首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
PHP < 4.4.5 / 5.2.1 WDDX Session Deserialization Information Leak
  日期:2007-03-06 11:13:04 点击:61 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
PHP < 4.4.5 / 5.2.1 php_binary Session Deserialization Information Leak
  日期:2007-03-06 11:03:49 点击:48 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
PHP 4 unserialize() ZVAL Reference Counter Overflow
  日期:2007-03-06 10:57:13 点击:75 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||
Links Management Application 1.0 (lcnt) Remote SQL Injection Exploit
  日期:2007-03-06 10:56:25 点击:62 评论:0
#!/usr/bin/perl #[Script Name: Links Management Application V1.0 (lcnt) Remote BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.monitor-line.com #[$$ : $34.99 #[.. : ajann,Turkey use IO::Socket; if(
Konqueror 3.5.5 (JavaScript Read of FTP Iframe) DoS Exploit
  日期:2007-03-06 10:55:35 点击:83 评论:0
html body Demo of how to make Konqueror 3.5.5 crash by mark@bindshell.net.p Simply load this file in Konqueror. Vulnerable versions should segfault instantly with a null pointer exception.p p script read_iframe = function(iframe_name) { var banner =
AJ Forum 1.0 (topic_title.php) Remote SQL Injection Exploit
  日期:2007-03-06 10:54:40 点击:60 评论:0
#!/usr/bin/perl #[Script Name: AJ Forum 1.0 (topic_title.php) Remote BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.ajsquare.com #[Dork : /subcat.php?cate_id= #[$$ : 250.00 USD #[.. : ajann,Turkey
AJDating 1.0 (view_profile.php) Remote SQL Injection Exploit
  日期:2007-03-06 10:53:26 点击:48 评论:0
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titleAJDating 1.0 (view_profile.php) Remote BLIND SQL Injection Exploit/title script language=JavaScript //'===============================================================
AJ Auction Pro All Versions (subcat.php) Remote SQL Injection Exploit
  日期:2007-03-06 10:52:32 点击:58 评论:0
#!/usr/bin/perl #[Script Name: AJ Auction All Version (subcat.php) Remote BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.ajsquare.com #[Dork : /subcat.php?cate_id= #[$$ : 250.00 USD #[.. : ajann,T
Asterisk <= 1.2.15 / 1.4.0 pre-auth Remote Denial of Service Exploit
  日期:2007-03-06 10:50:53 点击:59 评论:0
/* this will cause asterisk to segfault, the bug that this exploits has been patched in release 1.2.16 1.4.1 CLI Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 1082719152 (LWP 2510)] register_verify (p=0x81cf600, sin=0x4088
WebMod 0.48 (Content-Length) Remote Buffer Overflow Exploit PoC
  日期:2007-03-02 09:48:24 点击:97 评论:0
/* * WebMod Stack Buffer Overflow * * by cybermind (Kevin Masterson) * cybermind@gmail.com * * WebMod v0.48 exploit PoC code * */ #include stdio.h #include stdlib.h #include string.h #define WIN32_LEAN_AND_MEAN #include windows.h #include winsock.h #
PHP 4 Userland ZVAL Reference Counter Overflow Exploit PoC
  日期:2007-03-02 09:47:25 点击:68 评论:0
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _ // // | __ |/ _` || '_|/ _` |/ -_)| ' / -_)/ _` ||___|| _/| __ || _/ // // |_||_
phpMyFAQ <= 1.6.7 Remote SQL Injection / Command Execution Exploit
  日期:2007-03-02 09:46:30 点击:66 评论:0
#!/usr/bin/php5-cgi -q ? /* Sql injection / remote command execution exploit for phpmyfaq 1.6.8 Bugtraq: http://www.securityfocus.com/bid/21944 CVS: http://thinkforge.org/plugins/scmcvs/cvsweb.php/phpmyfaq/admin/attachment.php.diff?r1=1.7.2.11.2.5;r2
DivX Web Player 1.3.0 (npdivx32.dll) Remote Denial of Service Exploit
  日期:2007-03-02 09:45:29 点击:72 评论:0
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------- DivX Web Player 1.3.0 (npdivx32.dll) Resize method Denial of Service url: http://www.divx.com/ author: s
Snort 2.6.1 DCE/RPC Preprocessor Remote Buffer Overflow Exploit
  日期:2007-03-02 09:44:04 点击:76 评论:0
#!/usr/bin/python # # Snort DCE/RPC Preprocessor Buffer Overflow (Command Execution Version) # # Author: Trirat Puttaraksa trir00t [at] gmail.com # # http://sf-freedom.blogspot.com # ###################################################### # For educat
madwifi <= 0.9.2.1 WPA/RSN IE Remote Kernel Buffer Overflow Exploit
  日期:2007-03-02 09:42:03 点击:170 评论:0
/* ---- madwifi WPA/RSN IE remote kernel buffer overflow ------ * expoit code by: sgrakkyu at antifork.org -- 10/1/2007 * * CVE: 2006-6332 (Laurent BUTTI, Jerome RAZNIEWSKI, Julien TINNES) * * (for wpa) * .... * memcpy(buf, se-se_wpa_ie, se-se_wpa_ie
3Com TFTP Service <= 2.0.1 (Long Transporting Mode) Exploit (perl)
  日期:2007-03-01 13:02:09 点击:117 评论:0
#!/usr/bin/perl -w # =============================================================================================== # 3Com TFTP Service = 2.0.1 (Long Transporting Mode) Overflow Perl Exploit # By Umesh Wanve (umesh_345@yahoo.com) # =================
vBulletin <= 3.6.4 (inlinemod.php postids) Remote SQL Injection Exploit
  日期:2007-03-01 12:56:31 点击:115 评论:0
?php print_r(' ----------------------------------------------------------------------------- vBulletin = 3.6.4 inlinemod.php postids sql injection / privilege escalation by session hijacking exploit by rgod mail: retrog at alice dot it site: http://r
McAfee VirusScan for Mac (Virex) <= 7.7 Local Root Exploit
  日期:2007-03-01 09:55:46 点击:59 评论:0
#!/usr/bin/perl # # http://www.digitalmunition.com # written by kf (kf_lists[at]digitalmunition[dot]com) # # Following symlinks is bad mmmmmmmmmmkay! # $dest = /var/cron/tabs/root; $tgts{0} = Virex 7.7.dmg:/Library/Application Support/Virex/VShieldE
XM Easy Personal FTP Server 5.30 (ABOR) Format String DoS Exploit
  日期:2007-03-01 09:54:07 点击:57 评论:0
#!/usr/bin/perl -w #========================================================================================================= # XM Easy Personal FTP Server 5.3.0 Multiple vulnerabilities # By Umesh Wanve #=============================================
Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit
  日期:2007-03-01 09:51:47 点击:83 评论:0
/* :: Kristian Hermansen :: Date: 20070228 Description: Local attacker can influence Apache to direct commands into an open tty owned by user who started apache process, usually root. This results in arbitrary command execution. Affects: Debian Stabl
共637页/12733条记录 首页 上一页 [558] [559] [560] 561 [562] [563] [564] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved