首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Symphony <= 1.7.01 (non-patched) Remote Code Execution Exploit
  日期:2008-08-01 11:24:16 点击:38 评论:0
?php ## Symphony = 1.7.01 (non-patched) Remote Command Execution Exploit ## by Raz0r ( http://Raz0r.name ) ## Software site: http://21degrees.com.au/ ## works regardless magic_quotes_gpc echo ----------------------------------------------------------
NCTsoft AudFile.dll ActiveX Control Remote Buffer Overflow Exploit
  日期:2008-08-01 11:09:50 点击:39 评论:0
----------------------------------------------------------------------------- NCTsoft AudFile.dll ActiveX Control Remote Buffer Overflow url: http://www.nctsoft.com Author: shinnai mail: shinnai[at]autistici[dot]org site: http://www.shinnai.net This
Pligg <= 9.9.0 Remote Code Execution Exploit
  日期:2008-07-31 14:35:21 点击:130 评论:0
#!/usr/bin/perl -w use LWP::UserAgent; use MIME::Base64; use Digest::MD5 qw(md5_hex); use Getopt::Std; getopts('h:', %args); print #############################################n; print # Pligg = 9.9 Remote Code Execution Exploit n; print #########
eNdonesia 8.4 (Calendar Module) Remote SQL Injection Exploit
  日期:2008-07-31 14:33:29 点击:39 评论:0
#!/usr/bin/perl #/----------------------------------------------- #| /----------------------------------------- | #| | Remote SQL Exploit | | #| | eNdonesia 8.4 Remote SQL Exploit | | #| | www.endonesia.org | | #| | Calendar Module | | #| --------
HIOX Browser Statistics 2.0 Arbitrary Add Admin User Exploit
  日期:2008-07-31 11:48:35 点击:45 评论:0
?php @session_start(); ? table align=center width=72% height=95% trtd ?php /* HIOX Browser Statistics 2.0 Arbitrary Add Admin User Vulnerability [~] Discoverd exploited by Stack [~]Greeatz All Freaind [~]Special thnx to Str0ke [~] Name Script : HIOX
HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit
  日期:2008-07-31 11:46:33 点击:42 评论:0
?php @session_start(); ? table align=center width=72% height=95% trtd ?php /* HIOX Random Ad 1.3 Arbitrary Add Admin User Vulnerability [~] Discoverd exploited by Stack [~]Greeatz All Freaind [~]Special thnx to Str0ke [~] Name Script : HIOX Random Ad
e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit
  日期:2008-07-30 10:17:05 点击:26 评论:0
#!/usr/bin/perl ##################################################################################### # e107 Plugin BLOG Engine v2.2 Blind SQL Injection Exploit # # ..::virangar security team::.. # # www.virangar.net # # C0d3d BY:virangar security te
CoolPlayer m3u File Local Buffer Overflow Exploit
  日期:2008-07-30 10:14:49 点击:41 评论:0
#!/usr/bin/perl # k`sOSe - 07/29/2008 use warnings; use strict; # http://www.metasploit.com # EXITFUNC=seh, CMD=c:WINDOWSsystem32calc.exe # [*] x86/shikata_ga_nai succeeded, final size 169 my $shellcode = xd9xcaxd9x74x24xf4x5exb8xf5x65x
Cisco IOS 12.3(18) FTP Server Remote Exploit (attached to gdb)
  日期:2008-07-30 10:12:49 点击:86 评论:0
/* Cisco IOS FTP server remote exploit by Andy Davis 2008 Cisco Advisory ID: cisco-sa-20070509-iosftp - May 2007 Specific hard-coded addresses for IOS 12.3(18) on a 2621XM router Removes the requirement to authenticate and escalates to level 15 *****
Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit
  日期:2008-07-29 12:05:02 点击:32 评论:0
!-- Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control Buffer Overflow Exploit written by e.b. Tested on Windows XP SP2(fully patched) English, IE6 + IE7, OfficeScan 7.3 patch 4, OfficeScanRemoveCtrl.dll version 7.3.0.1020 The control is installed
IceBB <= 1.0-RC9.2 Blind SQL Injection / Session Hijacking Exploit
  日期:2008-07-28 11:20:58 点击:81 评论:0
# Author:__GiReX__26/07/08 # Homepage:girex.altervista.org # CMS: IceBB = 1.0-RC9.2 # Site:icebb.net # Bug: Blind SQL Injection # Exploit:Session Hijacking PoC # Works regardless of php.ini settings # Description: IceBB is a powerful, fast, free, and
BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (c)
  日期:2008-07-28 11:18:37 点击:53 评论:0
/* * Exploit for CVE-2008-1447 - Kaminsky DNS Cache Poisoning Attack * * Compilation: * $ gcc -o kaminsky-attack kaminsky-attack.c `dnet-config --libs` -lm * * Dependency: libdnet (aka libdumbnet-dev under Ubuntu) * * Author: marc.bevand at rapid7 do
Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit
  日期:2008-07-25 15:33:40 点击:32 评论:0
a name=upload-file/ah2WORDPRESS PLUGIN DOWNLOAD MANAGER 0.2 REMOTE FILE UPLOAD/h2 h3SaO/h3 h4BiyoSecurityTeam || www.biyosecurity.com/h4 iPlugin URI: http://giulioganci.netsons.org/downloads-manageri hr color=#f0f8ff fieldset name=upl class=options f
Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
  日期:2008-07-25 15:29:16 点击:30 评论:0
/* Microsoft Access Snapshot Viewer ActiveX Control Exploit Ms-Acees SnapShot Exploit Snapview.ocx v 10.0.5529.0 Download nice binaries into an arbitrary box Vulnerability discovered by Oliver Lavery http://www.securityfocus.com/bid/8536/info Remote:
BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (py)
  日期:2008-07-25 15:27:36 点击:77 评论:0
from scapy import * import random # Copyright (C) 2008 Julien Desfossez ju@klipix.org # http://www.solisproject.net/ # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as pu
Kaminsky DNS Cache Poisoning Flaw Exploit for Domains
  日期:2008-07-24 12:46:51 点击:46 评论:0
____ ____ __ __ / / | | | | ----====####/ /__##/ / ##| |##| |####====---- | | | |__| | | | | | | | ___ | __ | | | | | ------======###### / /#| |##| |#| |##| |######======------ ____/ |__| |__| ______/ Computer Academic Underground http:/
BIND 9.4.1-9.4.2 Remote DNS Cache Poisoning Flaw Exploit (meta)
  日期:2008-07-24 12:33:02 点击:59 评论:0
____ ____ __ __ / / | | | | ----====####/ /__##/ / ##| |##| |####====---- | | | |__| | | | | | | | ___ | __ | | | | | ------======###### / /#| |##| |#| |##| |######======------ ____/ |__| |__| ______/ Computer Academic Underground http:/
IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit (c)
  日期:2008-07-24 12:32:33 点击:41 评论:0
/* IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Just a C version of Guido Landi's discovery. Written by r0ut3r (writ3r [at] gmail.com) kit:/home/r0ut3r/public_html # gcc -o intell intell.c kit:/home/r0ut3r/public_html # ./intell [+] Build
IntelliTamper 2.07 (server header) Remote Code Execution Exploit
  日期:2008-07-23 11:36:05 点击:67 评论:0
#!/usr/bin/perl # # IntelliTamper 2.07 Remote Code Execution ( server header ) # # By: Koshi # # Guido Landi finally did it, thought i'd throw one in there. # This example assumes you're scanning http://127.0.0.1 # For example, exploit may not work i
IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit
  日期:2008-07-23 11:34:58 点击:23 评论:0
#!/usr/bin/perl # use warnings; use strict; # CMD=c:windowssystem32calc.exe # [*] x86/alpha_mixed succeeded, final size 344 my $shellcode = xdaxc3xd9x74x24xf4x5ax4ax4ax4ax4ax4ax4ax4ax4a . x4ax4ax43x43x43x43x43x43x43x37x52
共637页/12733条记录 首页 上一页 [513] [514] [515] 516 [517] [518] [519] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved