首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
eggBlog 4.0 Password Retrieve Remote SQL Injection Exploit
  日期:2008-04-02 09:48:41 点击:44 评论:0
# Author:__GiReX__ # mySite:girex.altervista.org # Date:27/03/2008 - 1/04/2008 Added exploit for str0ke # CMS: eggBlog 4.0 # Site:eggblog.net # Bug: SQL Injection (cookie vars) # Type: 1 - Admin/User Authentication Bypass # Bug2:Blind SQL Injection (
EasyNews 40tr (SQL/XSS/LFI) Remote SQL Injection Exploit
  日期:2008-04-02 09:47:35 点击:32 评论:0
#!/usr/bin/perl ##################################################################################### #### EasyNews-40tr #### #### Multiple Remote Vulnerabilities (SQL Injection Exploit/XSS/LFI) #### ##################################################
Real Player rmoc3260.dll ActiveX Control Remote Code Execution Exploit
  日期:2008-04-02 09:46:08 点击:48 评论:0
!-- Real Player rmoc3260.dll ActiveX Control Remote Code Execution Exploit(Heap Corruption)written by e.b.Tested on Windows XP SP2(fully patched) English, IE6, rmoc3260.dll version 6.0.10.45Thanks to h.d.m. and the Metasploit crew--html head titleRe
mod_jk2 v2.0.2 for Apache 2.0 Remote Buffer Overflow Exploit (win32)
  日期:2008-04-01 11:11:09 点击:47 评论:0
/* Dreatica-FXP crew * * ---------------------------------------- * Target : mod_jk2 v2.0.2 for Apache 2.0 Win32 * Found by : IOActive Security Advisory * ---------------------------------------- * Exploit : mod_jk2 v2.0.2 Buffer Overflow Exploit (wi
Neat weblog 0.2 (articleId) Remote SQL Injection Vulnerability
  日期:2008-04-01 11:09:10 点击:53 评论:0
#!/usr/bin/perl ##################################################################################### #### Neat weblog 0.2 #### #### SQL Injection Exploit #### ##################################################################################### # #
mxBB Module mx_blogs 2.0.0-beta Remote File Inclusion Exploit
  日期:2008-03-31 14:10:20 点击:66 评论:0
# mxBB Module mx_blogs 2.0.0-beta Remote File Include Exploit # # Vendor: http://www.mx-system.com # # Download: http://www.mx-system.com/index.php?page=4action=filefile_id=405 # # Vulncode in: /includes/functions_weblog.php line 24 # # Greetz: str0
Visual Basic (vbe6.dll) Local Stack Overflow PoC / DoS
  日期:2008-03-31 14:08:48 点击:34 评论:0
Stack overflow in vbe6.dll, (used by all versions of MS Office) The overflow occurs in Visual Basic for Application. Creating a property with a long name ( about 247 chars) results in a stack overflow in vbe6.dll which overwrites with a null byte t
Exploits solidDB <= 06.00.1018 multiple vulnerabilities
  日期:2008-03-28 13:59:29 点击:43 评论:0
/* by Luigi Auriemma */ #include stdio.h #include stdlib.h #include string.h #include stdint.h #ifdef WIN32 #include winsock.h #include winerr.h #define close closesocket #define sleep Sleep #define ONESEC 1000 #else #include unistd.h #include sys/s
Quick TFTP Pro 2.1 Remote SEH Overflow Exploit (0day)
  日期:2008-03-27 15:54:02 点击:61 评论:0
#!/usr/bin/python # Quick TFTP Pro 2.1 SEH Overflow (0day) # Tested on Windows XP SP2. # Coded by Mati Aharoni # muts..at..offensive-security.com # http://www.offensive-security.com/0day/quick-tftp-poc.py.txt ########################################
TFTP Server for Windows 1.4 ST Buffer Overflow Exploit (0day)
  日期:2008-03-27 15:51:20 点击:61 评论:0
#!/usr/bin/python # TFTP Server for Windows V1.4 ST (0day) # http://sourceforge.net/projects/tftp-server/ # Tested on Windows Vista SP0. # Coded by Mati Aharoni # muts..at..offensive-security.com # http://www.offensive-security.com/0day/sourceforge-
PacketTrap Networks pt360 2.0.39 TFTPD Remote DoS Exploit
  日期:2008-03-27 15:49:36 点击:40 评论:0
#!/usr/bin/python # PacketTrap Networks pt360 2.0.39 TFTPD Remote DOS # Coded by Mati Aharoni # muts..at..offensive-security.com # http://www.offensive-security.com/0day/pt360dos.py.txt import socket import sys host = '172.16.167.134' port = 69 try:
MPlayer sdpplin_parse() Array Indexing Buffer Overflow Exploit PoC
  日期:2008-03-26 12:00:18 点击:42 评论:0
#!/usr/bin/perl # Huston, mplayer got some vulns! :( # CVE-2008-0073 also apply to mplayer and vlc with some distinctions. # # Assuming kernel.va_randomize=0 this overwrite EIP with a stream structure on my box. # # The first element of the stream s
win32 Download and Execute Shellcode Generator (browsers edition)
  日期:2008-03-25 15:25:08 点击:67 评论:0
#!/usr/bin/perl $loading_url=$ARGV[0]; chomp ($loading_url); my @buffer; if ($loading_url eq ) { $sco = 'ERROR!!! Enter url to remote exe.'; buffer_gen($sco); print @buffer; exit; } $c= generate_char(0); $sco= xE8x56x00x00x00x53x55x56x57x8
VLC <= 0.8.6e Subtitle Parsing Local Buffer Overflow Exploit
  日期:2008-03-25 10:27:18 点击:31 评论:0
/* VLC =0.8.6.e Subtitle parsing local buffer overflow exploit Creadit to cuongmx@gmail.com vs Look2Me @ Tested on windows XP Pro SP2 */ #include stdio.h #include stdlib.h #include string.h char ssa_header[]= [Script Info]rn Title: VLC = 0.8.6c,e
phpBB Module XS-Mod 2.3.1 Local File Inclusion Vulnerability
  日期:2008-03-25 10:21:47 点击:40 评论:0
..%%%%....%%%%...%%..%%...........%%%%...%%%%%...%%%%%%..%%...%%. .%%......%%..%%..%%..%%..........%%..%%..%%..%%..%%......%%...%%. ..%%%%...%%..%%..%%%%%%..%%%%%%..%%......%%%%%...%%%%....%%.%.%%. .....%%..%%..%%..%%..%%..........%%..%%..%%..%%..%%
destar 0.2.2-5 Arbitrary Add New User Exploit
  日期:2008-03-25 10:20:56 点击:38 评论:0
# #!/usr/bin/python # # Exploit for destar 0.2.2-5, tested on Linux Debian # # Bug found and exploit coded by a non root user # # http://nonroot.blogspot.com # # Enero 2008 # # This is a PoC, please use it just for learning how to exploit something
PHP-Nuke Platinum 7.6.b.5 (dynamic_titles.php) SQL Injection Exploit
  日期:2008-03-25 10:19:25 点击:28 评论:0
#!/usr/bin/perl #Inphex use LWP::UserAgent; use LWP::Simple; use IO::Socket; use Switch; #PHP-Nuke Platinum , Forums(Standart) - magic_quotes_gpc = OFF , SQL Injection #nuke_users Structure: #user_id name username user_email femail user_website user
Sun Solaris rpc.ypupdated Arbitrary Command Execution (Exploit)
  日期:2008-03-25 10:15:18 点击:50 评论:0
Sun Solaris rpc.ypupdated Arbitrary Command Execution (Exploit) ------------------------------------------------------------------------ SUMMARY Insufficient filtering done on user provided input by the rpc.ypupdated RPC process under the Sun Solaris
PEEL CMS Admin Hash Extraction and Remote Upload Exploit
  日期:2008-03-20 11:13:33 点击:91 评论:0
#!/usr/bin/php ?php /*---------------------------------------------------------------* * * Exploit:PEEL CMS Admin Hash Extraction and Remote Upload * Credits:Charles real F. charlesfol[at]hotmail.fr * URL: http://realn.free.fr/ * Date:03-18-08 * * T
KAPhotoservice (album.asp) Remote SQL Injection Exploit
  日期:2008-03-19 10:12:41 点击:54 评论:0
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==-- --==+ KAPhotoservice (album.asp) Remote SQL Injection Exploit +==-- --==+==================================================================================
共637页/12733条记录 首页 上一页 [525] [526] [527] 528 [529] [530] [531] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved