首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MyBulletinBoard (MyBB) <= 1.2.10 Remote Code Execution Exploit
  日期:2008-01-17 15:36:40 点击:46 评论:0
#!/usr/bin/php -q -d short_open_tag=on ?php // magic_quotes_gpc needs to be off error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc5) { print ----------------------------------------------------------------
PixelPost 1.7 Remote Blind SQL Injection Exploit
  日期:2008-01-17 15:35:50 点击:67 评论:0
#!/usr/bin/php -q -d short_open_tag=on ?php // magic_quotes_gpc needs to be off error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc3) { print ----------------------------------------------------------------
PixelPost 1.7 Remote Blind SQL Injection Exploit
  日期:2008-01-17 15:34:51 点击:54 评论:0
#!/usr/bin/php -q -d short_open_tag=on ?php // magic_quotes_gpc needs to be off error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc3) { print ----------------------------------------------------------------
Cisco VPN Client IPSec Driver Local kernel system pool Corruption PoC
  日期:2008-01-17 15:34:05 点击:179 评论:0
/* cpndrv-dos.c * * Copyright (c) 2008 by mu-b@digit-labs.org * * Cisco Systems VPN Client IPSec Driver local kernel system pool corruption POC * by mu-b - Sat 11 Jan 2008 * * - Tested on: CVPNDRVA.sys 5.0.02.0090 * * specifying an input buffer size
Macrovision FlexNet DownloadManager Insecure Methods Exploit
  日期:2008-01-15 10:40:31 点击:75 评论:0
!-- Macrovision FlexNet DownloadManager Insecure Methods Exploit Implemented Categories: Category: Safe for Scripting Written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, ISDM.exe version 6.1.100.61372 -- html head titleMacrovision F
Xforum 1.4 (topic) Remote SQL Injection Exploit
  日期:2008-01-15 10:39:49 点击:309 评论:0
#!/usr/bin/perl ####################################################### # # Xforum 1.4 Remote SQL Injection # desc: Un forum php/MySQL, avec gestion complete des membres et des messages # download: http://www.comscripts.com/scripts/php.xforum.1188.ht
X7 Chat <= 2.0.5 (day) Remote SQL Injection Exploit
  日期:2008-01-15 10:38:46 点击:84 评论:0
#!/usr/bin/python # #Exploit for xchat 2.0.5 #Saca los usuarios y los hash #By nonroot - 2008 #it's a PoC, please use responsibly # import string,urllib import sys,re print Target host: i.e: http://127.0.0.1/x7chat/ host=raw_input(Target host ( inclu
Quicktime Player <= 7.3.1.70 HTTP error message buffer-overflow 0.1
  日期:2008-01-15 10:36:52 点击:163 评论:0
/* Copyright 2008 Luigi Auriemma This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your opt
Agares PhpAutoVideo 2.21 (articlecat) Remote SQL Injection Exploit
  日期:2008-01-14 13:45:06 点击:59 评论:0
#!/usr/bin/perl #Agares PhpAutoVideo 2.21 (articlecat) Remote SQL Injection Exploit #Bug Found by ka0x ( http://milw0rm.org/exploits/4901 ).. but sql injection works if we include in index.php bug file with sql injection..like this : #http://192.168.
NUVICO DVR NVDV4 / PdvrAtl Module (PdvrAtl.DLL 1.0.1.25) BoF Exploit
  日期:2008-01-14 13:43:48 点击:86 评论:0
!-- NUVICO DVR NVDV4 / PdvrAtl Module (PdvrAtl.DLL 1.0.1.25) remote heap overflow exploit (IE7/XP SP2) check a camera demo here: http://www.2mcctv.com/2mdemo.php codebase: http://www.dvrstation.com/pdvratl.php?vendor=0 rgod //////////////////////////
photokron <= 1.7 (update script) Remote Database Disclosure Exploit
  日期:2008-01-14 13:42:20 点击:49 评论:0
#!/usr/bin/perl #Script : PhotoKron All Version #All Version #Author : Pr0metheuS #Gr33tz to Gr33tz-Team #Gr33tz-Team.ORG #Dork : Powered by photokorn ### INFO ## # Works IF /update/ is on server...60% site are vulnerable.... ## INFO ## use LWP::User
0DayDB 2.3 (delete id) Remote Admin Bypass Exploit
  日期:2008-01-14 13:39:47 点击:73 评论:0
#!/usr/bin/perl #Autor : Pr0metheuS #Script : 0DayDB v2.3 #Version : v2.3 #Dork : Powered By 0DayDB v2.3 #Gr33tz-Team.org use LWP::UserAgent; if(@ARGV!=3){ print *****************n; print 0DayDB v2.3 Remote Admin Bypassn; print perl $0 site path id
Evilsentinel <= 1.0.9 (multiple vulnerabilities) Disable Exploit
  日期:2008-01-11 10:23:44 点击:60 评论:0
#!/usr/bin/php -q -d short_open_tag=on ? echo ' Evilsentinel = 1.0.9 Disable Exploit by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista.org Thanks to rgod for the php code and Marty for the Love '; if ($argc3) { echo Usage: php .$argv[0
SunOS 5.10 Remote ICMP Kernel Crash Exploit
  日期:2008-01-11 10:22:37 点击:91 评论:0
/* SunOS 5.10 Remote ICMP Kernel Crash Exploit by kcope Null Pointer Dereference in Kernel Space Seems to work only if attacked in the same network segment, maybe because of firewalls/routers in place. This seems to be the issue described in bid 2232
Microsoft Message Queue POC exploit ( MS07-065 )
  日期:2008-01-11 10:02:10 点击:259 评论:0
/* ****************************************************************************** ********************** merry christmas Sysadmins ***************************** ****************************************************************************** *********
Docebo <= 3.5.0.3 (lib.regset.php) Command Execution Exploit
  日期:2008-01-10 11:17:23 点击:90 评论:0
? /* ------------------------------------------------------------------- Docebo = 3.5.0.3 (lib.regset.php) Remote Command Execution Exploit ------------------------------------------------------------------- author...: EgiX mail.....: n0b0d13s[at]gma
McAfee E-Business Server Remote pre-auth Code Execution / DoS PoC
  日期:2008-01-10 11:16:42 点击:57 评论:0
#!/usr/bin/perl # # # McAfee(R) E-Business Server(TM) 8.5.2 Remote preauth crash (PoC) # # - tested on Windows and Linux # # # Leon Juranic leon.juranic@infigo.hr, # Infigo IS http://www.infigo.hr/en/ # use IO::Socket; $saddr = 192.168.1.3; $sport =
McAfee E-Business Server Remote pre-auth Code Execution / DoS PoC
  日期:2008-01-10 11:16:42 点击:41 评论:0
#!/usr/bin/perl # # # McAfee(R) E-Business Server(TM) 8.5.2 Remote preauth crash (PoC) # # - tested on Windows and Linux # # # Leon Juranic leon.juranic@infigo.hr, # Infigo IS http://www.infigo.hr/en/ # use IO::Socket; $saddr = 192.168.1.3; $sport =
Microsoft VFP_OLE_Server ActiveX Remote Command Execution
  日期:2008-01-10 11:16:06 点击:42 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0----------------------------------------------------------------------------- bMicrosoft VFP_OLE_Server Remote Command Execution/b url: http://www.microsoft.com A
Microsoft Rich Textbox Control 6.0 (SP6) SaveFile() Insecure Method
  日期:2008-01-10 11:15:19 点击:44 评论:0
precodespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0----------------------------------------------------------------------------- bMicrosoft Rich Textbox Control 6.0 (SP6) SaveFile() Insecure Method/b url: http://ww
共637页/12733条记录 首页 上一页 [531] [532] [533] 534 [535] [536] [537] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved