首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
paBugs <= 2.0 Beta 3 (main.php cid) Remote SQL Injection Exploit
  日期:2007-08-03 12:43:13 点击:82 评论:0
#!/usr/bin/perl use LWP::UserAgent; use HTTP::Cookies; if(@ARGV 4) { usage(); exit(); } $host = $ARGV[0]; # Host $path = $ARGV[1]; # Path to paBugs directory $pref = $ARGV[2]; # prefix for admin tables $usid = $ARGV[3]; # user id $www = new LWP::User
Live for Speed S1/S2/Demo (.mpr replay file) Buffer Overflow Exploit
  日期:2007-08-02 13:53:05 点击:81 评论:0
/** ***** ************************************************************************** 0day Live for speed patch x s2 /s1 and demo local .mpr buffer over flow Credit's to n00b for finding bug and writing the exploit Lfs is a racing simulator with a hug
MS Internet Explorer 6 DirectX Media Remote Overflow DoS Exploit
  日期:2007-08-01 13:31:21 点击:63 评论:0
!--============================================================================ dxtmsft.dll Remote Buffer Overflow Exploit Internet Explorer ver 6.0 DeltahackingSecurityTEAM Bug discovered by Dr.Pantagon Affected Software: dxtmsft.dll (DirectX Media
Yahoo! Widget < 4.0.5 GetComponentVersion() Remote Overflow Exploit
  日期:2007-08-01 13:27:56 点击:65 评论:0
html !-- +++++++++++++++++++++++ +Last Modified by lhoang8500++ +++++++++++++++++++++++ -- html object classid=CLSID:7EC7B6C5-25BD-4586-A641-D2ACBB6629DD id=target/OBJECT SCRIPT language=javascript var heapSprayToAddress = 0x05050505; var payLoadCode
Asterisk < 1.2.22, 1.4.8 IAX2 channel driver Remote Crash Exploit
  日期:2007-08-01 13:26:15 点击:104 评论:0
#!/usr/bin/env ruby # author = tenkei_ev # Script to test chan_iax for the vuln in ASA-2007-015 # Trigger subtypes of 11 or 12 will crash an unpatched server # # First establish a call - send new, recv accept, send ack, recv answer, send ack # Then s
Borland Interbase <= 2007 SP1 Create-Request Remote Overflow Exploit
  日期:2007-07-31 15:34:59 点击:125 评论:0
/* http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064882.html Groetjes aan mijn sletjes: Doopie, Sjaakhans, [PS] en Sleepwalker :P All your base are belong to FD2K2! */ #include stdio.h #include stdlib.h #include string.h #include winso
corehttp 0.5.3alpha (httpd) Remote Buffer Overflow Exploit
  日期:2007-07-30 18:46:00 点击:72 评论:0
/*[ corehttp[v0.5.3alpha]: httpd remote buffer overflow exploit. ]********** * * * by: vade79/v9 v9@fakehalo.us (fakehalo/realhalo) * * * * compile: * * gcc xcorehttp.c -o xcorehttp * * * * syntax: * * ./xcorehttp [-r] -h host -p port * * * * corehtt
LinPHA <= 1.3.1 (new_images.php) Remote Blind SQL Injection Exploit
  日期:2007-07-30 18:44:51 点击:56 评论:0
?php /* LinPHA = 1.3.1 (new_images.php) Remote Blind SQL Injection Hash Fishing Exploit / BENCHMARK() method author...: EgiX mail.....: n0b0d1es[at]hotmail[dot]com link.....: http://linpha.sourceforge.net/ dork.....: LinPHA Version 1.3.x or The LinPH
SimpleBlog 3.0 (comments_get.asp id) Remote SQL Injection Vulnerability
  日期:2007-07-30 18:44:17 点击:68 评论:0
#!/usr/bin/perl #++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++# # SimpleBlog 3.0 [ comments_get.asp ] # # ] Remote SQL Injection [ # # # # [c]ode by TrinTiTTY [at] g00ns.net # # Vulnerability by MurderSkillz # # # # shoutz: z3r0, k
Nessus Vulnerability Scanner 3.0.6 ActiveX Command Exec Exploit
  日期:2007-07-30 18:42:58 点击:64 评论:0
HTML !-- Nessus Vulnerability Scanner 3.0.6 ActiveX 0day Remote Code Execution Exploit Bug discovered by Krystian Kloskowski (h07) h07@interia.pl Tested on Nessus 3.0.6 / IE 6 / XP SP2 Polish Just for fun ;] -- object id=obj classid=clsid:A47D5315-32
PHP 5.x (win32service) Local Safe Mode Bypass Exploit
  日期:2007-07-30 18:41:39 点击:60 评论:0
?php ##################################################### ### PHP Safe_mode bypass exploit (win32service) ### ### ### ### Note: Tested on 5.2.1 ### ### ### ### Author: NetJackal ### ### Email: nima_501[at]yahoo[dot]com ### ### Website: http://netjac
IBM AIX <= 5.3 sp6 ftp gets() Local Root Exploit
  日期:2007-07-27 17:03:51 点击:102 评论:0
/* 07/2007: public release * * qaaz@aix:~$ ./aix-ftp * ---------------------------- * AIX ftp Local Root Exploit * By qaaz * ---------------------------- * bash: no job control in this shell * bash-3.00# */ #include stdio.h #include stdlib.h #include
IBM AIX <= 5.3 sp6 pioout Arbitrary Library Loading Local Root Exploit
  日期:2007-07-27 17:03:11 点击:77 评论:0
#!/bin/sh # # 07/2007: public release # echo ------------------------------- echo AIX pioout Local Root Exploit echo By qaaz echo ------------------------------- cat piolib.c _EOF_ #include stdlib.h #include unistd.h void init() __attribute__ ((const
IBM AIX <= 5.3 sp6 capture Terminal Sequence Local Root Exploit
  日期:2007-07-27 17:02:15 点击:99 评论:0
/* 07/2007: public release * * qaaz@aix:~$ ./aix-capture * -------------------------------- * AIX capture Local Root Exploit * By qaaz * -------------------------------- * bash: no job control in this shell * bash-3.00# */ #include stdio.h #include s
Nessus Vulnerability Scanner 3.0.6 ActiveX Remote Delete File Exploit
  日期:2007-07-27 12:23:59 点击:56 评论:0
HTML !-- Nessus Vulnerability Scanner 3.0.6 ActiveX deleteReport() 0day Remote Delete File Exploit Bug discovered by Krystian Kloskowski (h07) h07@interia.pl Tested on Nessus 3.0.6 / IE 6 / XP SP2 Polish Just for fun ;] -- object id=obj classid=clsid
CrystalPlayer 1.98 Playlist Crafted mls File Local Buffer Overflow Exploit
  日期:2007-07-27 12:23:03 点击:77 评论:0
#!/usr/bin/perl ###################################################################################################################### #Crystal Player 1.98 #Playlist(.mls) File Local Buffer Overflow Exploit #Source:: http://www.crystalplayer.com/Crys
IPSwitch IMail Server 2006 9.10 SUBSCRIBE Remote Overflow Exploit
  日期:2007-07-27 12:22:12 点击:78 评论:0
#!/use/bin/perl # Test on Imail 2006(9.10), imap4d32.exe(6.8.8.1), windows 2003 Chinese SP1 # Code by yunshu, our team: www.ph4nt0m.org Mail list: http://list.ph4nt0m.org #F:perl imail_SUBSCRIBE.pl 192.168.1.2 test_user test_pass #* OK IMAP4 Server
PHP php_gd2.dll imagepsloadfont Local Buffer Overflow PoC
  日期:2007-07-27 12:21:29 点击:83 评论:0
?php /* PHP imagepsloadfont Buffer Overflow Vulnerability Discovered Coded by: r0ut3r (writ3r [at] gmail.com) Vulnerable dll: php_gd2.dll - Tested on WinXP SP0, PHP/5.2.3, Apache 2.2.4 The argument given was A * 9999 Access violation when reading [41
Clever Internet ActiveX Suite 6.2 Arbitrary File Download/Overwrite
  日期:2007-07-26 10:54:05 点击:47 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol------------------------------------------------------------------------------------------------- bClever Internet ActiveX Suite 6.2 (CLINETSUITEX6.OCX) Arbitrary file download/overw
IPSwitch IMail Server 2006 SEARCH Remote Stack Overflow Exploit
  日期:2007-07-26 10:52:37 点击:58 评论:0
#!/use/bin/perl # # Ipswitch IMail Server 2006 IMAP SEARCH COMMAND Stack Overflow Exploit # Author: ZhenHan.Liu#ph4nt0m.org # Date: 2007-07-25 # Team: Ph4nt0m Security Team (http://www.ph4nt0m.org) # # Vuln Found by: Manuel Santamarina Suarez # http:
共637页/12733条记录 首页 上一页 [543] [544] [545] 546 [547] [548] [549] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved