首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
phPortal 1.2 Multiple Remote File Inclusions Exploit
  日期:2008-07-03 13:55:39 点击:40 评论:0
#!/usr/bin/perl #################################################################################################### # # phportal_1.2_Beta (gunaysoft.php) Remote File Include Vulnerability # # Discovered by : Ciph3r # # Class: Remote File Include Vul
Joomla Component is 1.0.1 Multiple Remote SQL Injection Exploit
  日期:2008-07-03 10:42:36 点击:38 评论:0
#!/usr/bin/perl -w # Joomla Component is v 1.0.1 Multiple Remote SQL Injection # variables vuln : ( marka ) ( motor ) ######################################## #[*] Found by : Houssamix From H-T Team #[*] H-T Team [ HouSSaMix + ToXiC350 ] #[*] Greetz
Joomla Component QuickTime VR 0.1 Remote SQL Injection Exploit
  日期:2008-07-03 10:41:17 点击:29 评论:0
#!/usr/bin/perl -w # Joomla Component QuickTime VR v 0.1 Remote SQL Injection # ######################################## #[*] Found by : Houssamix From H-T Team #[*] H-T Team [ HouSSaMix + ToXiC350 ] #[*] Greetz : Mr.Al3FrItE Islamic Security Team Mo
PHP-Nuke Platinium <= 7.6.b.5 Remote Code Execution Exploit
  日期:2008-07-02 13:11:49 点击:90 评论:0
?php ## ## PHP Nuke Platinium = 7.6.b.5 Remote Code Execution Exploit ## Author: Charles real F. charlesfol[at]hotmail.fr ## Date: 02/07/08 ## ## Note ## **** ## I modified a bit phpsploit for this exploit, ## because PHP Nuke plays with REQUEST_URI
his exploit abuses an old bug to gain root privileges on an OpenBSD 4.0 system
  日期:2008-07-02 09:49:12 点击:93 评论:0
/* * [ A PRODUCTION OF LUL-DISLCOSURE INC. ] * PROUDLY PRESENTS... * * 888 888 * 888 888 * 888 888 * .d88b. 88888b. .d88b. 88888b. 88888b. .d8888b .d88888 * d8888b 888 88b d8P Y8b 888 88b 888 88b 88K d88 888 * 888 888 888 888 88888888 888 888 888 88
busybox uname format string exploit
  日期:2008-07-02 09:47:35 点击:107 评论:0
/* * lul-busybox.c copyright (C) 2008 lul-disclosure inc. All rights reserved. * this code is distributed with the LPL license agreement http://lul-disclosure.net/LPL.txt * moar commonly known as the EULA (Epic User License Agreement) * * busybox un
AShop Deluxe 4.x (catalogue.php cat) Remote SQL Injection Exploit
  日期:2008-07-01 11:10:25 点击:46 评论:0
#usr/bin/perl use LWP::UserAgent; use HTTP::Cookies; use Getopt::Long; use URI::Escape; #-------------------------------------------------------------------------------------------------------------------------------------------------------- # [x] AS
Pivot 1.40.5 Dreamwind load_template() Credentials Disclosure Exploit
  日期:2008-07-01 11:08:37 点击:38 评论:0
?php /* Pivot 1.40.5 'Dreamwind' load_template() credentials disclosure exploit by Nine:Situations:Group::bookoo our site: http://retrogod.altervista.org/ software site: http://www.pivotlog.net/ Google dork: by Pivot - 1.40.5 +'Dreadwind' -pivotlog.n
BareNuked CMS 1.1.0 Arbitrary Add Admin Exploit
  日期:2008-07-01 11:07:19 点击:25 评论:0
#!/usr/bin/perl #============================================ # BareNuked CMS Arbitrary Add Admin Exploit #============================================ # # ,--^----------,--------,-----,-------^--, # | ||||||||| `--------' | O.. CWH Underground Hacki
Joomla Component Xe webtv (id) Blind SQL Injection Exploit
  日期:2008-06-30 11:22:08 点击:35 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print ################################################################n; print # Joomla Component Xe webtv Blind SQL Injection Exploit #n; print # Author:His0k4 [ALGERI
XnView 1.93.6 for Windows .taac Local Buffer Overflow Exploit PoC
  日期:2008-06-27 11:36:41 点击:60 评论:0
#include stdio.h #include stdlib.h /* XnView 1.93.6 for Windows .taac buffer overflow proof of concept. The vulnerability is caused due to a boundary error when processing the format keyword of Sun TAAC files. This can be exploited to cause a stack-b
Seagull PHP Framework <= 0.6.4 (fckeditor) Arbitrary File Upload Exploit
  日期:2008-06-27 10:56:31 点击:50 评论:0
?php /* ------------------------------------------------------------------------ Seagull PHP Framework = 0.6.4 (fckeditor) Arbitrary File Upload Exploit ------------------------------------------------------------------------ author...: EgiX mail....
PHPmotion <= 2.0 (update_profile.php) Remote Shell Upload Exploit
  日期:2008-06-26 16:49:42 点击:85 评论:0
?php /* ----------------------------------------------------------------- PHPmotion = 2.0 (update_profile.php) Remote Shell Upload Exploit ----------------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[
PHPmotion <= 2.0 (update_profile.php) Remote Shell Upload Exploit
  日期:2008-06-26 12:09:51 点击:58 评论:0
?php /* ----------------------------------------------------------------- PHPmotion = 2.0 (update_profile.php) Remote Shell Upload Exploit ----------------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[
Mambo Component Articles (artid) Blind SQL Injection Exploit
  日期:2008-06-26 11:18:20 点击:42 评论:0
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print n; print #######################################################################n; print # Mambo Component Articles Blind SQL Injection Exploit #n; print # Author:Ded Must
TOKOKITA (barang.php produk_id) Remote SQL Injection Exploit
  日期:2008-06-25 11:39:07 点击:77 评论:0
#!/usr/bin/perl # k1tk4t Public Security Advisory # //////////////////////////////////////////////////////////// # TOKOKITA Multiple Remote SQL Injection # Demosite: http://www.tokokita.net/toko/ # Vendor: http://www.tokokita.com/ # Kutu: 1. catlist.
Demo4 CMS 1b (fckeditor) Arbitrary File Upload Exploit
  日期:2008-06-24 13:44:20 点击:97 评论:0
?php /* -------------------------------------------------------------- Demo4 CMS Beta01 (fckeditor) Arbitrary File Upload -------------------------------------------------------------- by Stack Special thnx for : Egix [-] vulnerable code in /[path]/f
cmsWorks 2.2 RC4 (fckeditor) Remote Arbitrary File Upload Exploit
  日期:2008-06-24 13:30:18 点击:62 评论:0
?php /* ----------------------------------------------------------------- cmsWorks 2.2 RC4 (fckeditor) Remote Arbitrary File Upload Exploit ----------------------------------------------------------------- discovered by Stack exploited by ..: EgiX sp
uTorrent / BitTorrent WebIU HTTP 1.7.7/6.0.1 Range header DoS Exploit
  日期:2008-06-24 11:02:35 点击:77 评论:0
#!/usr/bin/perl # uTorrent / BitTorrent WebIU HTTP 1.7.7/6.0.1 Range header Denial of Service exploit # according to the following advisory: http://secunia.com/advisories/30605 # # usage: WebUI-dos.pl url port user:pass # Exploit written by Exodus. #
IGSuite 3.2.4 (reverse shell) Blind SQL Injection Exploit
  日期:2008-06-23 10:48:04 点击:118 评论:0
#!/usr/bin/perl # # 05/18/2008 - IGSuite 3.2.4 Blind SQL Injection - k`sOSe # # 05/21/2008 - Vendor notified # 05/23/2008 - A patch was pushed via the igsuited daemon(not enabled by default) # Fix: run igsuited --update-igsuite or upgrade to 3.2.5-be
共637页/12733条记录 首页 上一页 [516] [517] [518] 519 [520] [521] [522] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved