Code Execution Vulnerability
  日期:2011-02-21 11:03:03 点击:47 评论:0
#!/usr/bin/perl ## Source: ## http://www.protekresearchlab.com/index.php?option=com_contentview=articleid=23Itemid=23 use Getopt::Std; use IO::Socket::INET; $SIG{INT} = abort; my $host = '192.168.100.66'; my $port = 389; my $proto = 'tcp'; my $sock
天天团购后台Getshell安全问题
  日期:2011-02-18 10:04:40 点击:108 评论:0
by k4shifz[w.s.t] bbs.wolvez.org 上次说到天天团购的后台拿shell。 后台注射,向数据库插入代码。exp需要填写四个参数 $host、$path、$formhash、$cookie。提交后,前台登录执行代码。 ?php/*TianTian Tuangou getshell codz by k4shifzTeam: bbs.worlvez.org*/$host
Microsoft Internet Explorer "Aurora" Memory Corruption(meta)
  日期:2011-02-18 10:02:49 点击:32 评论:0
# $Id: ie_aurora.rb 8136 2010-01-15 21:36:04Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licen
PHP 5.3.5 grapheme_extract() NULL Pointer Dereference
  日期:2011-02-18 10:01:42 点击:49 评论:0
Source: http://securityreason.com/securityalert/8087 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [ PHP 5.3.5 grapheme_extract() NULL Pointer Dereference ] Author: Maksymilian Arciemowicz http://securityreason.com/ http://cxib.net/ Date: - - Dis.:
BWMeter v5.4.0 (.csv) Denial of Service Vulnerability
  日期:2011-02-18 10:01:07 点击:23 评论:0
GotGeek Labs http://www.gotgeek.com.br/ BWMeter v5.4.0 (.csv) Denial of Service [+] Description BWMeter is a powerful bandwidth meter, monitor, traffic controller and firewall, which measures, displays and controls all traffic to/from your computer
Safari On iPod Touch 4.2 Denial Of Service
  日期:2011-02-18 10:00:12 点击:38 评论:0
## Safari Ipod Touch 4.2 DOS BufferOverflow# Causes a crash in the Ipod Touch 4g and then quits the Application# Xinapse# http://www.iexploit.org#var buffer = ;for (var i = 0; i 50000; i++) {buffer += A;}var b2 = buffer;for (i = 0; i 5000; i++) {b2
ActFax Server FTP Remote BOF (post auth)
  日期:2011-02-17 09:35:36 点击:52 评论:0
#!/usr/bin/python # Exploit Title: ActFax Server FTP Remote BOF (post auth) # Date: Feb 15, 2011 # Author: chap0 # Software Link: http://www.actfax.com/download/actfax_setup_en.exe # Version: Version 4.25, Build 0221 (2010-02-11) # Tested on: Window
ActFax Server (LPD/LPR) Remote Buffer Overflow Exploit
  日期:2011-02-17 09:35:02 点击:73 评论:0
#!/usr/bin/perl # Exploit Title: ActFax Server (LPD/LPR) Remote Buffer Overflow Exploit # Date: Feb 15, 2011 # Author: chap0 # Software Link: http://www.actfax.com/download/actfax_setup_en.exe # Version: Version 4.25, Build 0221 (2010-02-11) # Teste
AutoPlay v1.33 (autoplay.ini) Local Buffer Overflow Exploit (SEH)
  日期:2011-02-16 09:25:06 点击:47 评论:0
#!/usr/bin/python # # # AutoPlay v1.33 (autoplay.ini) Local Buffer Overflow Exploit (SEH) # # # Vendor: Naugher Software # Product web page: http://www.naughter.com # Affected version: 1.33 # # Summary: AutoPlay is a shareware application used for m
OmegaBill 1.0 Build 6 Multiple Vulnerabilities
  日期:2011-02-16 09:24:31 点击:31 评论:0
Source: http://packetstormsecurity.org/files/view/98480/OmegaBillv1.0Build6-php.txt ------------------------------------------------------------------------ Software................OmegaBill v1.0 Build 6 Vulnerability...........Arbitrary PHP Executi
Lingxia I.C.E CMS Remote Blind SQL Injection Exploit
  日期:2011-02-16 09:23:40 点击:88 评论:0
#!/usr/bin/python # ICE CMS Blind SQLi 0day. # [mr_me@pluto ice]$ python icecold.py -p localhost:8080 -t 10.3.100.25:8500 -d /ice/ # # | ---------------------------------------------------- | # | Lingxia I.C.E CMS Remote Blind SQL Injection Exploit
共637页/12733条记录 首页 上一页 [304] [305] [306] 307 [308] [309] [310] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved