首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Portfolio <= 0.3 Remote Arbitrary File Upload Exploit
  日期:2008-11-20 15:50:19 点击:41 评论:0
#!/usr/bin/perl # Name: wPortfolio = 0.3 Arbitrary File Upload Exploit # Script Name: wPortfolio 0.3 # Download: http://sourceforge.net/project/downloading.php?group_id=244834use_mirror=kentfilename=wPortfolio.zip80791070 # Vulnerability: Arbitrary F
Exploits Microsoft VISTA TCP/IP stack buffer overflow
  日期:2008-11-20 10:57:00 点击:63 评论:0
#define _WIN32_WINNT 0x0600#define WIN32_LEAN_AND_MEAN#include windows.h#include winsock2.h#include ws2ipdef.h#include iphlpapi.h#include stdio.h#include stdlib.hint main(int argc, char** argv){ DWORD dwStatus; MIB_IPFORWARD_ROW2 route; if (argc !=
MauryCMS <= 0.53.2 Remote Shell Upload Exploit
  日期:2008-11-20 10:56:30 点击:37 评论:0
#!/usr/bin/perl =about MauryCMS = 0.53.2 Remote Shell Upload Exploit ---------------------------------------------- by athos - staker[at]hotmail[dot]it download on http://cms.maury91.org thnx Osirys =cut use strict; use warnings; use LWP::UserAgent;
MyTopix <= 1.3.0 (notes send) Remote SQL Injection Exploit
  日期:2008-11-20 10:55:51 点击:47 评论:0
?php /** * * MyTopix = 1.3.0 (notes send) Remote SQL Injection Exploit * Bug discovered exploited by cOndemned * * Desc : *In order to exploit this vulnerability user have to *be logged on the forum, so I'd decided to write this *exploit x] * * Greet
PunBB (Private Messaging System 1.2.x) Multiple LFI Exploit
  日期:2008-11-20 10:54:59 点击:63 评论:0
?php error_reporting(0); ini_set(default_socket_timeout,5); /* PunBB (Private Messaging System 1.2.x) Multiple LFI Exploit ----------------------------------------------------------- by athos - staker[at]hotmail[dot]it download mod http://www.punres.
Chilkat Socket activex 2.3.1.1 Remote Arbitrary File Creation Exploit
  日期:2008-11-18 11:39:04 点击:62 评论:0
html titleChilkatSocket.DLL Arbitrary File Creation/titlebrbr body Company Name : Chilkat Software, Inc.brbr Vulnerable DLL : ChilkatSocket.DLLbrbr DLL's version : 2,3,1,1brbr Object Safety Report : br Report for Clsid: {474FCCCD-1B89-4D34-9E09-45807
FREEze Greetings 1.0 Remote Password Retrieve Exploit
  日期:2008-11-18 11:38:10 点击:31 评论:0
?php /** * FREEze Greetings 1.0 Remote Password Retrieve Exploit * Exploit by cOndemned * * Greetz : suN8Hclf, 0in, m4r1usz, str0ke, rtgn, doctor, sid.psycho [...] * Special thx to ZaBeaTy for developing such a sexy regexp ;) Thx m8 */ echo Header [~
Opera 9.62 file:// Local Heap Overflow Exploit
  日期:2008-11-18 11:34:38 点击:31 评论:0
html headtitleuh?/title/head body script // k`sOSe 11/15/2008 // tested on Windows XP SP3, opera 9.62 international version // vulnerability found by send9 // there are many ways to achieve code execution, tons of function pointers to overwrite. // m
MS Windows Server Service Code Execution Exploit (MS08-067) (2k/2k3)
  日期:2008-11-17 10:09:03 点击:105 评论:0
#!/usr/bin/env python ############################################################################# # MS08-067 Exploit by Debasis Mohanty (aka Tr0y/nopsled) # www.hackingspirits.com # www.coffeeandsecurity.com # Email: d3basis.m0hanty @ gmail.com ###
Minigal b13 (index.php list) Remote File Disclosure Exploit
  日期:2008-11-17 10:08:05 点击:44 评论:0
?php set_time_limit(0); function find_pass($data){ $pass = explode('$adminpass = ',$data); if($pass[1]!=){ echo(Vuln exploited enjoy !n); sleep(1); echo(Admin hash == [.substr($pass[1],0,32).]n); } else{ echo(Exploit failed!!!!); } } function __sen
Sudo <= 1.6.9p18 (Defaults setenv) Local Privilege Escalation Exploit
  日期:2008-11-17 10:07:17 点击:45 评论:0
#!/bin/sh #* Sudo = 1.6.9p18 local r00t exploit #* by Kingcope/2008/www.com-winner.com # # Most lame exploit EVER! # # Needs a special configuration in the sudoers file: # --- Defaults setenv so environ vars are preserved :) --- # # May also need the
VeryPDF PDFView OCX ActiveX OpenPDF Heap Overflow PoC
  日期:2008-11-17 10:06:21 点击:105 评论:0
!-- VeryPDF PDFView OCX ActiveX OpenPDF Heap Overflow Discovered Written By: r0ut3r (writ3r [at] gmail.com / www.bmgsec.com.au) Advisory: http://www.bmgsec.com.au/advisory/39/ --------------------------------------------------- Tested on: WinXP Pro S
SlimCMS <= 1.0.0 (edit.php) Remote SQL Injection Exploit
  日期:2008-11-15 15:08:40 点击:35 评论:0
#!/usr/bin/perl =starting -------------------------------------------------------- SlimCMS = 1.0.0 (edit.php) Remote SQL Injection Exploit -------------------------------------------------------- by athos - staker[at]hotmail[dot]it download on source
Discuz! 6.x/7.x Remote Code Execution Exploit
  日期:2008-11-15 15:07:42 点击:68 评论:0
#!/usr/bin/php?php/** * Discuz! 6.x/7.x SODB-2008-13 Exp * By www.80vul.com * 文件中注释的变量值请自行修改 */$host = 'www.80vul.com';// 服务器域名或IP$path = '/discuz/';// 程序所在的路径$key = 0;// 上面的变量编辑好后,请将此处的值改为1if (strpos($ho
linux/x86 setuid(0) & execve(/bin/sh,0,0) shellcode 27 bytes
  日期:2008-11-15 15:05:55 点击:83 评论:0
-----------[ C Source Code ]----------- /* Smallest GNU/Linux x86 setuid(0) execve(/bin/sh,0,0) Shellcode without NULLs Coded by Chema Garcia (aka sch3m4) + sch3m4@opensec.es + http://opensec.es Shellcode Size: 27 bytes Date: 13/11/2008 */ #include
MemHT Portal 4.0.1 SQL Injection Code Execution Exploit
  日期:2008-11-14 10:14:33 点击:28 评论:0
#!/usr/bin/perl =about MemHT 4.0.1 Perl exploit AUTHOR discovered written by Ams ax330d [doggy] gmail [dot] com VULN. DESCRIPTION: Due to weak params filtering we are able to make SQL-Injection. So, 1. Look at 'inc/ajax/ajax_rating.php', line ~ 29. I
MS Windows Server Service Code Execution Exploit (MS08-067)
  日期:2008-11-13 11:34:56 点击:74 评论:0
/* MS08-067 Remote Stack Overflow Vulnerability Exploit Author: Polymorphours Email: Polymorphours@whitecell.org Homepage:http://www.whitecell.org Date: 2008-10-28 */ #include stdafx.h #include winsock2.h #include Rpc.h #include stdio.h #include stdl
Net-SNMP <= 5.1.4/5.2.4/5.4.1 Perl Module Buffer Overflow PoC
  日期:2008-11-13 11:34:11 点击:58 评论:0
#!usr/bin/perl -w ################################################################################################################ # Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, # as used in SNMP.xs
Castle Rock Computing SNMPc < 7.1.1 (Community) Remote BOF PoC
  日期:2008-11-13 11:31:52 点击:48 评论:0
#!usr/bin/perl -w ################################################################################################################ # Stack-based buffer overflow in the Network Manager in Castle Rock Computing SNMPc 7.1 and # earlier allows remote att
Linux Kernel < 2.4.36.9/2.6.27.5 Unix Sockets Local Kernel Panic Exploit
  日期:2008-11-12 10:11:01 点击:42 评论:0
#include sys/socket.h #include sys/un.h #include unistd.h #include assert.h #include err.h #include stdlib.h static int own_child(int *us) { int pid; int s[2]; struct msghdr mh; char crap[1024]; struct iovec iov; struct cmsghdr *c; int *fd; int rc; p
共637页/12733条记录 首页 上一页 [499] [500] [501] 502 [503] [504] [505] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved