首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
PHP 5.2.3 tidy_parse_string() local buffer overflow exploit (win)
  日期:2007-07-26 10:51:51 点击:155 评论:0
?php //PHP 5.2.3 tidy_parse_string() local buffer overflow exploit (win) //by GaRY wofeiwo_at_gmail_dot_com //Based on http://www.milw0rm.com/exploits/4080 by rgod //Just change the shellcode ////Tested on xp Pro sp2 cn if (!extension_loaded(tidy))
PHP <= 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit
  日期:2007-07-26 10:51:13 点击:74 评论:0
?php //PHP = 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit //by GaRY wofeiwo_at_gmail_dot_com //Based on http://www.milw0rm.com/exploits/4204 by shinnai //Just change the shellcode //Tested on xp Pro sp2 cn if (!extension_loa
Windows RSH daemon 1.7 Remote Buffer Overflow Exploit
  日期:2007-07-25 14:37:31 点击:66 评论:0
/* Attached and in-line is an exploit for a newly announced item on the WabiSabiLabi auction block. I hope this completely devalues the item so that the original finder dies of starvation. DON'T SELL BUGS THROUGH WABISABILABLA USE EXPLOITS TO HACK CO
Entertainment CMS (Local Inclusion) Remote Command Execution Exploit
  日期:2007-07-25 14:36:29 点击:58 评论:0
#!/usr/bin/perl # # Entertainment CMS Remote Command Execution Exploit # Download: http://rapidshare.com/files/39640099/enter-cms.rar # # Exploit: http://site.com/[path]/custom.php?pagename=[Local File Inclusion]; # Example: http://multimedia.mydlsto
PHP 5.2.3 win32std ext. safe_mode/disable_functions Protections Bypass
  日期:2007-07-25 14:35:25 点击:91 评论:0
?php //PHP 5.2.3 win32std extension safe_mode and disable_functions protections bypass //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp Pro sp2 full patched, worked both from the cli and on a
Xserver Alpha Post Request Remote Buffer Overflow Exploit
  日期:2007-07-24 13:33:59 点击:45 评论:0
#!/usr/bin/perl # # _ _ _ # __| | ___ _ _ ___ ___ ___ _ __ ___| |_ _ __ _ _ ___| |_ # / _` |/ _ | | / __|/ __/ _ | '_ / __| __| '__| | | |/ __| __| # | (_| | __/ |_| __ (_| (_) | | | __ |_| | | |_| | (__| |_ # __,_|___|__,_|___/______/
MS Windows Explorer.exe Gif Image Denial of Service Exploit
  日期:2007-07-24 13:33:05 点击:47 评论:0
#!/usr/bin/perl ############################################################### # Bug Found By ::DeltahackingTEAM ## # Coded By Reza.Yavari (Dr.Pantagon) ## #Web Site::Www.Deltahacking.net And Www.DeltaSecurity.ir And Www.PersianWhois.com ## #Free Up
Zenturi NixonMyPrograms Class (sasatl.dll v. 1.5.0.531) Remote BoF
  日期:2007-07-24 13:32:09 点击:48 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------- bZenturi NixonMyPrograms Class (sasatl.dll v. 1.5.0.531) Scan() Method Remote Buffer Overflow Exploit (H
JBlog 1.0 Create / Delete Admin Authentication Bypass Exploit
  日期:2007-07-23 17:52:37 点击:46 评论:0
!--###############################################################################Script...............: JBlog version: 1.0 ##Script Site..........: http://www.jmuller.net/jblog ##Vulnerability........: Creat Admin exploit, xss, Cookie Manipulation
Data Dynamics ActiveReport ActiveX (actrpt2.dll <= 2.5) Inscure Method
  日期:2007-07-23 17:51:22 点击:315 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------------------------- bData Dynamics ActiveReport ActiveX Control (actrpt2.dll = 2.5) SaveLayout() Inscure M
Lotus Domino IMAP4 Server 6.5.4 Remote Buffer Overflow Exploit
  日期:2007-07-23 17:50:15 点击:169 评论:0
########################################################################################### # Lotus Domino IMAP4 Server Release 6.5.4 / Windows 2000 Advanced Server x86 Remote Exploit ##################################################################
PHP <= 5.2.3 snmpget() object id Local Buffer Overflow Exploit
  日期:2007-07-23 17:49:23 点击:77 评论:0
?php //PHP = 5.2.3 snmpget() object id local Buffer Overflow eip overwrite exploit //bug discovered by rgod //Original advisory: http://retrogod.altervista.org/php_446_snmpget_local_bof.html //[quote=rgod]more than 256 chars result in simple eip over
Oracle 9i/10g evil views Change Passwords Exploit (CVE-2007-3855)
  日期:2007-07-20 14:55:59 点击:84 评论:0
-- -- bunkerview.sql -- -- Oracle 9i/10g - evil view exploit (CVE-2007-3855) -- Uses evil view to perform unauthorized password update -- -- by Andrea bunker Purificato - http://rawlab.mindcreations.com -- 37F1 A7A1 BB94 89DB A920 3105 9F74 7349 AF4C
Versalsoft HTTP File Uploader AddFile() Remote Buffer Overflow Exploit
  日期:2007-07-20 14:55:06 点击:76 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------------- bVersalsoft HTTP File Uploader (UFileUploaderD.dll v. 6.0.0.38) AddFile() method Remote Buffer Ove
Asterisk < 1.2.22 / 1.4.8 / 2.2.1 chan_skinny Remote Denial of Service
  日期:2007-07-19 11:29:23 点击:100 评论:0
/* * AstKilla2.c * gcc -o astkilla2 astkilla2.c * ./astkilla2 -h 216.246.**.*** * In no event will the author of this source be liable for any loss or damage of a material or * immaterial nature arising from access to, use or non-use of published inf
Vivvo CMS <= 3.4 (index.php) Remote BLIND SQL Injection Exploit
  日期:2007-07-19 11:28:37 点击:60 评论:0
html head titleVivvo CMS = 3.4 (index.php) Remote BLIND SQL Injection Exploit/title script type=text/javascript //'=============================================================================================== //'[Script Name: Vivvo CMS = 3.4 (index
Data Dynamics ActiveBar ActiveX (actbar3.ocx <= 3.1) Insecure Methods
  日期:2007-07-18 12:00:14 点击:178 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol--------------------------------------------------------------------------------------- bData Dynamics ActiveBar ActiveX Control (actbar3.ocx = 3.1) Multiple Inscure Methods/b url: h
PHP 5.2.3 glob() Denial of Service Exploit
  日期:2007-07-16 12:54:50 点击:59 评论:0
?php //PHP 5.2.3 glob() Remote DoS Exploit //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp sp2, worked both from the cli (EIP overwrite) and on apache (Denial of Service) //Bug discovered wi
MkPortal <= 1.1.1 reviews / gallery modules SQL Injection Exploit
  日期:2007-07-13 10:37:50 点击:78 评论:0
?php /* [i] MkPortal reviews and gallery modules SQL Injection Exploit [i] Vulnerable versions: MkPortal = 1.1.1 [i] Bug discovered by: Coloss [i] Exploit by: Coloss [i] Date: 06.07.2007 [i] This is priv8 not for kids [Notes] At this time MkPortal 1.
PHP 5.2.3 bz2 com_print_typeinfo() Denial of Service Exploit
  日期:2007-07-13 10:37:21 点击:65 评论:0
?php //PHP 5.2.3 bz2 com_print_typeinfo() Remote DoS Exploit //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //Tested on xp sp2, worked both from the cli and on apache //Bug discovered with Footzo (thanks
共637页/12733条记录 首页 上一页 [544] [545] [546] 547 [548] [549] [550] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved