首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
phpTournois <= G4 Remote File Upload/Code Execution Exploit
  日期:2008-04-09 12:55:16 点击:62 评论:0
?php /* * Name: phpTournois = G4 Remote File Upload/Code Execution Exploit * Credits: Charles real F. charlesfol[at]hotmail.fr * Date: 04-06-08 * * - Remote Code Execution * - Remote File Upload * * When testing if we are admin, phpTournois checks if
Tumbleweed SecureTransport FileTransfer ActiveX BOF Exploit
  日期:2008-04-08 10:09:59 点击:60 评论:0
!-- aushack.com - Vulnerability Advisory ----------------------------------------------- Release Date: 07-Apr-2008 Software: Tumbleweed Communications - SecureTransport FileTransfer http://www.tumbleweed.com/ Description: Tumbleweed SecureTransport i
Data Dynamics ActiveBar (Actbar3.ocx 3.2) Multiple Insecure Methods
  日期:2008-04-08 10:08:01 点击:72 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0------------------------------------------------------------------------------------ bData Dynamics ActiveBar ActiveX Control (Actbar3.ocx 3.2) Multiple Inscure M
LinPHA <= 1.3.2 (maps plugin) Remote Command Execution Exploit
  日期:2008-04-08 10:07:01 点击:39 评论:0
?php /* -------------------------------------------------------------- LinPHA = 1.3.2 (maps plugin) Remote Command Execution Exploit -------------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gmail[dot]com l
Drake CMS <= 0.4.11 Remote Blind SQL Injection Exploit
  日期:2008-04-08 10:01:46 点击:40 评论:0
?php /* ------------------------------------------------------ Drake CMS = 0.4.11 Remote Blind SQL Injection Exploit ------------------------------------------------------ author...: EgiX mail.....: n0b0d13s[at]gmail[dot]com link.....: http://drakecm
Apache Tomcat Connector jk2-2.0.2 (mod_jk2) Remote Overflow Exploit
  日期:2008-04-07 14:24:34 点击:190 评论:0
/* ** ** Fedora Core 6,7,8 (exec-shield) based ** Apache Tomcat Connector jk2-2.0.2(mod_jk2) remote overflow exploit ** by INetCop Security ** ** Advanced exploitation in exec-shield (Fedora Core case study) ** URL: http://www.milw0rm.com/papers/151
Picture Rating 1.0 Blind SQL Injection Exploit
  日期:2008-04-07 11:01:18 点击:21 评论:0
#!/usr/bin/perl # -- Picture Rating 1.0 Blind SQL Injection Exploit -- # -Info/Instructions- # After running this perl script, you will have admin details therefore you will be able to login to the admin area at http://site.com/control/ # ok once you
Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit (meta)
  日期:2008-04-07 10:59:31 点击:72 评论:0
____ ____ __ __ / / | | | | ----====####/ /__##/ / ##| |##| |####====---- | | | |__| | | | | | | | ___ | __ | | | | | ------======###### / /#| |##| |#| |##| |######======------ ____/ |__| |__| ______/ Computer Academic Underground http:/
MS Visual Basic Enterprise Ed. 6 SP6 DSR File Local BOF Exploit
  日期:2008-04-07 10:58:50 点击:17 评论:0
#usage: exploit.py print ----------------------------------------------------------------------- print ' [PoC 2] MS Visual Basic Enterprise Ed. 6 SP6 .dsr File Handling BoFn' print author: shinnai print mail: shinnai[at]autistici[dot]org print site:
SCO UnixWare Merge mcd Local Root Exploit
  日期:2008-04-07 10:57:13 点击:25 评论:0
/* 04/2008: public release * I have'nt seen any advisory on this; possibly still not fixed. * * SCO UnixWare Merge mcd Local Root Exploit * By qaaz */ #include stdio.h #include stdlib.h #include string.h #include unistd.h #include errno.h #include sy
SCO UnixWare Reliant HA Local Root Exploit
  日期:2008-04-07 10:56:43 点击:31 评论:0
/* 04/2008: public release * I have'nt seen any advisory on this; possibly still not fixed. * * SCO UnixWare Reliant HA Local Root Exploit * By qaaz */ #include stdio.h #include stdlib.h #include string.h #include unistd.h #include errno.h #include f
SCO UnixWare < 7.1.4 p534589 (pkgadd) Local Root Exploit
  日期:2008-04-07 10:55:36 点击:23 评论:0
#!/bin/ksh # # 04/2008: public release # SCO UnixWare 7.1.4 p534589 # if [ `id -un` = 'root' ]; then grep -v $1-root$ /var/adm/sulog su.log cp su.def /etc/default/su cp su.log /var/adm/sulog rm -f su.def su.log woot.log else echo -------------------
Xitami Web Server v2.5c2 LRWP Processing Format String PoC
  日期:2008-04-07 10:54:45 点击:38 评论:0
/** * * PoC exploit for Xitami Web Server v2.5c2 LRWP processing format string bug * Advisory is available at: http://www.bratax.be/advisories/b013.html * (multiple vulnerabilities! check it out!) * * @author: bratax * @url: http://www.bratax.be/ * @
Microsoft Visual InterDev 6.0 (SP6) SLN File Local Buffer Overflow PoC
  日期:2008-04-07 10:53:17 点击:28 评论:0
#usage: exploit.py FileName import sys print -------------------------------------------------------------------------------- print ' [PoC 2] Microsoft Visual InterDev 6.0 (SP6) .sln files Local Buffer Overflow' print author: shinnai print mail: shin
XnView 1.92.1 Slideshow (FontName) Buffer Overflow Exploit
  日期:2008-04-03 10:43:12 点击:115 评论:0
#!/usr/bin/perl # ================================================================ # XnView 1.92.1 Slideshow FontName Buffer Overflow # ================================================================ # # Calc execution POC Exploit for WinXP SP1 pro
Novel eDirectory HTTP Denial of Service Exploit
  日期:2008-04-03 10:42:35 点击:26 评论:0
#!/usr/bin/python # Novel eDirectory HTTP DOS # Discovered and coded by Mati Aharoni # muts..at..offensive-security.com # http://www.offensive-security.com/0day/novel-edir.py.txt import socket import os import sys from time import sleep biff=*2048 pr
Mcafee EPO 4.0 FrameworkService.exe Remote Denial of Service Exploit
  日期:2008-04-03 10:41:49 点击:83 评论:0
#!/usr/bin/python # Mcafee EPO 4.0 (and others) FrameworkService.exe DOS # More than meets the eye # Discovered and coded by Mati Aharoni # muts..at..offensive-security.com # http://www.offensive-security.com/0day/mcafee_again.py.txt # EAX 00840C30 #
HP OpenView NNM 7.5.1 OVAS.exe SEH PRE AUTH Overflow Exploit
  日期:2008-04-03 10:35:58 点击:1221 评论:0
#!/usr/bin/python ################################################################################ # HP OpenView NNM 7.5.1 OVAS.EXE Pre Authentication SEH Overflow # Tested on Windows 2003 Server SP1. # Coded by Mati Aharoni # muts..at..offensive-sec
Nuked-Klan <= 1.7.6 Multiple Vulnerabilities Exploit
  日期:2008-04-02 13:57:48 点击:53 评论:0
?php /* * Name: Nuked-Klan = 1.7.6 Multiple Vulnerabilities Exploit * Credits: Charles real F. charlesfol[at]hotmail.fr * URL: http://realn.free.fr/releases/46556 * Date: 04-01-08 * * - Remote Code Execution * - Remote File Upload * - Admin Hash Extr
ChilkatHttp ActiveX 2.3 Arbitrary Files Overwrite Exploit
  日期:2008-04-02 13:56:47 点击:29 评论:0
-------------------------------------------------------------------- ChilkatHttp ActiveX 2.3 Arbitrary Files Overwrite url: www.chilkatsoft.com Author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org This was written fo
共637页/12733条记录 首页 上一页 [524] [525] [526] 527 [528] [529] [530] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved