首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MP3 Studio 1.10 (m3u File) Local Buffer Overflow Exploit (SEH) (2051)
  日期:2009-07-29 12:09:11 点击:33 评论:0
#!/usr/bin/python import sys,os,struct Dedicated to the person who reported it but could not exploit it..enjoy! Tested on XP-sp3 -A.Hariri 0041F74F 8B00 MOV EAX,DWORD PTR DS:[EAX] 0041F751 FF50 0C CALL DWORD PTR DS:[EAX+C] fuckurseh=struct.pack('L',
PunBB Automatic Image Upload <= 1.3.5 Delete Arbitrary File Exploit
  日期:2009-07-28 10:44:24 点击:27 评论:0
#!/usr/bin/perl #[0-Day] PunBB Automatic Image Upload = v1.3.5 Delete Arbitrary File Vulnerability #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew #Works only if '$Allow_Delete[] = [USERGROUP];' is not commented in upload
PunBB Automatic Image Upload <= 1.3.5 Remote SQL Injection Exploit
  日期:2009-07-28 10:43:32 点击:37 评论:0
#!/usr/bin/perl #[0-Day] PunBB Automatic Image Upload = v1.3.5 Remote SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90, WaRWolFz Crew #Works only if '$Allow_Stats[] = [USERGROUP];' is not commented in uploadimg_conf
NcFTPd <= 2.8.5 Remote Jail Breakout Vulnerability
  日期:2009-07-28 10:42:48 点击:57 评论:0
NcFTPd = 2.8.5 remote jail breakout Discovered by: Kingcope Contact: kcope2atgooglemail.com / http://isowarez.de Date: 27th July 2009 Greetings: Alex,Andi,Adize,wY!,Netspy,Revoguard Prerequisites: Valid user account. Demonstration on FreeBSD 7.0-REL
MP3 Studio 1.0 (.mpf /.m3u File) Local Stack Overflow PoC
  日期:2009-07-28 10:42:10 点击:20 评论:0
#!/usr/bin/perl # Found By :: HACK4LOVE # MP3 Studio v 1.0 (.mpf /.m3u File) Local Stack Overflow PoC ##http://www.software112.com/products/mp3-millennium+download.html #################################################################################
Allomani Movies & Clips 2.7.0 Remote Blind SQL Injection Exploit
  日期:2009-07-28 10:41:01 点击:66 评论:0
?php ini_set(max_execution_time,0); print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Allomani movies Clips v2.7.0 __/QQQ/````````````````QQQ___ Blind SQL inj. exploit _/QQQQQ
Allomani Songs & Clips 2.7.0 Blind SQL Injection Exploit
  日期:2009-07-28 10:40:10 点击:84 评论:0
?php ini_set(max_execution_time,0); print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Allomani Songs Clips v2.7.0 __/QQQ/````````````````QQQ___ Blind SQL inj. exploit _/QQQQQ/
Allomani Mobile 2.5 Remote Blind SQL Injection Exploit
  日期:2009-07-28 10:38:20 点击:32 评论:0
?php ini_set(max_execution_time,0); print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Allomani Mobile v2.5 __/QQQ/````````````````QQQ___ Blind SQL inj. exploit _/QQQQQ/ QQQQQ
Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit (py)
  日期:2009-07-28 10:37:33 点击:34 评论:0
#!/usr/bin/env python ################################################################################## # # Adobe Acrobat v9.1.2 Local Privilege Escalation Exploit # Coded By: Dr_IDE # Discovered by: Nine:Situations:Group # Tested On: Windows XP SP
Cisco WLC 4402 Basic Auth Remote Denial of Service (meta)
  日期:2009-07-28 10:36:44 点击:31 评论:0
require 'msf/core' class Metasploit3 Msf::Auxiliary include Msf::Exploit::Remote::Tcp include Msf::Auxiliary::Dos def initialize(info = {}) super(update_info(info, 'Name' = 'Cisco WLC 4200 Basic Auth Denial of Service', 'Description' = %q{ This modu
ISC DHCP dhclient < 3.1.2p1 Remote Buffer Overflow PoC
  日期:2009-07-28 10:36:00 点击:65 评论:0
/* * cve-2009-0692.c * * ISC DHCP dhclient 3.1.2p1 Remote Exploit * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692 * * Stack-based buffer overflow in the sc
stftp <= 1.10 (PWD Response) Remote Stack Overflow PoC
  日期:2009-07-28 10:35:14 点击:44 评论:0
#!/usr/bin/python # stftp = 1.10 (PWD Response Stack Overflow) PoC # Tested on: OpenSuSE 11.1 x64 # Coding: sqlevil - sqlevil@hotmail.com # Viva Muslam Al-Barrak from socket import * class tcp: def __init__(self): self.s = socket(AF_INET, SOCK_STREA
URA 3.0 (cat) remote SQL injection Vulnerability
  日期:2009-07-28 10:34:29 点击:50 评论:0
--------------------------------------------------- URA 3.0 (cat) remote SQL injection Vulnerability --------------------------------------------------- ################################################### [+] Author : Chip D3 Bi0s [+] Email : chipde
Mysql5crack Tool
  日期:2009-07-27 11:16:13 点击:36 评论:0
For mysql4.x crack we have mysqlfast,but we dont have mysql5crack tool,maybe this is the first. Code by py: #!/usr/bin/python #Attempts to crack MySQL v5 hash using wordlist. #http://darkc0de.com/ #d3hydr8[at]gmail[dot]com import sys def c1(word): s
The Network Foundation component in Oracle Database versions 9.2.0.8, 9.2.0.8DV,
  日期:2009-07-27 11:13:24 点击:66 评论:0
/* CVE-2009-1020 PoC (CPUjul2009) Fri, 07/24/2009 - 21:07 鈥?dennis - Vulnerability CVE-2009-1020 receives a CVSS Base Score of 9.0 for Windows, and 6.5 for Unix, Linux, and other platforms. This means that a successful exploitation of the vulnerabi
Oracle version 11.1.0.6.0 win32 denial of service exploit
  日期:2009-07-27 11:11:34 点击:148 评论:0
/* CVE-2009-1019 PoC (CPUjul2009) Fri, 07/24/2009 - 22:23 鈥?dennis - CVE-2009-1019 receives a CVSS Base Score of 7.5 denoting that a successful exploit of this vulnerability can lead to a full compromise of the targeted database. This vulnerability
Pixaria Gallery 2.3.5 (file) Remote File Disclosure Exploit
  日期:2009-07-27 11:09:45 点击:62 评论:0
?php ini_set(max_execution_time,0); print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Pixaria Gallery 2.3.5 __/QQQ/````````````````QQQ___ Remote File Disclosure _/QQQQQ/ QQQQ
MS Internet Explorer 7/8 findText Unicode Parsing Crash Exploit
  日期:2009-07-27 11:09:03 点击:48 评论:0
meta http-equiv=Context-Type content=text/html; charset=US-ASCII !-- Contact:h0n9t3n@gmail.com,AmesianX@gmail.com Title: MS Internet Explorer findText Unicode Parsing error Vulnerability (mshtml.dll) Bug discovered: Hong10 PoC code: AmesianX Hong10
Scripteen Free Image Hosting Script 2.3 SQL Injection Exploit
  日期:2009-07-27 11:08:09 点击:41 评论:0
=================== Scripteen Free Image Hosting Script v2.3 SQL Injection vulnerable =================== The vulnerable: header.php (line 53-62) $userid=$_SESSION['userid']; $usergid=$_SESSION['usergid']; if (!$userid || empty($userid) || $userid==
Wordpress 2.8.1 (url) Remote Cross Site Scripting Exploit
  日期:2009-07-27 11:07:39 点击:41 评论:0
#!/bin/bash echo wp281.quickprz // iso^kpsbr SITE=$1 COMMENT=$2 MESSAGE=h4x0riZed by the superfreakaz0rz if [ X$SITE = X ]; then echo $0 url [postID] echo f.e. $0 www.worstpress.eu exit fi if [ X$POSTID = X ]; then POSTID=1 fi echo [+] building payl
共637页/12733条记录 首页 上一页 [435] [436] [437] 438 [439] [440] [441] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved