首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Audacity 1.6.2 (.gro File) Local Buffer Overflow PoC
  日期:2009-01-02 17:32:42 点击:24 评论:0
# ----------------------------------------------------------- # Author : Houssamix # ----------------------------------------------------------- # Audacity 1.6.2 (.gro file ) Local buffer overflow POC # download : http://audacity.sourceforge.net/ # A
EggBlog 3.1.10 Change Admin Pass CSRF Vulnerability
  日期:2009-01-02 17:31:39 点击:22 评论:0
| | | Project: EggBlog v 3.1.10 | | Author: x0r | | Email: andry2000[at]hotmail[dot]it | |________________________________________________________________________| Code: html titlex0r :P /title form id=forum-form name=forumform method=post action= h
Megacubo 5.0.7 (mega://) Remote File Download and Execute Exploit
  日期:2009-01-02 17:30:00 点击:33 评论:0
Megacubo 5.0.7 download Execute by :JJunior site: http://www.musicastop.com.br/ tested against Internet Explorer 7 and Mozilla Firefox 1.5 Windows Xp sp 3 software site: http://www.megacubo.net/tv/ download url: http://sourceforge.net/project/showfi
apache 1.x <=> 2.x suphp (suPHP_ConfigPath) bypass safe mode exploit
  日期:2009-01-01 13:39:01 点击:100 评论:0
?/*apache 1.x = 2.x suphp (suPHP_ConfigPath) bypass safe mode exploitAuthor : Mr.SaFa7 Home : v4-team.comnote : this exploit for education :)*/echo [+] Start...n;$bypfile=fopen('php.ini','w+');$stuffile=fopen('.htaccess','w+');if($bypfile and $stuf
Mozilla Firefox version 3.0.5 Libxul remote memory leak exploit
  日期:2009-01-01 13:38:02 点击:37 评论:0
#!/usr/bin/perl# mzff_libxul_ml.pl# Mozilla Firefox 3.0.5 (Libxul) Remote Memory Leak Exploit# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# Debugging shows a near halt @ /usr/lib/xulrunner-x.x.x.x/libxul.so# All Gecko+Mozilla Browsers
Safari (Webkit) version 3.2 remote memory leak exploit
  日期:2009-01-01 13:36:50 点击:57 评论:0
#!/usr/bin/perl# safari_webkit_ml.pl# Safari (Webkit) 3.2 Remote Memory Leak Exploit# Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com]# Access violation when writing to [00000018]# EIP 6B00A02B WebKit.6B00A02B# LastError 00000008 ERROR_NOT
Megacubo 5.0.7 (mega://) Remote eval() Injection Exploit
  日期:2008-12-31 10:13:38 点击:50 评论:0
!-- Megacubo 5.0.7 (mega://) remote eval() injection exploit by Nine:Situations:Group::pyrokinesis site: http://retrogod.altervista.org/ tested against Internet Explorer 8 beta 2/xp sp 3 software site: http://www.megacubo.net/tv/ download url: http:/
Linux Kernel < 2.6.26.4 SCTP Kernel Memory Disclosure Exploit
  日期:2008-12-30 10:25:00 点击:71 评论:0
/* * cve-2008-4113.c * * Linux Kernel 2.6.26.4 SCTP kernel memory disclosure * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4113 * * The sctp_getsockopt_hmac_id
SasCam WebCam Server 2.6.5 ActiveX Remote BOF Exploit
  日期:2008-12-30 10:23:46 点击:30 评论:0
!--********************************************************************************** -- !--SasCam WebCam Server Version 2.6.5 Belus Technology Inc. XHTTP Module v4.1.0.0 -- !--Remote Exploit -- !--Tested in Windows XP SP2/SP3 IE 7.0 -- !--C0d3d by c
CMS NetCat 3.0/3.12 Blind SQL Injection Exploit
  日期:2008-12-30 10:22:33 点击:65 评论:0
? /* AIST NetCat Blind SQL Injection exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected = 3.12 More info: http://www.netcat.ru/ * tested on version 3.0, 3.12 usage: # ./NetCat_blind_SQL_exploit.php -s=NetCat_server -u=User_ID The options are req
IntelliTamper 2.07/2.08 (ProxyLogin) Local Stack Overflow Exploit
  日期:2008-12-30 10:21:49 点击:68 评论:0
#usage: exploit.py print ************************************************************************** print IntelliTamper 2.07/2.08 (ProxyLogin) Local Stack Overflown print Author: His0k4 print Tested on: Windows XP Pro SP2 Frn print Greetings to: pr
Ultimate PHP Board <= 2.2.1 (log inj) Privilege Escalation Exploit
  日期:2008-12-29 17:22:45 点击:43 评论:0
#!/usr/bin/perl -w# ------------------------------------------------------------------# Ultimate PHP Board = 2.2.1 (log inj) Privilege Escalation Exploit# ------------------------------------------------------------------# by athos - staker[at]hotma
TaskDriver <= 1.3 Remote Change Admin Password Exploit
  日期:2008-12-29 17:22:06 点击:19 评论:0
?php /* $Id: taskdriver-1.3.php,v 0.1 2008/12/03 04:04:28 cOndemned Exp $ TaskDriver = 1.3 Remote Change Admin Password Exploit Bug found Exploited by cOndemned Download: http://www.taskdriver.com/downtrack/index.php?down=2 Description: This exploit
Flexphplink Pro Arbitrary File Upload Exploit
  日期:2008-12-29 17:20:56 点击:40 评论:0
#!/usr/bin/perl # HAPPY CHRISTMAS !! # Flexphplink Pro # http://www.hotscripts.com/jump.php?listing_id=21062jump_type=1 # Bug: Arbitrary File Upload # * I coded this exploit just for fun ;) # Exploit coded by Osirys # osirys[at]live[dot]it # http://o
Chilkat FTP ActiveX (SaveLastError) Insecure Method Exploit
  日期:2008-12-29 11:59:05 点击:38 评论:0
html titleChilkatSocket.DLL Arbitrary File Creation ChilkatFTP.dll v3.0.0.2/titlebrbr body h3ChilkatSocket.DLL Arbitrary File Creation ChilkatFTP.dll v3.0.0.2 Arbitrary Data Write Exploit/h3 !c0d3d by callAX *-*-*-*-* 0wN thE b0x p4l *_*-*_*_* Greeti
DeluxeBB <= 1.2 Remote Blind SQL Injection Exploit
  日期:2008-12-29 11:58:20 点击:26 评论:0
#!/usr/bin/perl # -------------------------------------------------- # DeluxeBB = 1.2 Remote Blind SQL Injection Exploit # -------------------------------------------------- # by athos - staker[at]hotmail[dot]it # download on http://deluxebb.com # --
Hex Workshop 5.1.4 (Color Mapping File) Local Buffer Overflow PoC
  日期:2008-12-29 11:54:57 点击:34 评论:0
# Hex Workshop 5.1.4 (Color Mapping File) Local Buffer Overflow Poc # other versions are affected # # By:Encrypt3d.M!nd # Merry Christmas Happy New Year 2009 # # Greetz:-=Mizo=-(Perra :-l),L!0N,El Mariachi,MiNi SpIder,GGY,and all my friends #########
Joomla Component mdigg 2.2.8 Blind SQL Injection Exploit
  日期:2008-12-29 11:52:52 点击:30 评论:0
#!/usr/bin/perl #################################################################################### # Joomla Component mdigg 2.2.8 Blind SQL Injection Exploit # # ..::virangar security team::.. # # www.virangar.net # #C0d3d BY:virangar security team
BulletProof FTP Client (.bps File) Local Stack Overflow PoC
  日期:2008-12-29 11:51:21 点击:26 评论:0
#!/usr/bin/perl#########################################[*] Bug : BulletProof FTP Client .bps Local Stack Overflow (PoC)#[*] Founded by : Mountassif Moad#[*] Greetz : All Freind Str0ke#[*] HOw to use = go to file after Load BP session Enter and boom
Joomla Component com_ice 0.5b2 Blind SQL Injection Exploit
  日期:2008-12-29 11:47:29 点击:66 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################# #Joomla Component com_ice(catid) Blind SQL-injection Exploit ############################################################# #[~] Author : Mount
共637页/12733条记录 首页 上一页 [489] [490] [491] 492 [493] [494] [495] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved