首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
CMS Creamotion (securite.php) Remote File Inclusion Exploit
  日期:2007-10-08 13:09:41 点击:61 评论:0
#!/usr/bin/php -q -d short_open_tag=on ? /* /* CMS Creamotion - Remote File include /* This exploit should allow you to execute commands /* By : HACKERS PAL /* WwW.SoQoR.NeT */ print_r(' /**********************************************/ /* CMS Creamot
ELSE IF CMS 0.6 Multiple Remote Vulnerabilities / Exploit
  日期:2007-10-08 13:08:21 点击:57 评论:0
ELSEIF CMS Tested on Else If version Beta 0.6 Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : security@soqor.net These Are Examples .. iam tiered fetching the injected files :) Remote File inclusio
MDPro 1.0.76 Remote SQL Injection Exploit
  日期:2007-09-30 09:56:20 点击:69 评论:0
#!/usr/bin/perl use strict; use IO::Socket; my $app = MDPro 1.0.76; my $type = SQL Injection; my $author = undefined1_; my $settings = magic_quotes_runtime = off, mysql = 4.1.0; $| = 1; print :: $app $type - by $author ::nnn; my $url = shift || us
Tor < 0.1.2.16 ControlPort Remote Rewrite Exploit
  日期:2007-09-30 09:54:29 点击:56 评论:0
!-- Tor 0.1.2.16 with ControlPort enabled ( not default ) Exploit for Tor ControlPort torrc Rewrite Vulnerability http://secunia.com/advisories/26301 Rewrites the torrc to log to a different location: C:Documents and SettingsAll UsersStart MenuPr
Zomplog <= 3.8.1 upload_files.php Arbitrary File Upload Exploit
  日期:2007-09-29 12:06:22 点击:60 评论:0
?php ## Zomplog = 3.8.1 Arbitrary File Upload Exploit ## by InATeam (http://inattack.ru/) ## tested on versions 3.8.1 with security patch, 3.8.1, 3.8, 3.7.5 echo ------------------------------------------------------------n; echo Zomplog = 3.8.1 Arb
Linux Kernel 2.4/2.6 x86-64 System Call Emulation Exploit
  日期:2007-09-27 19:26:24 点击:81 评论:0
/* * exploit for x86_64 linux kernel ia32syscall emulation * bug, discovered by Wojciech Purczynski cliph_at_isec.pl * * by * Robert Swiecki robert_at_swiecki.net * Przemyslaw Frasunek venglin_at_freebsd.lublin.pl * Pawel Pisarczyk pawel_at_immos.com
Motorola Timbuktu Pro 8.6.3 Arbitrary File Deletion/Creation
  日期:2007-09-26 13:38:35 点击:84 评论:0
#!/usr/bin/perl #ooOOooOOooOOooOOooOOooOOooOOooOOooOOooOOooOOooOOooOO # Timbuktu Pro 8.6.3 Arbitrary File Deletion/Creation # # Bug Exploit by titon [titon{at}bastardlabs{dot}com] # # Advisory: # http://labs.idefense.com/intelligence/vulnerabilities/
EB Design Pty Ltd (EBCRYPT.DLL v.2.0) Multiple Remote Vulnerabilites
  日期:2007-09-25 11:17:42 点击:54 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0----------------------------------------------------------------------------- bEB Design Pty Ltd (EBCRYPT.DLL v.2.0) Multiple Remote Vulnerabilites/b url: http://
AskJeeves Toolbar 4.0.2.53 activex Remote Buffer Overflow Exploit
  日期:2007-09-25 11:16:53 点击:74 评论:0
html SCRIPT language=javascript // This is new technique I invent call 'heap fill attack' var str0ke = 0x0d0d0d0d; var sucks = unescape( // Launch the system calculator 100 times because what else? // This code currently not work on Solaris/Sparc %u9
Xitami Web Server 2.5 (If-Modified-Since) Remote BoF Exploit (0day)
  日期:2007-09-25 11:15:56 点击:94 评论:0
#!/usr/bin/python # Xitami Web Server 2.5 (If-Modified-Since) 0day Remote Buffer Overflow Exploit # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Tested on: Xitami 2.5c2 / XP SP2 Polish # Shellcode: Windows Execute Command (calc) metas
EasyMail MessagePrinter Object (emprint.DLL 6.0.1.0) BOF Exploit
  日期:2007-09-24 12:43:46 点击:44 评论:0
!-- rgod_em_msgprn_heap.html EasyMail MessagePrinter Object (emprint.DLL 6.0.1.0) remote heap overflow exploit (ie6 / xp sp2) Mr Dormann, this should integrate this :D : http://www.kb.cert.org/vuls/id/281977 retrieved from postcast srvr, dunno other
Lighttpd <= 1.4.17 FastCGI Header Overflow Remote Exploit
  日期:2007-09-21 10:34:28 点击:119 评论:0
/*********************************************************** * hoagie_lighttpd.c * LIGHTTPD/FASTCGI REMOTE EXPLOIT (= 1.4.17) * * Bug discovered by: * Mattias Bengtsson mattias@secweb.se * Philip Olausson po@secweb.se * http://www.secweb.se/en/adviso
IMail iaspam.dll 8.0x Remote Heap Overflow Exploit
  日期:2007-09-21 10:32:50 点击:57 评论:0
Author: axis Date: 2007-09-20 Team: http://www.ph4nt0m.org 为了庆祝幻影成立6周年(6th Anniversary),老规矩,发点贺礼出来。 今年写的一个exp,送给过一些朋友,这次把source code直接公布出来。 这个漏洞也没啥,但是利用方式还不错,可以给大家借鉴下。 请仔细阅
Flip <= 3.0 Remote Password Hash Disclosure Exploit
  日期:2007-09-20 17:46:08 点击:53 评论:0
#!/usr/bin/perl use strict; use IO::Socket; my $app = Flip = 3.0; my $type = Passwords Hash Disclosure; my $author = undefined1_; my $vendor = http://sourceforge.net/projects/flipsource; banner(); my $server = shift || usage(); my $port = shift || us
Flip <= 3.0 Remoe Admin Creation Exploit
  日期:2007-09-20 17:44:11 点击:46 评论:0
#!/usr/bin/perl use strict; use IO::Socket; use Getopt::Std; my $app = Flip = 3.0; my $type = Admin Creation; my $author = undefined1_; my $vendor = http://sourceforge.net/projects/flipsource; my %opt; getopts(t:, %opt); $| = 1; print :: $app $type
OneCMS 2.4 (userreviews.php abc) Remote SQL Injection Exploit
  日期:2007-09-20 13:34:45 点击:63 评论:0
#!/usr/bin/perl # # OneCMS v2.4 Remote SQL Injection Exploit # # Description # ----------- # OneCMS contains a flaw that allows an attacker to carry out an SQL # injection attack. The issue is due to the userreviews.php script not # properly sanitizi
Sun jre1.6.0_X isInstalled.dnsResolve Function Overflow PoC
  日期:2007-09-20 13:33:25 点击:27 评论:0
html body center Sun (jre1.6.0_X) isInstalled.dnsResolve function overflow PoCbr Bug founded and code released by Yag Kohha. br Greetz to: br Shinnai, Str0ke br /center object classid=CLSID:5852F5ED-8BF4-11D4-A245-0080C6F74284 id=target/OBJECT SCRIPT
Microsoft Visual Basic Enterprise Edition 6.0 SP6 Code Execution Exploit
  日期:2007-09-20 13:32:43 点击:51 评论:0
#usage: vbexploit.py FileName.vbp import sys print -------------------------------------------------------------------------- print [PoC_2] Microsoft Visual Basic Enterprise Edition 6.0 SP6 Code Execution print author: shinnai print mail: shinnai[at]
>Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
  日期:2007-09-20 13:31:01 点击:382 评论:0
# Z:Expmercury_SEARCH.pl 127.0.0.1 143 void ph4nt0m.org # Mercury/32 v4.52 IMAPD SEARCH command Post-Auth Stack Overflow Exploit # Found Code by void# ph4nt0m.org # # S: * OK mercury.ph4nt0m.org IMAP4rev1 Mercury/32 v4.52 server ready. # C: pst06 L
Yahoo! Messenger 8.1.0.421 CYFT Object Arbitrary File Download
  日期:2007-09-20 13:30:15 点击:34 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbolbody bgcolor=#E0E0E0----------------------------------------------------------------------------- bYahoo! Messenger 8.1.0.421 CYFT Object (ft60.dll) Arbitrary File Download/b url: ht
共637页/12733条记录 首页 上一页 [538] [539] [540] 541 [542] [543] [544] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved