首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
RoundCube Webmail <= 0.2b Remote Code Execution Exploit
  日期:2008-12-24 11:48:46 点击:61 评论:0
#!/bin/sh # # I was hoping the PoC would not appear so soon, # but now that it is out, # i thought i might as well publish my real exploit. # # Hunger # # # http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5619 # # FOR LEARNING PURPOSES ONLY!
CMS NetCat 3.12 (password_recovery.php) Blind SQL Injection Exploit
  日期:2008-12-24 11:47:46 点击:35 评论:0
? /* NetCat Blind SQL Injection exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected 3.12 More info: http://www.netcat.ru/ * tested on version 3.12 usage: # ./NetCat_blind_SQL_exploit.php -s=NetCat_server -u=User_ID The options are required: -u T
PGP Desktop 9.0.6 (PGPwded.sys) Local Denial of Service Exploit
  日期:2008-12-24 11:46:58 点击:224 评论:0
--------------------------[PGP Desktop 9.0.6 Denial Of Service]--------------- Author: Giuseppe 'Evilcry' Bonfa' E-Mail: evilcry {AT} GMAIL {DOT} COM Profile: http://evilcry.netsons.org Website: http://evilfingers.com/ Release Date: 23/12/2008 +----
Psi Jabber Client (8010/tcp) Remote Denial of Service Exploit (win/lin)
  日期:2008-12-24 11:46:10 点击:58 评论:0
#!/usr/bin/python #psi jabber client 8010/tcp remote denial of service (win lin) #by sha0[at]badchecksum.net #http://jolmos.blogspot.com import socket, sys sock = socket.socket(socket.AF_INET,socket.SOCK_STREAM) try: sock.connect((sys.argv[1],8010))
Mozilla Firefox 3.0.5 location.hash Remote Crash Exploit
  日期:2008-12-24 11:45:27 点击:28 评论:0
#!/usr/bin/perl # mzff_lhash_dos.pl # Mozilla Firefox 3.0.5 location.hash Denial of Service Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # Crash on Vista, play with it on XP $filename = $ARGV[0]; if(!defined($filename)) { pri
CUPS < 1.3.8-4 (pstopdf filter) Privilege Escalation Exploit
  日期:2008-12-24 11:44:47 点击:59 评论:0
/* * cve-2008-5377.c * * CUPS 1.3.8-4 pstopdf filter exploit * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Usage: * * $ gcc cve-2008-5377.c -o cve-2008-5377.c * $ ./cve-2008-5377 * $ id * uid=0(root) gid=1000(vm) ... * * Informati
SolarCMS 0.53.8 (Forum) Remote Cookies Disclosure Exploit
  日期:2008-12-23 10:43:45 点击:34 评论:0
?php error_reporting(0); /*************************************************************** * --------------------------------------------------------- * * SolarCMS 0.53.8 (Forum) Remote Cookies Disclosure Exploit * * ----------------------------------
CoolPlayer 2.19 (Skin File) Local Buffer Overflow Exploit (py)
  日期:2008-12-23 10:42:44 点击:50 评论:0
# CoolPlayer (Skin) Buffer Overflow # maybe all versions are affected :) # By:Encrypt3d.M!nd # # Orginal Exploit: by r0ut3r # http://www.milw0rm.com/exploits/7536 # # i've test it on my box(winxp sp3) and didn't work # so i've re-wrote the exploit an
YourPlace <= 1.0.2 Multiple Remote Vulnerabilities + RCE Exploit
  日期:2008-12-23 10:42:03 点击:37 评论:0
[START] ############################################################################################################################################ [0x01] Informations: Script : YourPlace 0.5 (beta 1) Download : http://www.hotscripts.com/jump.php?li
Pligg 9.9.5b (check_url.php url) Upload Shell/SQL Injection Exploit
  日期:2008-12-23 10:41:08 点击:227 评论:0
#!/usr/bin/perl =about Pligg 9.9.5 Beta Perl exploit AUTHOR discovered written by Ams ax330d [doggy] gmail [dot] com VULN. DESCRIPTION: Vulnerability hides in 'evb/check_url.php' unfiltered $_GET['url'] parameter. Actually, it has filtration. Filtrat
RSS Simple News (news.php pid) Remote SQL Injection Exploit
  日期:2008-12-23 10:40:17 点击:50 评论:0
#!/usr/bin/perl ################################ ## Coded by Piker [piker(dot)ther00t(at)gmail(dot)com] ## D.O.M Team ## piker,ka0x,an0de,xarnuz ## 2008 Security Researchers ################################ ## ## RSS Simple News Remote SQL Injection
CoolPlayer 2.19 (Skin File) Local Buffer Overflow Exploit
  日期:2008-12-22 18:11:25 点击:23 评论:0
/* * CoolPlayer 2.19 (Skin File) Local Buffer Overflow Exploit * * Advisory: http://www.bmgsec.com.au/advisory/43/ * Test box: WinXP Pro SP2 English * * Code reference is in skin.c, lines 464 - 480 * * Written and discovered by: * r0ut3r (writ3r [at]
Linksys Wireless ADSL Router (WAG54G V.2) httpd DoS Exploit
  日期:2008-12-22 18:09:28 点击:76 评论:1
?php /* * LinkSys Wireless ADSL Router httpd DoS Vulnerability * * Product : Linksys (Division of Cisco Systems) * Device : WAG54G V.2 * Firmware: 1.02.20 * Notes : Other devices and firmware versions are no doubt vulnerable. * * Written by: r0ut3r (
OneOrZero helpdesk 1.6.*. Remote Shell Upload Exploit
  日期:2008-12-22 11:12:21 点击:57 评论:0
#!/usr/bin/perl =about OneOrZero 1.6.* Perl exploit AUTHOR discovered written by Ams ax330d [doggy] gmail [dot] com VULN. DESCRIPTION: In 'tinfo.php' script there are function named uploadAttachment() through which we are able to upload files. It doe
ReVou Twitter Clone Admin Password Changing Exploit
  日期:2008-12-22 11:01:19 点击:41 评论:0
?php /* ============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ _ |_____| |_____| /_/ _ |_| |_| ========
MyPBS (index.php seasonID) Remote SQL Injection Exploit
  日期:2008-12-22 11:00:36 点击:38 评论:0
#!/usr/bin/perl ################################ ## Coded by Piker [piker(dot)ther00t(at)gmail(dot)com] ## D.O.M Team ## piker,ka0x,an0de,xarnuz ## 2008 Security Researchers ################################ ## ## MyPBS Remote SQL Injection Exploit ##
Avahi < 0.6.24 (mDNS Daemon) Remote Denial of Service Exploit
  日期:2008-12-22 10:59:54 点击:94 评论:0
/* * cve-2008-5081.c * * Avahi mDNS Daemon Remote DoS 0.6.24 * Jon Oberheide jon@oberheide.org * http://jon.oberheide.org * * Usage: * * gcc cve-2008-5081.c -ldnet -o cve-2008-5081 * ./cve-2008-5081 1.2.3.4 * * Information: * * http://cve.mitre.org/c
2532Gigs 1.2.2 Stable Remote Command Execution Exploit
  日期:2008-12-19 13:25:10 点击:30 评论:0
?php /* ---------------------------------------------------------------- * 2532|Gigs 1.2.2 Stable Remote Command Execution Exploit * ---------------------------------------------------------------- * by athos - staker[at]hotmail[dot]it * works regard
Microsoft Outlook Express DoS
  日期:2008-12-18 11:00:35 点击:59 评论:0
#!/usr/bin/perl # DoS exploit N2 for Microsoft Outlook Express # (C) 2008 MustLive. http://websecurity.com.ua my $from_email = dos@exploit.com; my $to_email = victim@site.com; my $mailprog = /usr/sbin/sendmail; my $message = dth1 style=width:1pxli
Lizardware CMS <= 0.6.0 Blind SQL Injection Exploit
  日期:2008-12-18 10:58:32 点击:20 评论:0
#!/usr/bin/perl -w # Lizardware CMS = 0.6.0 Blind SQL Injection Exploit # by athos - staker[at]hotmail[dot]it # http://sourceforge.net/projects/lizardwarecms/ use strict; use LWP::UserAgent; my ($stop,$start,$hash); my $domain = shift; my $ptable = s
共637页/12733条记录 首页 上一页 [491] [492] [493] 494 [495] [496] [497] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved