首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
PEamp 1.02b (.M3U File) Local Buffer Overflow PoC
  日期:2009-07-02 12:47:45 点击:20 评论:0
# ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## ### ## ## ## ## ### ## ## # # PEamp 1.02b (.M3U File) Local Stack Overflow POC ## # # Download: http://files.brothersoft.com/mp3_audio/players/mp3player.zip ## # ## ## ## ## ## ## ## ## ## ## ##
MP3-Nator 2.0 (plf File) Universal Buffer Overflow Exploit (SEH)
  日期:2009-07-02 12:46:13 点击:25 评论:0
#!/usr/bin/perl #[+] Bug : Mp3-Nator 2.0 (plf) Universal Buffer Overflow Exploit (SEH) #[+] Author : ThE g0bL!N # # Greetz to all my friends ## Download:http://files.brothersoft.com/mp3_audio/players/mp3nator.zip ## Tested on: Windows XP Pro SP2 (Fr)
MyEgy Script suffers from a remote SQL injection vulnerability
  日期:2009-07-01 10:13:12 点击:84 评论:0
html !-- Script Name :MyEgy Script Authur : Karar alShaMi Sheko (El3akrab Elmodamer) Email :牋 K4rar@yahoo.com??ahmed_sheko998@yahoo.com Demo : http://www.7obonlin.com Exploit : Write the site in (Victim) field then submit the form :) AdminCp : /?do
Messages Library 2.0 Arbitrary Administrator Account Vulnerability
  日期:2009-07-01 10:11:49 点击:29 评论:0
head titleThE g0bL!N Messages Library 2.0 Remote Add Admintsrator Account /title base target=left link rel=stylesheet href=style.css /head form method=POST action= http://path/sms/admin/mod.php?Action=Add table border=0 cellpadding=0 cellspacing=0 st
SMF Mod Member Awards 1.0.2 Blind SQL Injection Exploit
  日期:2009-07-01 10:11:00 点击:35 评论:0
------------------------------------------------------------------------- SMF Component Member Awards Blind SQL-injection Vulnerability ------------------------------------------------------------------------- author: eLwaux thanks: mailbrush, antic
TFM MMPlayer 2.0 (m3u/ppl) Universal Buffer Overflow Exploit (SEH)
  日期:2009-07-01 10:08:21 点击:14 评论:0
#!/usr/bin/perl #[+] Bug : TFM MMPlayer 2.0 (m3u/ppl) Universal Buffer Overflow Exploit (SEH) #[+] Author : ThE g0bL!N # # Greetz to all my friends ## Tested on: Windows XP Pro SP2 (Fr) # Big Thnx :His0k4 #Download:http://www.tfm.ro/mmplayer/downloa
phpFanfiction remote SQL injection exploit that attempts to pull the admin accou
  日期:2009-06-30 12:11:43 点击:27 评论:0
#!/usr/bin/perl#**********************************************************##phpFanfiction [Remote SQL injection]#**********************************************************##Greetz#www.MainHack.com - www.ServerIsDown.org - www.sux0r.net#VOP Crew [Vak
Versions 1.0.1 and below of the OUT module in PunBB suffer from a remote blind S
  日期:2009-06-30 12:09:37 点击:23 评论:0
#!/usr/bin/perl#[0-Day] PunBB VoteForUs.php OUT Mod = v1.0.1 Remote Blind SQL InjectionExploit#Coded By Dante90, WaRWolFz Crew#Bug Discovered By: Dante90, WaRWolFz Crewuse strict;use LWP::UserAgent;use HTTP::Request::Common;use Time::HiRes;use IO::S
Versions 1.1 and below of the IN module in PunBB suffers from a remote blind SQL
  日期:2009-06-30 12:05:50 点击:21 评论:0
#!/usr/bin/perl#[0-Day] PunBB Affiliations.php IN Mod = v1.1 Remote Blind SQL InjectionExploit#Coded By Dante90, WaRWolFz Crew#Bug Discovered By: Dante90 UltraSound, WaRWolFz Crewuse strict;use LWP::UserAgent;use HTTP::Request::Common;use Time::HiRe
linux/x86 reboot() polymorphic shellcode 57 bytes
  日期:2009-06-30 11:39:58 点击:36 评论:0
/* * Title :reboot() polymorphic shellcode - 57 bytes * Os: Linux x86 * * Author: Jonathan Salwan - submit AT shell-storm.org * Web: http://www.shell-storm.org * * * !! Database of shellcodes = http://www.shell-storm.org/shellcode/ * */ #include std
linux/x86 execve shellcode generator null byte free
  日期:2009-06-30 11:39:11 点击:70 评论:0
/** [][] [] Shellcode Generator null byte free.[] [][] [] Author: certaindeath[] [] Site: certaindeath.netii.net (at the moment under construction)[] [][] [] This program generates a shellcode which uses the stack to store the command (and its argu
Newsolved 1.1.6 (login grabber) Multiple SQL Injection Exploit
  日期:2009-06-30 11:37:08 点击:50 评论:0
#!/usr/bin/perl -w # Neversolved.pl # # Copyright (c) 2009 by jmp-esp.net # # A simple login grabber # by lama - 06/23/2009 # # Tested on: Newsolved 1.1.6 use strict; use LWP::UserAgent; use Getopt::Std; use vars qw/ %opt /; getopts( i:p:u:lfh, %op
Joomla com_bookflip (book_id) Remote SQL Injection Vulnerability
  日期:2009-06-30 11:35:54 点击:86 评论:0
#!/usr/bin/perl -w #Joomla com_bookflip(book_id) Sql injection# ######################################## #[~] Author : boom3rang #[~] Greetz : H!tm@N - KHG - cHs - LiTTLE-HaCkEr - SpywarrioR - cRu3l.b0y - Lanti-Net - urtan #-------------------------
HT-MP3Player 1.0 (.ht3) Universal Buffer Overflow (SEH)
  日期:2009-06-30 11:34:30 点击:56 评论:0
#usage: exploit.py print ************************************************************************** print HT-MP3Player 1.0 (.ht3) Universal Buffer Overflow (SEH)n print Original author: hack4love=(my friend)n print Universal exploit : His0k4n pri
Almnzm (COOKIE: customer) Remote SQL Injection Vulnerability
  日期:2009-06-30 11:31:57 点击:41 评论:0
? print_r(' || || | || o_,_7 _|| . _o_7 _|| q_|_|| o_///_, ( : / (_) / ( . ___________________ _/QQQQQQQQQQQQQQQQQQQ__ ---Script Almnzm SQL INJECTION __/QQQ/````````````````QQQ___ _/QQQQQ/ QQQQQQ ---Powered by Almnzm /QQQQ/`` ```QQQQ /QQQQ/ Q
HT-MP3Player 1.0 (.ht3 File) Local Buffer Overflow Exploit (SEH)
  日期:2009-06-30 11:31:12 点击:37 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # HT-MP3Player 1.0 (.ht3 File) Local buffer Overflow (seh) # # Greetz to all my friends # form egypt ## easy :d ## Tested on: Windows XP Pro SP2 (EN) #############################################
SCMPX 1.5.1 (.m3u File) Local Heap Overflow PoC
  日期:2009-06-30 11:30:08 点击:27 评论:0
#!/usr/bin/perl # # # ############################################################################### # SCMPX 1.5.1 (.m3u File) Local Heap Overflow PoC # ############################################################################### # Found By :: H
Bopup Communications Server (3.2.26.5460) Remote BOF Exploit (SEH)
  日期:2009-06-30 11:29:05 点击:19 评论:0
#!/usr/bin/python #[*] Usage : python bopup.py [target_ip] # _ _ _ __ _ _ _ #| || | (_) ___ / | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ __/ |__ |_| # #[*] Bug : Bopup Communications Server (3.2.26.5460) Remote BOF Exploit
VideoLAN VLC Media Player 0.9.9 smb:// URI Stack BOF PoC
  日期:2009-06-30 11:28:33 点击:147 评论:0
#!/usr/bin/ruby # VideoLAN VLC Media Player 0.9.9 smb:// URI Stack-based Buffer Overflow (Proof-of-Concept) # # Bugtraq ID: 35500 # # The vulnerability can also be triggered via the VLC web interface (disabled by default): # http://[vulnerable_ip]:8
Joomla Component com_php (id) Blind SQL Injection Vulnerability
  日期:2009-06-30 11:27:07 点击:23 评论:0
------------------------------------------------------------------------------ Joomla Component com_php (id) Blind SQL-injection Vulnerability ------------------------------------------------------------------------------ ###########################
共637页/12733条记录 首页 上一页 [442] [443] [444] 445 [446] [447] [448] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved