Ê×Ò³ | °²È«ÎÄÕ | °²È«¹¤¾ß | Exploits | ±¾Õ¾Ô­´´ | ¹ØÓÚÎÒÃÇ | ÍøÕ¾µØͼ | °²È«ÂÛ̳
ÈÈÃŹؼü×Ö£º¡¡shell ¡¡88888 ¡¡art ¡¡vitter ¡¡linux
  µ±Ç°Î»ÖãºÖ÷Ò³>°²È«ÎÄÕÂ>ÎÄÕÂ×ÊÁÏ>Exploits>Áбí
SonicWall SSL-VPN NeLaunchCtrl ActiveX Control Remote Exploit
  ÈÕÆÚ£º2007-11-02 12:12:44 µã»÷£º115 ÆÀÂÛ£º0
!-- SonicWall SSL-VPN NeLaunchCtrl ActiveX Control exploit. by krafty greets to SK, muts, halvar, grugq, and all the ethnical hackers sux to exploit traders - ZDI, WabiSabiLabi, and all you h0arders. Bring back the days of technotronic and r00tshell!
PHP-AGTC membership system 1.1a Remote Add Admin Exploit
  ÈÕÆÚ£º2007-11-02 12:11:58 µã»÷£º55 ÆÀÂÛ£º0
!-- - Product : AGTC-Membership system - Version : 1.1a - Website : http://www.agtc.co.uk - Author : 0x90 - Homepage: WwW.0x90.CoM.Ar - Contact : Guns[at]0x90[dot]com[dot]ar - Problem : Admin Added Access. -- form name=form1 method=post action=http:/
Kodak Image Viewer TIF/TIFF Code Execution Exploit PoC (MS07-055)
  ÈÕÆÚ£º2007-10-30 13:34:12 µã»÷£º69 ÆÀÂÛ£º0
/* MS07-055 Kodak Image Viewer TIF/TIFF Code Execution Proof Of Concept by Hong Gil-Dong, Jeon Woo-chi * Hwang-Hee(?~1542), Prime Minister in Korea * Once upon a time, One servant of Hwang-Hee was arguing with another * servant. they asked Hwang-Hee
Sony CONNECT Player 4.x (m3u File) Local Stack Overflow Exploit
  ÈÕÆÚ£º2007-10-30 13:29:56 µã»÷£º65 ÆÀÂÛ£º0
#!/usr/bin/python #Secunia Advisory : SA27270 #Release Date : 2007-10-29 # Sony CONNECT Player M3U Playlist Processing Stack Buffer Overflow (m3u File) Local Exploit # Bug discovered by Parvez Anwar # Exploit Written by TaMBaRuS (tambarus@gmail.com)
GOM Player 2.1.6.3499 (GomWeb3.dll 1.0.0.12) Remote Overflow Exploit
  ÈÕÆÚ£º2007-10-29 15:10:29 µã»÷£º79 ÆÀÂÛ£º0
!-- GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer overflow poc exploit (ie6/xp sp2) quote from Wikipedia: GOM Player(Gretech Online Movie Player) is South Korea's most popular media player; as of July 2007, it had 8.4 mill
IBM Lotus Domino 7.0.2FP1 IMAP4 Server LSUB Command Exploit
  ÈÕÆÚ£º2007-10-29 15:09:50 µã»÷£º103 ÆÀÂÛ£º0
#!perl # # IBM Lotus Domino IMAP4 Server 'LSUB' Command Exploit # # Author: Manuel Santamarina Suarez # e-Mail: FistFuXXer@gmx.de # use IO::Socket; use File::Basename; # # destination TCP port # $port = 143; # # SE handler # # You can only use HEX va
IBM Tivoli Storage Manager 5.3 Express CAD Service BoF Exploit
  ÈÕÆÚ£º2007-10-29 15:08:55 µã»÷£º114 ÆÀÂÛ£º0
#!/usr/bin/python # # IBM Tivoli Storage Manager Express CAD Service Buffer Overflow (5.3) # http://www.zerodayinitiative.com/advisories/ZDI-07-054.html # Tested on windows 2003 server SP0. # Coded by Mati Aharoni # muts.at.offensive-security.com # h
Jakarta Slide <= 2.1 RC1 Remote File Disclosure Exploit
  ÈÕÆÚ£º2007-10-25 11:31:59 µã»÷£º66 ÆÀÂÛ£º0
#!/usr/bin/perl #****************************************************** # Jakarta Slide Remote File Disclosure Zeroday Xploit # eliteb0y / 2007 # # thanx to the whole team andi :) # +++KEEP PRIV8+++ # # This Bug may reside in different WebDav impleme
eIQnetworks ESA SEARCHREPORT Remote Overflow Exploit (meta)
  ÈÕÆÚ£º2007-10-24 14:26:00 µã»÷£º51 ÆÀÂÛ£º0
## # $Id: eiqnetworks_esa.rb 4529 2007-03-12 01:08:18Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information
Oracle 10g CTX_DOC.MARKUP SQL Injection Exploit
  ÈÕÆÚ£º2007-10-24 14:24:38 µã»÷£º87 ÆÀÂÛ£º0
/******************************************************************/ /******* Oracle 10g CTX_DOC.MARKUP SQL Injection Exploit **********/ /******************************************************************/ /************ sploit grant DBA to unprivile
DNS Recursion bandwidth amplification Denial of Service PoC
  ÈÕÆÚ£º2007-10-24 14:19:34 µã»÷£º70 ÆÀÂÛ£º0
#!/usr/bin/perl # Get Net::RawIP at http://search.cpan.org/CPAN/authors/id/S/SZ/SZABGAB/Net-RawIP-0.21_01.tar.gz # cpan Net::DNS:Resolver seems to work fine on each machine I throw it on, as well. # PS: To see if you can spoof, check out the ANA Spoo
Mozilla Firefox <= 2.0.0.7 Remote Denial of Service Exploit
  ÈÕÆÚ£º2007-10-23 12:23:08 µã»÷£º47 ÆÀÂÛ£º0
i######################### WwW.BugReport.ir ######################### # # AmnPardaz Security Research Penetration Testing Group # # Bug Title: Mozilla Firefox 2.0.0.7 Denial of Service # Vendor URL: www.mozilla.org # Version: = 2.0.0.7 # Fix Availabl
PHP 5.x COM functions safe_mode and disable_function bypass
  ÈÕÆÚ£º2007-10-23 12:22:30 µã»÷£º155 ÆÀÂÛ£º0
?php //PHP 5.x COM functions safe_mode and disable_function bypass //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //dork: intitle:phpinfo intext:php version +windows (thanks to rgod) //Tested on xp Pro sp
Apache Tomcat (webdav) Remote File Disclosure Exploit (ssl support)
  ÈÕÆÚ£º2007-10-22 11:40:40 µã»÷£º68 ÆÀÂÛ£º0
#!/usr/bin/perl #================================================================ # Apache Tomcat Remote File Disclosure Zeroday Xploit - With support for SSL # MoDiFiEd version by : h3rcul3s # ORiGiNaL Version by : kcdarookie aka eliteb0y / 2007 htt
BBPortalS <= 2.0 Remote Blind SQL Injection Exploit
  ÈÕÆÚ£º2007-10-22 11:39:32 µã»÷£º57 ÆÀÂÛ£º0
#BBPortalS BBsProcesS Remote Blind SQL Injection Exploit #Bug Found And Write By Max007 #Exploit Tested On V.1.5.10 And V.1.6.2 And 1.5.11 #info:For The Version BBPortalS 2.0 name of field is user and password but you have to find name of table #!/us
Vanilla <= 1.1.3 Remote Blind SQL Injection Exploit
  ÈÕÆÚ£º2007-10-22 11:38:49 µã»÷£º71 ÆÀÂÛ£º0
?php ## Vanilla = 1.1.3 Remote Blind SQL Injection Exploit ## By InATeam (http://inattack.ru/) ## Requirements: MySQL = 4.1, magic_quotes_gpc=Off ## Tested on versions 1.1.3, 1.1.2, 1.0.1 echo ---------------------------------------------------------
SMF 1.1.3 Extremely fast Blind SQL Injection Exploit
  ÈÕÆÚ£º2007-10-22 11:37:30 µã»÷£º114 ÆÀÂÛ£º0
#!/usr/bin/perl #Written By Michael Brooks #contact: th3(dot)r00k(at)gmail(dot)com #SMF 1.1.3 Extremely fast Blind SQL Injection Exploit! #-Binary Search #-Multi-Threaded #-NO benchmark()'s # #Two SQL Injection flaws. #Works with magic_quotes_gpc=On
KNET Webserver <= v1.04c PoC Xploit
  ÈÕÆÚ£º2007-10-19 09:11:16 µã»÷£º50 ÆÀÂÛ£º0
/* * KNET Webserver (= 1.04c) PoC Exploit * * Testeado en Windows XP Spanish SP1 con KNET 1.04c * Da una cmd shell remota en el puerto 9100 * * Debido a que el server usa la pila para guardar datos * como el directorio web, o las peticiones web ante
³¬ÐÇActivexÒç³ö0day
  ÈÕÆÚ£º2007-10-18 09:42:24 µã»÷£º421 ÆÀÂÛ£º0
³¬ÐÇÔÄÀÀÆ÷£¨SSReader£©Êdz¬Ðǹ«Ë¾ÓµÓÐ×ÔÖ÷֪ʶ²úȨµÄͼÊéÔÄÀÀÆ÷£¬ÊÇרÃÅÕë¶ÔÊý×ÖͼÊéµÄÔÄÀÀ¡¢ÏÂÔØ¡¢´òÓ ¢°æȨ±£»¤ºÍÏÂÔؼƷѶøÑо¿¿ª·¢µÄ¡£¾­¹ý¶àÄê²»¶Ï¸Ä½ø£¬SSReaderÏÖÒÑ·¢Õ¹µ½3.73°æ±¾£¬ÏÂÔØÁ¿ÒѾ­Í»ÆÆ1500Íò´Î£¬ÊǹúÄÚÍâÓû§ÊýÁ¿×î¶àµÄרÓÃͼÊéÔÄÀÀÆ÷Ö®Ò»¡£ scrip
Half-Life Server 3.1.1.0 Remote Buffer Overflow Exploit
  ÈÕÆÚ£º2007-10-17 16:47:45 µã»÷£º69 ÆÀÂÛ£º0
/***************************************************************** * hoagie_hlserver.c * * Remote exploit for Halflife-Servers. * * Binds a shell to port 30464/tcp and connects to it. * * Author: KnbykL info@knbykl.org * * Thnx : All Soldier HbT * *
¹²637Ò³/12733Ìõ¼Ç¼ Ê×Ò³ ÉÏÒ»Ò³ [536] [537] [538] 539 [540] [541] [542] ÏÂÒ»Ò³ Ä©Ò³
  ±¾ÔÂÈȵãÎÄÕÂ
 
  ±¾ÔÂÍƼöÎÄÕÂ
 
  Ïà¹Ø·ÖÀà
  ©¶´¼ì²â
  ©¶´×ÊÁÏ
  ÈëÇÖʵÀý
  ϵͳ°²È«
  ÍøÂ簲ȫ
  ÍøÂç»ù´¡
  ²¡¶¾·ÖÎö
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved