首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MS Windows DNS DnssrvQuery Remote Stack Overflow Exploit
  日期:2007-04-16 10:36:16 点击:74 评论:0
/* * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Windows DNS DnssrvQuery() Stack Overflow * [CVE-2007-1748] * * * Description: * A vulnerability has been reported in Microsoft Windows, which can * be exploited by malicious people to comp
MS Windows DNS RPC Remote Buffer Overflow Exploit (win2k SP4)
  日期:2007-04-16 10:35:19 点击:132 评论:0
#!/usr/bin/python # Remote exploit for the 0day Windows DNS RPC service vulnerability as # described in http://www.securityfocus.com/bid/23470/info. Tested on # Windows 2000 SP4. The exploit if successful binds a shell to TCP port 4444 # and then con
Papoo <= 3.02 (kontakt menuid) Remote SQL Injection Exploit
  日期:2007-04-16 10:34:23 点击:112 评论:0
? /* Autor: Kacper Contact: kacper1964@yahoo.pl Homepage: http://www.rahim.webd.pl/ Irc: irc.milw0rm.com:6667 #devilteam Pozdro dla wszystkich z kanalu IRC oraz forum DEVIL TEAM. //dork: Help * Contact * Imprint * Sitemap | powered by papoo | powered
XAMPP for Windows <= 1.6.0a mssql_connect() Remote BoF Exploit
  日期:2007-04-16 10:32:54 点击:204 评论:0
?php print_r(' --------------------------------------------------------------------------- XAMPP for Windows = 1.6.0a adodb.php/mssql_connect() remote buffer overflow proof-of-concept exploit seh overwrite method / 2000 sp3 version mail: retrog at al
NMDeluxe 1.0.1 (footer.php template) Local File Inclusion Exploit
  日期:2007-04-16 10:31:48 点击:66 评论:0
# Perl # # BeyazKurt B3yazKurt@Hotmail.Com # # NMDeluxe 1.0.1 (template) Local File Inclusion Exploit # # D0rk : powered by NMDeluxe dorka gerenk yok ama nese :p # # Dn trojen yedim a.q ! baka trl yapamaz zate lamerler # # Download : http://wsdeluxe.
Windows DNS RPC Remote Code Execution Vulnerability
  日期:2007-04-16 10:30:30 点击:158 评论:0
### $Id$##### This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/
Aircrack-ng 0.7 (specially crafted 802.11 packets) Remote BoF Exploit
  日期:2007-04-13 13:02:04 点击:291 评论:0
/** * airodump-exp.c - aircrack/airodump-ng (0.7) remote exploit * * Proof of concept exploit for a stack (and heap) based * overflow in airodump-ng. The vulnerability can be exploited * by transmitting some specially crafted 802.11 packets to * exec
MyBulletinBoard (MyBB) <= 1.2.2 (CLIENT-IP) SQL Injection Exploit
  日期:2007-04-13 12:50:08 点击:112 评论:0
#!/usr/bin/perl ########################################################### ######################### LOGO ########################## ########################################################### # Mybb = 1.2.2 Remote SQL Injecton Exploit v.2.0 # # # #
mxBB Module MX Shotcast 1.0 RC2 (getinfo1.php) RFI Exploit
  日期:2007-04-13 12:48:53 点击:211 评论:0
#!/usr/bin/perl # #mxBB Module MX Shotcast 1.0 RC2 (getinfo1.php) Remote File Include Exploit # #Coded by bd0rk || SOH-Crew # #Usage: exploit.pl [target] [cmd shell] [shell variable] # #Greetings: str0ke, TheJT, DarkFig # #Vulnerable Code: include_on
Sami HTTP Server 2.0.1 POST Request Denial of Service Exploit
  日期:2007-04-13 12:47:49 点击:75 评论:0
# usr/bin/python import socket print ------------------------------------------------------------------------- print Sami HTTP Server 2.0.1 POST request Denial of Service print url: http://www.karjasoft.com print author: shinnai print mail: shinnai[a
PunBB <= 1.2.14 Remote Code Execution Exploit
  日期:2007-04-12 16:09:31 点击:123 评论:0
#!/usr/bin/php ?php error_reporting(E_ALL ^ E_NOTICE); if($argc 7) { print( ----------- PunBB = 1.2.14 Remote Code Execution Exploit ----------- ----------------------------------------------------------------------- PHP conditions: See www.acid-root
MiniWebsvr 0.0.7 Remote Directory Transversal Exploit
  日期:2007-04-12 15:35:03 点击:142 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol------------------------------------------------------------- bMiniWebsvr 0.0.7 Directory transversal vulnerability/b url: http://miniwebsvr.sourceforge.net/ author: shinnai mail: sh
InoutMailingListManager <= 3.1 Remote Command Execution Exploit
  日期:2007-04-11 16:13:26 点击:60 评论:0
#!/usr/bin/php -q -d short_open_tag=on ? echo InoutMailingListManager = 3.1 Command Execution Exploit + Login Retrieve + Advisory by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista.org Thanks to rgod for the php code and Marty for the L
MS Windows Animated Cursor (.ANI) Local Overflow Exploit
  日期:2007-04-10 15:51:09 点击:70 评论:0
/* .ANI exploit tested on Windows XP SP2 - Portuguese Shellcode port bind 13579 JMP ESP Addr - ntdll.dll Greetz: Marsu, Devcode, Str0ke, Dave, Sekure.org guys, Sauna. Exploit coded listen sauna hits Featuring Luiz Zanardo's gigs Minoide -x52x49x46
IrfanView 3.99 .ANI File Local Buffer Overflow Exploit (multiple targets)
  日期:2007-04-10 11:27:01 点击:72 评论:0
/* IrfanView 3.99 .ANI File Buffer Overflow (Multiple Targets and port bind shell) Old Target: Windows XP Sp2 FR New targets: Windows XP SP2 Portuguese Call ESP Addr Windows XP SP2 English Call ESP Addr Greetz: Ricardo Fiorelli, Marsu (make this poss
Apache Mod_Rewrite Off-by-one Remote Overflow Exploit (win32)
  日期:2007-04-09 12:17:41 点击:341 评论:0
#!/bin/sh # Exploit for Apache mod_rewrite off-by-one(Win32). # # by axis axis@ph4nt0m # http://www.ph4nt0m.org # 2007-04-06 # # Tested on Apache 2.0.58 (Win32) # Windows2003 CN SP1 # # Vulnerable Apache Versions: # * 1.3 branch: 1.3.28 and 1.3.37 #
MS Windows GDI Local Privilege Escalation Exploit (MS07-017)
  日期:2007-04-09 12:14:38 点击:186 评论:0
#define _WIN32_WINNT 0x0500 #include windows.h #include shlwapi.h #include stdio.h #pragma comment (lib, user32.lib) #pragma comment (lib, gdi32.lib) #pragma comment (lib, shlwapi.lib) #pragma comment (lib, ntdll.lib) /* Here is a sploit for the GDI
phpwind5.x passport_client.php UPDATE SQL Injection POC
  日期:2007-04-09 12:13:42 点击:135 评论:0
? ///////////////////////////////////////////////////// ///phpwind5.x passport_client.php UPDATE sql inj POC ///By 5up3rh3i@gmail.com ///thx loulou /////////////////////////////////////////////// //[fix]:http://www.phpwind.net/read-htm-tid-392683.ht
phpwind 5.x exploits
  日期:2007-04-09 12:09:52 点击:505 评论:0
?php print_r( +------------------------------------------------------------------+ Exploit For Phpwind 5.X Version BY Loveshell Just For Fun :) +------------------------------------------------------------------+ ); ini_set(max_execution_time,0); er
MS Windows Explorer Unspecified .ANI File Denial of Service Exploit
  日期:2007-04-09 12:08:42 点击:68 评论:0
/**************************************************************************** * MS Windows Explorer Unspecified .ANI File DoS * * * * * * Another .Ani bug that freezes Explorer if you open a folder that contains * * a crafted file. * * * * Tested aga
共637页/12733条记录 首页 上一页 [552] [553] [554] 555 [556] [557] [558] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved