首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Xoops Module MyAds Bug Fix <= 2.04jp (index.php) SQL Injection Exploi
  日期:2007-03-30 10:19:37 点击:54 评论:0
#!/usr/bin/perl #[Script Name: Xoops Module MyAds Bug Fix = v2.04jp (index.php cid) BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Dork : inurl:/modules/myads/ #[Contact : :( #[S.Page : http://www.xoops.org/ #[$$ : Free #[.. : ajan
IBM Lotus Domino Server 6.5 (username) Remote Denial of Service Exploit
  日期:2007-03-30 10:18:27 点击:64 评论:0
#!/usr/bin/python # # Remote DOS exploit code for IBM Lotus Domino Server 6.5. Tested on windows # 2000 server SP4. The code crashes the IMAP server. Since this is a simple DOS # where 256+ (but no more than 270) bytes for the username crashes the se
sBLOG 0.7.3 Beta (inc/lang.php) Local File Inclusion Exploit
  日期:2007-03-30 10:16:55 点击:54 评论:0
#!/usr/bin/perl # sBLOG 0.7.3 Beta(inc/lang.php)Local File Inclusion Exploit # D.Script: http://sourceforge.net/projects/sblog/ # V.Code: # if(isset($conf_lang_default) file_exists('lang/' . $conf_lang_default . '.php')) # require('lang/' . $conf_lan
PHP-Nuke Module Addressbook 1.2 Local File Inclusion Exploit
  日期:2007-03-27 11:09:57 点击:53 评论:0
#!Perl # #PHP-Nuke Module Addressbook 1.2 Local File Inclusion Exploit # #Vendor: http://www.sb-websoft.com/index.php?name=CmodsDownloadfile=indexreq=getitlid=14 # #Vulnerable Code: require_once(modules/$module_name/include/func.inc.php); # #Coded by
IceBB 1.0-rc5 Remote Code Execution Exploit
  日期:2007-03-27 11:09:13 点击:62 评论:0
#!/usr/bin/perl # IceBB 1.0-rc5 Remote Code Execution Exploit # 1. register a user # 2. run this exploit with this usage : $perl xpl.pl [hostpath] [uname] [pass] # 3. login with admin access :) # # #### Coded Discovered By Hessam-x / Hessamx-at-Hessa
IceBB 1.0-rc5 Remote Create Admin Exploit
  日期:2007-03-27 11:08:09 点击:54 评论:0
#!/usr/bin/perl # IceBB 1.0-rc5 Remote Create Admin Exploit # 1. register a user # 2. run this exploit with this usage : $perl xpl.pl [hostpath] [uname] [pass] # 3. login with admin access :) # - magic_quotes_gpc = Off # #### Coded Discovered By Hess
Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit (Win2K SP4)
  日期:2007-03-27 11:05:47 点击:81 评论:0
#!/usr/bin/python # Remote exploit for Easy File Sharing FTP server V2.0. The vulnerability # was discovered by h07 and a POC for windows XP SP2 (polish version) was # provided. This exploit was tested on windows 2000 server SP4. The exploit # binds
FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit
  日期:2007-03-27 11:04:11 点击:65 评论:0
// ejecsploit.c - local root exploit for bsd's eject.c // harry // vuln found by kokanin (you 31337!!! ;)) // thanks to sacrine and all the other netric guys!!! you rule :) #include stdio.h #include stdlib.h #include string.h #include unistd.h #defin
MS Internet Explorer Recordset Double Free Memory Exploit (MS07-009)
  日期:2007-03-27 10:56:27 点击:80 评论:0
HTML !-- ********************************************************************************** Microsoft Internet Explorer ADODB.Recordset Double Free Memory Exploit (ms07-009). **************************************************************************
PHP 5.2.1 with PECL phpDOC Local Buffer Overflow Exploit
  日期:2007-03-26 10:25:43 点击:63 评论:0
?php //PHP 5.2.1 with PECL phpDOC confirm_phpdoc_compiled() local buffer overflow poc exploit //WIN 2K SP3 version / seh overwrite method //to be launched from the cli // by rgod // site: http://retrogod.altervista.org if (!extension_loaded(phpDOC)){
Frontbase <= 4.2.7 Remote Buffer Overflow Exploit (windows)
  日期:2007-03-26 10:18:37 点击:72 评论:0
/* Dreatica-FXP crew * * ---------------------------------------- * Target : Frontbase = 4.2.7 for Windows * Site : http://www.frontbase.com * Found by : Netragard, L.L.C Advisory * ---------------------------------------- * Exploit date : 25.03.2007
PBlang 4.66z Remote Code Execution Exploit
  日期:2007-03-26 10:17:10 点击:67 评论:0
#!/usr/bin/perl # PBlang 4.66z Remote Command Execution Exploit # this Exploit *register* a user with admin access # - magic_quotes_gpc = Off # - Only work on 4.66z #### Coded Discovered By Hessam-x / Hessamx-at-Hessamx.net use IO::Socket; use LWP::U
PHP < 4.4.5 / 5.2.1 _SESSION Deserialization Overwrite Exploit
  日期:2007-03-26 10:14:06 点击:65 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
PHP < 4.4.5 / 5.2.1 _SESSION unset() Local Exploit
  日期:2007-03-26 10:13:00 点击:68 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
WarFTP 1.65 (USER) Remote Buffer Overlow Exploit (multiple targets)
  日期:2007-03-26 10:07:11 点击:98 评论:0
#include stdio.h #include string.h #include winsock.h #define VULNSERVER WAR-FTPD 1.65 #define VULNCMD x55x53x45x52x20 #define ZERO 'x00' #define NOP 'x90' #define VULNBUFF 485 #define BUFFREAD 128 #define PORT 21 #define LENJMPESP 4 /* ######
PBlang <= 4.66z Remote Create Admin Exploit
  日期:2007-03-26 10:05:58 点击:51 评论:0
#!/usr/bin/perl # PBlang 4.66z Create Admin Exploit # this exploit *register* a user with admin access ### Coded Discovered By Hessam-x / Hessamx-at-Hessamx.net use IO::Socket; use LWP::UserAgent; use HTTP::Cookies; $host = $ARGV[0]; $uname = $ARGV[1
Mambo Module Flatmenu <= 1.07 Remote File Include Exploit
  日期:2007-03-26 10:04:47 点击:64 评论:0
#!/usr/bin/perl #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- - - [The Best Arab Security And Hacking Team] - - #+ #+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #+ #- Mambo 4.5.1 Modules Flatmenu = 1.07 Remote File Include Exploit #+
Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
  日期:2007-03-23 10:10:00 点击:59 评论:0
/* Exploiting Microsoft DNS Dynamic Updates for Fun and profit Andres Tarasco Acua - (c) 2007 Url: http://www.514.es By default, most Microsoft DNS servers integrated with active directory allow insecure dynamic updates for dns records. This feature
0irc-client v1345 build20060823 Denial of Service Exploit
  日期:2007-03-23 10:09:05 点击:76 评论:0
/* 0irc-client v1345 build 20060823 DoS Exploit By DiGitalX (DiGi7alX@Gmail.com) Date: 22/3/2007 -- MicroSystem Team -- Site: http://DiGitalX.I.am Description: 0irc-client suffers from a NULL pointer derefrencing bug. */ #define WIN32_LEAN_AND_MEAN #
PortailPhp 2.0 (idnews) Remote SQL Injection Exploit
  日期:2007-03-23 10:07:39 点击:71 评论:0
use LWP::Simple; print Exploit Coded (c) by xoron Portail PHP v20 (index.php) Remote SQL Injection Exploit Languages: Turkish, English Plz Select Language:; $dil = stdin; %eng = ( site = Enter The Victim Without http://:, path = Plz Select Path:, id
共637页/12733条记录 首页 上一页 [554] [555] [556] 557 [558] [559] [560] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved