首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
ScriptMagix FAQ Builder <= 2.0 (index.php) Remote SQL Injection Exploit
  日期:2007-03-19 10:35:37 点击:72 评论:0
#!/usr/bin/perl #[Script Name: ScriptMagix FAQ Builder = 2.0 (index.php) Remote Blind SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.scriptmagix.com #[$$ : 50$ #[.. : ajann,Turkey use IO::Socket; if(@AR
Guestbara <= 1.2 Change Admin Login and Password Exploit
  日期:2007-03-19 10:34:30 点击:550 评论:0
html titleGuestbara lt;= 1.2 Change admin login password exploit by Kacper/title table border=0 cellspacing=0 cellpadding=0 align='center' form method='post' action='http://127.0.0.1/guestbook_path/admin/configuration.php?action=saveconfigzapis=ok'tr
Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution
  日期:2007-03-19 10:31:17 点击:123 评论:0
#!/usr/bin/php ?php error_reporting(E_ALL ^ E_NOTICE); # Advisory soon if($argc 3) { print( TITLE | Net Portal Dynamic System (NPDS) = 5.10 Remote Code Execution 0day AUTHOR | DarkFig / http://www.acid-root.new.fr / gmdarkfig@gmail.com NOTE | Works
OpenBSD ICMPv6 Fragment Remote Execution Exploit PoC
  日期:2007-03-16 11:14:41 点击:89 评论:0
# The PoC executes the shellcode (int 3) and returns. It overwrites the # ext_free() function pointer on the mbuf and forces a m_freem() on the # overflowed packet. # # The Impacket library is used to craft and send packets # (http://oss.coresecurity
PHP <= 4.4.6 ibase_connect() Local Buffer Overflow Exploit
  日期:2007-03-16 11:13:30 点击:101 评论:0
?php // PHP = 4.4.6 ibase_connect() ibase_pconnect() local buffer overflow // poc exploit // windows 2000 sp3 en / seh overwrite // by rgod // site: http://retrogod.altervista.org if (!extension_loaded(interbase)){ die(only works with interbase exten
CcMail 1.0.1 (update.php functions_dir) Remote File Inclusion Exploit
  日期:2007-03-16 11:11:34 点击:103 评论:0
#!/usr/bin/perl ######################################################################################################## # CcMail 1.0 Remote File Inclusion Exploit ######################################################################################
PHP 5.2.0/5.2.1 Rejected Session ID Double Free Exploit
  日期:2007-03-15 15:21:27 点击:74 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
PHP <= 5.2.1 session_regenerate_id() Double Free Exploit
  日期:2007-03-15 15:20:23 点击:101 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
WarFTP 1.65 (USER) Remote Buffer Overflow Exploit (win2k SP4)
  日期:2007-03-15 11:00:56 点击:105 评论:0
#!/usr/bin/python # Remote exploit for WarFTP 1.65. Tested on Windows 2000 server SP4 inside # VMware. A trivially exploitable stack overflow is present in WarFTP which # can be triggered by sending a long username (480 bytes) along with the USER # f
ZomPlog <= 3.7.6 Local File Inclusion Vulnerabilty (win32)
  日期:2007-03-15 10:58:59 点击:67 评论:0
#Made by Bl0od3r #tech-bl0od3r.blogspot.com use IO::Socket; use Switch; { $port = 80; # $target = @ARGV[0]; # $folder = @ARGV[1]; # @paths=( ../../../../../var/log/httpd/access_log, ../../../../../var/log/httpd/error_log, ../apache/logs/error.log, ..
WSN Guest 1.21 (comments.php id) Remote SQL Injection Exploit
  日期:2007-03-15 10:57:39 点击:128 评论:0
!-- WSN Guest 1.21 Version Comments.PHP ID SQL Injection Exploit Type : SQL Injection Release Date : {2007-03-14} Product / Vendor : WSN Guestbook http://scripts.webmastersite.net/wsnguest/ Bug : http://localhost/script/comments.php?id=-SQL Inj.- SQL
Dayfox Blog 4 (postpost.php) Remote Code Execution Vulnerability
  日期:2007-03-15 10:54:57 点击:74 评论:0
html !-- .--. / Dj7xpl | | |, .-. .-. ,| | )(_o/ o_)( | |/ / | (@_ (_ ^^ _) _ ) _________|IIIIII|__/_______________________________ (_)@8@8{}________|-IIIIII/-|________________________________ )_/ / (@ +_____________________________________
JGBBS 3.0beta1 (search.asp author) SQL Injection Exploit
  日期:2007-03-14 14:18:51 点击:156 评论:0
!-- JGBBS 3.0beta1 Version Search.ASP Author SQL Injection Exploit Type : SQL Injection Release Date : {2007-03-13} Product / Vendor : JGBBS Is a Tree-style Online Forum System http://sourceforge.net/projects/jgbbs/ Bug : http://localhost/script/sear
PHP 5.2.0 ext/filter Space Trimming Buffer Underflow Exploit (MacOSX)
  日期:2007-03-13 12:57:42 点击:62 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
TFTP Server 1.3 Remote Buffer Overflow Denial of Service Exploit
  日期:2007-03-13 12:45:58 点击:57 评论:0
################################################################################################################# # Name : TFTPServerMT v 1.3 Remote Buffer Overflow Dos Exploit # # Author: Umesh Wanve # # Date: 01-03-2007 # # Desc: This is latest ver
News Bin Pro 4.32 Article Grabbing Remote Unicode BoF Exploit
  日期:2007-03-13 12:43:10 点击:71 评论:0
/******************************************************************************** * News Bin Pro 4.32 Article Grabbing Remote Unicode Buffer Overflow * * * * * * There is remote buffer overflow in News Bin Pro 4.32 that can be triggered by * * grabbi
NewsReactor 20070220 Article Grabbing Remote BoF Exploit (2)
  日期:2007-03-13 12:40:49 点击:72 评论:0
/********************************************************************************* * NewsReactor 20070220 Article Grabbing Remote Buffer Overflow * * Exploit 2 * * * * * * Check the other advisory for technical details. * * * * This exploit connects
NewsReactor 20070220 Article Grabbing Remote BoF Exploit (1)
  日期:2007-03-13 12:38:48 点击:73 评论:0
/******************************************************************************** * NewsReactor 20070220 Article Grabbing Remote Buffer Overflow * * Exploit 1 * * * * * * There is remote buffer overflow in NewsReactor 20070220 that can be triggered *
MS Windows DCE-RPC svcctl ChangeServiceConfig2A() Memory Corruption
  日期:2007-03-12 13:37:16 点击:85 评论:0
#!/usr/bin/python # MS Windows DCE-RPC svcctl ChangeServiceConfig2A() 0day Memory Corruption PoC Exploit # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Tested on Windows 2000 SP4 Polish (all patches) # # Requires.. # - Impacket : http
PHP <= 5.2.0 ext/filter FDF Post Filter Bypass Exploit
  日期:2007-03-12 13:36:44 点击:65 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
共637页/12733条记录 首页 上一页 [556] [557] [558] 559 [560] [561] [562] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved