首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
smcFanControl 2.1.2 Multiple Buffer Overflow Vulnerabilities PoC (OSX)
  日期:2008-11-12 10:10:21 点击:61 评论:0
vnsecurity.net ADVISORY 2008-11 =============================== :Title: Buffer overflows in smcFanControl 2.1.2 for OSX :Severity: Critical :Reporter: KaiJern, Lau ( kjlau at vnsecurity.net) :Products: smcFanControl 2.1.2 :OS: OSX :Fixed in: to be re
ooVoo 1.7.1.35 (URL Protocol) Remote Unicode Buffer Overflow PoC
  日期:2008-11-12 10:08:41 点击:60 评论:0
?php /* ooVoo 1.7.1.35 (URL Protocol) remote unicode buffer overflow poc by Nine:Situations:Group::bruiser tested against IE8b/xp sp3 9sg site: http://retrogod.altervista.org/ software site: http://www.oovoo.com/ description: ooVoo is a startup video
PhpCms2007 sp6 SQL injection 0day (wenba)
  日期:2008-11-10 11:21:54 点击:36 评论:0
? print_r ( ' -------------------------------------------------------------------------------- Phpcms2007(wenba)blindSQLinjection/admincredentialsdisclosureexploit BYoldjun[S.U.S](http://www.oldjun.com) ----------------------------------------------
Mambo Component n-form (form_id) Blind SQL Injection Exploit
  日期:2008-11-10 10:52:30 点击:23 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { system(Title Kosova Hackers Group by boom3rang); print n; print #######################################################################n; print # Mambo Component n-form(form_id)
MemHT Portal <= 4.0 Remote Code Execution Exploit
  日期:2008-11-10 10:51:48 点击:25 评论:0
#!/usr/bin/perl =about MemHT Portal = 4.0 Perl exploit AUTHOR: Discovered and written by Ams ax330d [doggy] gmail [dot] com DESCRIPTION: Here we are able to make SQL-injection due to weak filtering. So, look at inc/inc_header.php lines ~ 74, where hi
GE Proficy Real Time Information Portal Credentials Leak Sniffer (meta)
  日期:2008-11-10 10:50:56 点击:51 评论:0
## # $Id: rtipsniff.rb ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http
VLC Media Player < 0.9.6 .RT Stack Buffer Overflow Exploit
  日期:2008-11-10 10:50:27 点击:78 评论:0
#!/usr/bin/perl # VLC Media Player 0.9.6 .RT File Buffer Overflow (Stack Based) # --------------------------------------------------------------- # Exploit by SkD skdrat@hotmail.com # # This should work on a fully up-to-date Windows XP SP3. If you wa
e-Vision CMS <= 2.0.2 Multiple Local File Inclusion Exploit
  日期:2008-11-07 18:08:09 点击:53 评论:0
?php error_reporting(0); ini_set(default_socket_timeout,5); /* e-Vision = 2.0.2 Multiple Local File Inclusion Exploit ------------------------------------------------------- by athos - download http://sourceforge.net ---------------------------------
Simple Machines Forum <= 1.1.6 (LFI) Code Execution Exploit
  日期:2008-11-06 15:39:10 点击:99 评论:0
#!/usr/bin/perl # # @title: Simple Machines Forum Code Execution # @versn: * = 1.1.6 # @authr: ~elmysterio ( a.k.a us ) # @stats: DROPPED!!!!!!! # @descp: In loving memory of the rare bone marrow disease that killed rgod. # We can't thank you enough
Adobe Reader util.printf() JavaScript Function Stack Overflow Exploit
  日期:2008-11-06 15:12:02 点击:107 评论:0
Adobe Reader Javascript Printf Buffer Overflow Exploit =========================================================== Reference: http://www.coresecurity.com/content/adobe-reader-buffer-overflow CVE-2008-2992 Thanks to coresecurity for the technical back
PHPX 3.5.16 (news_id) Remote SQL Injection Exploit
  日期:2008-11-06 11:40:08 点击:30 评论:0
?php error_reporting(0); ini_set(default_socket_timeout,5); set_time_limit(0); /* --------------------------------------------------- PHP X 3.5.16 (news_id) Remote SQL Injection Exploit --------------------------------------------------- By StAkeR[at
Simple Machines Forum (SMF) 1.1.6 Remote Code Execution Exploit
  日期:2008-11-05 12:26:30 点击:86 评论:0
?php # # Simple Machines Forum (SMF) 1.1.6 Remote Code Execution Exploit # Credits: Charles FOL charlesfol[at]hotmail.fr # URL: http://real.olympe-network.com/ # # Note: other versions are maybe vulnerable, not tested. # # SMF suffers from multiples
TR News <= 2.1 (login.php) Remote Login Bypass Exploit
  日期:2008-11-05 12:25:49 点击:68 评论:0
?php error_reporting(0); /* ------------------------------------------------------ TR News = 2.1 (login.php) Remote Login ByPass Exploit ------------------------------------------------------ By StAkeR[at]hotmail[dot]it http://www.easy-script.com/scr
deV!Lz Clanportal [DZCP] <= 1.4.9.6 Blind SQL Injection Exploit
  日期:2008-11-04 10:27:11 点击:124 评论:0
use HTTP::Cookies; use LWP::UserAgent; my $ua = LWP::UserAgent-new( cookie_jar = HTTP::Cookies-new,); $ua-agent( 'Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9' ); usage(); print n; $server = $ARGV[0]; $dir = $ARGV[1]; $username = $ARGV[2]; $password =
Chipmunk CMS (reguser.php) Add Admin Exploit (html)
  日期:2008-11-04 10:26:09 点击:45 评论:0
# Chipmunk CMS (reguser.php) Add Admin Exploit (html)# url: http://www.chipmunk-scripts.com/chipmunkcms/chipmunkcms.zip## Author: JosS# mail: sys-project[at]hotmail[dot]com# site: http://spanish-hackers.com# team: Spanish Hackers Team - [SHT]## This
deV!Lz Clanportal [DZCP] <= 1.4.9.6 Blind SQL Injection Exploit
  日期:2008-11-03 10:56:56 点击:120 评论:0
use HTTP::Cookies; use LWP::UserAgent; my $ua = LWP::UserAgent-new( cookie_jar = HTTP::Cookies-new,); $ua-agent( 'Mozilla/5.0 Gecko/20061206 Firefox/1.5.0.9' ); usage(); print n; $server = $ARGV[0]; $dir = $ARGV[1]; $username = $ARGV[2]; $password =
Chipmunk CMS (reguser.php) Add Admin Exploit (html)
  日期:2008-11-03 10:56:14 点击:27 评论:0
# Chipmunk CMS (reguser.php) Add Admin Exploit (html) # url: http://www.chipmunk-scripts.com/chipmunkcms/chipmunkcms.zip # # Author: JosS # mail: sys-project[at]hotmail[dot]com # site: http://spanish-hackers.com # team: Spanish Hackers Team - [SHT] #
Micro CMS <= 0.3.5 Remote (Add/Delete/Password Change) Exploit
  日期:2008-11-03 10:55:29 点击:65 评论:0
#!/usr/bin/perl # -------------------------------------------------------------- # Micro CMS = 0.3.5 Remote (Add/Delete/Password Change) Exploit # StAkeR[at]hotmail[dot]it # http://www.impliedbydesign.com/apps/microcms/microcms.zip # ----------------
FTP Now 2.6 Server Response Remote Crash PoC
  日期:2008-11-03 10:54:28 点击:45 评论:0
#!/usr/bin/perl # By Dr.Pantagon # www.deltasecurity.ir # DeltaSecurityCenter # Special Tnx D_7J AND H!V++ # FTP Now version 2.6 Server Response PoC # Usage: ./ftpnow.pl [IP] # Download Link : http://www.network-client.com/ftpnow/FTPNow26.exe # # Det
U-Mail Webmail 4.91 (edit.php) Arbitrary File Write Vulnerability
  日期:2008-11-03 10:53:42 点击:49 评论:0
U-Mail Webmail Arbitrary File Write Vulnerability ================================================== Vulnerable: U-Mail 4.91 Vendors:www.comingchina.com Category: Input Validation Error Impact:An attacker can write arbitrary data to new files. Author
共637页/12733条记录 首页 上一页 [500] [501] [502] 503 [504] [505] [506] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved