首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit
  日期:2008-07-14 12:09:30 点击:31 评论:0
?php ## ## Name: Fuzzylime 3.01 Remote Code Execution Exploit ## Credits: Charles real F. charlesfol[at]hotmail.fr ## ## Conditions: None ## ## Greetz: Inphex, hEEGy and austeN ## ## Explanations ## ************ ## ## Ok, so today we will go for a wa
Simple DNS Plus <= 5.0/4.1 Remote Denial of Service Exploit
  日期:2008-07-14 11:40:25 点击:37 评论:0
#!/usr/bin/perl # Simple DNS Plus 5.0/4.1 remote Denial of Service exploit # # usage: sdns-dos.pl dns server dns source port num of packets # Exploit written by Exodus. # http://www.blackhat.org.il use IO::Socket; if(@ARGV 3){ print(sdns-dos.pl dns s
AuraCMS <= 2.2.2 (pages_data.php) Arbitrary Edit/Add/Delete Exploit
  日期:2008-07-10 10:32:29 点击:70 评论:0
#!/usr/bin/perl # k1tk4t Public Security Advisory # //////////////////////////////////////////////////////////// # AuraCMS = 2.2.2 (pages_data.php) Arbitrary Edit/Add/Delete data halaman exploit # Vendor: http://www.auracms.org/ # Kutu: ./js/pages/pa
Poppler <= 0.8.4 libpoppler uninitialized pointer Code Execution PoC
  日期:2008-07-09 12:06:09 点击:71 评论:0
########################################################################## #### Felipe Andres Manzano * fmanzano@fceia.unr.edu.ar #### #### updates in http://felipe.andres.manzano.googlepages.com/home #### ############################################
OllyDBG v1.10 and ImpREC v1.7f (export name) BOF PoC
  日期:2008-07-09 11:56:03 点击:49 评论:0
;-------------------------------------------------------------------------; ; OllyDBG v1.10 and ImpREC v1.7f export name buffer overflow vulnerability ; PoC (probably older versions affected too, not tested though.) ; ; Included shellcode shows a mes
Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day
  日期:2008-07-09 11:55:28 点击:24 评论:0
#!/usr/bin/python # Download Accelerator Plus - DAP 8.x (m3u) 0day Local Buffer Overflow Exploit # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Tested on: Download Accelerator Plus 8.6 / XP SP2 Polish # Shellcode: Windows Execute Comm
trixbox (langChoice) Local File Inclusion Exploit (connect-back)
  日期:2008-07-09 11:54:26 点击:43 评论:0
#!/usr/bin/perl -w # Jean-Michel BESNARD - LEXSI Audit # 2008-07-08 # perl trixbox_fi.pl 192.168.1.212 # Please listen carefully as our menu option has changed # Choose from the following options: # 1 Remote TCP shell # 2 Read local file # 1 # Host a
BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit
  日期:2008-07-09 11:52:39 点击:17 评论:0
#!/usr/bin/perl #================================================= # BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit #================================================= # # ,--^----------,--------,-----,-------^--, # | ||||||||| `--------' | O.. CWH U
martPPC Pay Per Click Script (idDirectory) Blind SQL Injection Exploit
  日期:2008-07-08 12:19:13 点击:57 评论:0
#!/usr/bin/perl -W # SmartPPC Pay Per Click Script Blind SQL Injection Exploit # File affected: directory.php ($idDirectory) # # Vulnerability: Hamtaro # Exploit: ka0x ka0x01[at]gmail.com # # # ka0x@domlabs:~$ ./smartppc.pl -u http://localhost/direct
Neutrino 0.8.4 Atomic Edition Remote Code Execution Exploit
  日期:2008-07-08 12:18:20 点击:33 评论:0
#!/usr/bin/perl # # Neutrino 0.8.4 Atomic Edition Perl exploit # # discovered written by Ams # ax330d@gmail.com # # DESCRIPTION: # First exploit destroys /data/sess.php file (simply strips tags), # then we are able to bypass authorization and using a
Triton CMS Pro (X-Forwarded-For) Blind SQL Injection Exploit
  日期:2008-07-08 12:17:12 点击:64 评论:0
#!/usr/bin/perl -w #Triton CMS Pro (X-Forwarded-For) Blind SQL Injection #Admin's username/hash disclosure exploit #Benchmark() method, so take a coffee and relax #Coded by __GiReX__ use LWP::UserAgent; use HTTP::Request; if(not defined $ARGV[0]) { p
fuzzylime cms 3.01a (file) Local File Inclusion Exploit
  日期:2008-07-08 10:16:11 点击:39 评论:0
#!/usr/bin/perl # Fuzzylime CMS 3.01 LFI / RCE # author : Cod3rZ # website : http://cod3rz.helloweb.eu # # http://[site]/blog.php?file=../[file] # LFI TO RCE use LWP::UserAgent; system(cls); #system(clear); print -----------------------------------
Safari + Quicktime <= 7.3 RTSP Content-Type Remote BOF Exploit
  日期:2008-07-07 11:49:43 点击:36 评论:0
#!/usr/bin/perl # # quickbite.pl # # Safari + Quicktime = 7.3 RTSP Content-Type overflow exploit # for Mac OS X (Intel) # # Tested with OS X 10.4. # On victim, browse to http://server:8080/ # Binds shell on port 4444. # # by krafty # # greets to sk,
CMailServer 5.4.6 (CMailCOM.dll) Remote SEH Overwrite Exploit
  日期:2008-07-07 11:46:29 点击:47 评论:0
?php /* CMailServer 5.4.6 mvmail.asp/CMailCOM.dll remote seh overwrite proof of concept exploit by Nine:Situations:Group::bruiser our site: http://retrogod.altervista.org/ software site: http://www.youngzsoft.net/cmailserver/ Google dorks: intitle:Ma
fuzzylime (cms) 3.01 Remote Command Execution Exploit
  日期:2008-07-07 11:44:06 点击:30 评论:0
#!/usr/bin/perl # # fuzzylime 3.0.1 Perl exploit # # discovered written by Ams # ax330d@gmail.com # # DESCRIPTION: # There are availability to load files through script # rss.php, and also there are unfiltered extract(); usage. # This exploit creates
ImperialBB <= 2.3.5 Remote File Upload Exploit
  日期:2008-07-07 11:43:32 点击:29 评论:0
Title : ImperialBB = 2.3.5 Remote File Upload Vulnerability Date : 5th July 2008 Found by : PHPLizardo - http://phplizardo.2gb.fr Greetz : Gu1ll4um3r0m41n Howto : 1. Go to your User Control Panel 2. Upload any file you want 3. Tamper the request and
Thelia 1.3.5 Multiple Vulnerabilities Exploit
  日期:2008-07-07 11:42:16 点击:45 评论:0
#!/usr/bin/php ?php # # ------- Thelia 1.3.5 Multiple Vulnerability Exploit # http://www.thelia.fr/ # THELIA est un logiciel volutif de Commerce Electronique. THELIA se distingue des applications concurrentes par sa facilit de personnalisation. # A n
Site@School <= 2.4.10 (fckeditor) Session Hijacking / File Upload Exploit
  日期:2008-07-07 11:41:39 点击:66 评论:0
?php /* ------------------------------------------------------------------------- Site@School = 2.4.10 (fckeditor) Session Hijacking / File Upload Exploit ------------------------------------------------------------------------- author...: EgiX mail.
Joomla Component altas 1.0 Multiple Remote SQL Injection Exploit
  日期:2008-07-07 11:36:07 点击:43 评论:0
#!/usr/bin/perl -w # Joomla Component altas v 1.0 Multiple Remote SQL Injection # variables vuln : ( ano ) ( mes ) #[*] Found by : Houssamix From H-T Team #[*] H-T Team [ HouSSaMix + ToXiC350 ] #[*] Greetz : Islamic Security Team and all musulmans ha
CMS WebBlizzard (index.php page) Blind SQL Injection Exploit
  日期:2008-07-04 11:52:15 点击:32 评论:0
#/usr/bin/perl #|+| Vendor Not Notified #|+| Author: Bl@ckbe@rD #|+| Discovered On: 10 june 2008 #|+| greetz: InjEctOrs , underz0ne crew #--//-- # -- CMS webBlizzard Blind SQL Injection Exploit -- #--//-- Exploit : use strict; use LWP::Simple; print
共637页/12733条记录 首页 上一页 [515] [516] [517] 518 [519] [520] [521] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved