首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
AlumniServer 1.0.1 (resetpwemail) Blind SQL Injection Exploit
  日期:2009-06-26 11:09:23 点击:63 评论:0
#!/usr/bin/python #*********************************************************************************************** #*********************************************************************************************** #** ** #** ** #** [] [] [] [][][][ []
Joomla Component com_pinboard (task) SQL Injection Exploit
  日期:2009-06-26 11:08:30 点击:75 评论:0
#!/usr/bin/perl -w # Joomla Component (com_pinboard) Remote SQL Injection ######################################## #[*] By : Stack #POc #http://site/index.php?option=com_pinboardItemid=35action=showpictask=-48%20union%20select%201,2,3,4,5,6,username,
The Cisco ASA Web VPN versions 8.0(4), 8.1.2, and 8.2.1 suffer from cross site s
  日期:2009-06-25 11:19:11 点击:165 评论:0
Trustwave's SpiderLabs Security Advisory TWSL2009-002: Cisco ASA Web VPN Multiple VulnerabilitiesPublished: 2009-06-24 Version: 1.0Vendor: Cisco Systems, Inc. (http://www.cisco.com)Versions affected: 8.0(4), 8.1.2, and 8.2.1Description: Cisco's Adap
HP Data Protector 4.00-SP1b43064 Remote Memory Leak/Dos (meta)
  日期:2009-06-24 17:13:02 点击:35 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
HP Data Protector 4.00-SP1b43064 Remote Memory Leak/Dos Exploit
  日期:2009-06-24 17:10:43 点击:44 评论:0
#!/usr/bin/env python #POC Memory disclosure/ Denial Of Service #HP Data protector 4.00-sp1 43064 #Tested for Windows Version Only ''' Buggy code @dpwinsup module of dpwingad process running at 3817/TCP port dpwinsup.10275F80 100DDE89 8B15 54A72210 M
Zen Cart 1.3.8 Remote SQL Execution Exploit
  日期:2009-06-24 17:09:56 点击:58 评论:0
#!/usr/bin/python # # ------- Zen Cart 1.3.8 Remote SQL Execution # http://www.zen-cart.com/ # Zen Cart Ecommerce - putting the dream of server rooting within reach of anyone! # A new version (1.3.8a) is avaible on http://www.zen-cart.com/ # # BlackH
Zen Cart 1.3.8 Remote Code Execution Exploit
  日期:2009-06-24 17:08:31 点击:71 评论:0
#!/usr/bin/php ?php # # ------- Zen Cart 1.3.8 Remote Code Execution # http://www.zen-cart.com/ # Zen Cart Ecommerce - putting the dream of server rooting within reach of anyone! # A new version (1.3.8a) is avaible on http://www.zen-cart.com/ # # Bla
linux/x86 Shellcode Polymorphic chmod("/etc/shadow",666) 54 bytes
  日期:2009-06-24 17:06:52 点击:27 评论:0
/* Title: Linux/x86 - Shellcode Polymorphic chmod(/etc/shadow,666) exit() - 54 bytes Encode : _ADD Author: Jonathan Salwan Mail: submit [!] shell-storm.org ! Database of shellcodes = http://www.shell-storm.org/shellcode/ Informations _chmod() _exit()
Bopup Communications Server 3.2.26.5460 Remote SYSTEM Exploit
  日期:2009-06-23 11:45:02 点击:36 评论:0
/* bopup-down.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * Bopup Communications Server remote SYSTEM exploit * by mu-b - Sat Feb 08 2008 * * - Tested on: Bopup Communications Server 3.2.26.5460 (Mar 18 2009) * * .text:00407A17 lea eax, [ebp+p
MyBB <= 1.4.6 Remote Code Execution Exploit
  日期:2009-06-23 11:43:06 点击:36 评论:0
?PHP /* Someone decided to contact mybb's staff informing about this vulnerability with the obvious result that this will not work anymore. Fucking moron. I'm releasing a non-finished version of the exploit. No help, PoC and with the necessity of --
Multiple HTTP Server Low Bandwidth Denial of Service #2
  日期:2009-06-23 11:34:53 点击:34 评论:0
?php /* DOS for the vulnerbility at http://isc.sans.org/diary.html?storyid=6601 I wrote it in PHP because I find it funny to make PHP attack apache... I set it at 200 processes and it kill my test servers pretty quick. have fun kiddiez... greetz: m1
pmaPWN! - phpMyAdmin Code Injection RCE Scanner & Exploit
  日期:2009-06-23 10:53:01 点击:112 评论:0
print "|****************************************************************|\n"; print " pmaPWN.php - d3ck4, hacking.expose@gmail.com\n"; print " phpMyAdmin Code Injection RCE Scanner & Exploit\n"; print " This is PHP vers
Safari 3.2.3 Arbitrary Code Execution PoC
  日期:2009-06-23 10:51:36 点击:45 评论:0
#!/usr/bin/ruby## The application PubSubAgent quit unexpectedly.## Process: PubSubAgent [3764]# Path: /System/Library/Frameworks/PubSub.framework/Versions/A/Resources/PubSubAgent.app/Contents/MacOS/PubSubAgent# Identifier: PubSubAgent# Version: ???
Multiple Exploiting IE8/IE7 XSS Vulnerability
  日期:2009-06-22 11:22:42 点击:47 评论:0
Multiple Exploiting IE8/IE7 XSS Vulnerability Author: www.80vul.com [Email:5up3rh3i#gmail.com]Release Date: 2009/06/22References: http://www.80vul.com/ie8/Multiple%20Exploiting%20IE8IE7%20XSS%20Vulnerability.txtOverview: Tags[not include IFRAME] in
NetBSD/x86 kill all processes shellcode
  日期:2009-06-22 11:20:16 点击:61 评论:0
/*netbsd/x86 kill all processes shellcodeauthor Teo Manojlovic contact teo.manojlovic@skole.hrthis shellcode is using syscall number 37 or 0x2537 STD { int sys_kill(int pid, int signum); }here is assembler code using intel syntaxe and NASM----------
Safari on the Apple iPhone suffers from a vulnerability that allows an attacker
  日期:2009-06-22 11:19:29 点击:71 评论:0
Released since Apple published the iPhone 3.0 security fixes.Vulnerability Report--- BEGIN ADVISORY ---Manufacturer: Apple (www.apple.com)Device: iPhone 3G (iPhone 1st Gen)Firmware: 2.1 (possible earlier versions)Device Type: smart phoneSubsystems:
PHP version 5.2.10 has an invalid fix for the safe_mode bypass with exec/system/
  日期:2009-06-22 11:17:30 点击:60 评论:0
[PHP safe_mode bypass with exec/system/passthru] Once againphp public new version :php5.2.10 ,and it fix lots of bugs, like this :Bug #45997[safe_mode bypass with exec/system/passthru] incorrect fixphp5.2.10... b = strrchr(cmd, PHP_DIR_SEPARATOR);#i
PEEL E-Commerce suffers from a remote SQL injection vulnerability
  日期:2009-06-22 11:16:26 点击:34 评论:0
#!/usr/bin/python# This was written for educational purpose only. Use it at your own risk.# Author will be not responsible for any damage!# !!! Special greetz for my friend sinner_01 !!!# !!! Special thanx for d3hydr8,low1z and rsauron who inspired
Edraw PDF Viewer Component < 3.2.0.126 ActiveX Insecure Method Vuln
  日期:2009-06-19 09:28:32 点击:87 评论:0
Edraw PDF Viewer Component ActiveX Remote code execution vulnerability By Jambalaya of Nevis Labs Date: 2009.06.16 Vender: EdrawSoft Affected: Edraw PDF Viewer Component 3.2.0.126 *other version may also be affected Overview: Edraw PDF Viewer Compone
DESlock+ 4.0.2 dlpcrypt.sys Local Kernel ring0 Code Execution Exploit
  日期:2009-06-19 09:27:38 点击:32 评论:0
/* deslock-dlpcrypt.c * * Copyright (c) 2009 by mu-b@digit-labs.org * * DESlock+ 4.0.2 local kernel SYSTEM exploit * by mu-b - Thu 18 Jun 2009 * * - Tested on: dlpcrypt.sys 0.1.1.27 * * .text:0001BB2E: 'what do ya want for nothing?' * - hmmm, somethi
共637页/12733条记录 首页 上一页 [443] [444] [445] 446 [447] [448] [449] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved