首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
MailEnable Professional/Enterprise <= 2.35 Out of Bounds DoS Exploit
  日期:2007-02-15 09:44:06 点击:94 评论:0
# Mail Enable Professional/Enterprise <=v2.35 (win32) # by mu-b - Wed Nov 29 2006 # # - Tested on: Mail Enable Professional v2.32 (win32) - with HOTFIX # Mail Enable Professional v2.33 (win32) # Mail Enable Professional
[漏洞资料] Tencent QQ QQzone WebCtrl Activex空指针引用漏洞(0day)
  日期:2007-02-14 10:22:15 点击:118 评论:0
by axis(axis_at_ph4nt0m.org) http://www.ph4nt0m.org Date: 2007-02-13 摘要: QQ是由Tencent公司开发的一个IM软件,在中国有着非常广泛的用户。幻影旅团的axis发现了一个QQZone的activex漏洞。在使用WebCtrl 方法时,将引用一个空指针,造成ie崩溃。由于该activex没
MiniWebsvr <= 0.0.6 Remote Resource Consumption DoS Exploit
  日期:2007-02-14 10:20:07 点击:67 评论:0
MiniWebsvr 0.0.6 (0-Day) Resource Consumption url: http://miniwebsvr.sourceforge.net/ author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org Run this exploit and take a look to the CPU usage.
Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
  日期:2007-02-14 10:18:48 点击:66 评论:0
# $Id: raptor_sshtime,v 1.1 2007/02/13 16:38:57 raptor Exp $ # # raptor_sshtime - [Open]SSH remote timing attack exploit # Copyright (c) 2006 Marco Ivaldi # # OpenSSH-portable 3.6.1p1 and earlier with PAM support enabled
Lotus Domino <= R6 Webmail Remote Password Hash Dumper Exploit
  日期:2007-02-14 10:17:34 点击:210 评论:0
# $Id: raptor_dominohash,v 1.3 2007/02/13 17:27:28 raptor Exp $ # # raptor_dominohash - Lotus Domino R5/R6 HTTPPassword dump # Copyright (c) 2007 Marco Ivaldi # # Lotus Domino R5 and R6 WebMail, with "Generate HTML for
Advanced Poll <= 2.0.5-dev Remote Code Execution Exploit
  日期:2007-02-14 10:16:18 点击:54 评论:0
#!/usr/bin/perl -w # Advanced Poll 2.0.0 = 2.0.5-dev textfile RCE. # # date: 30/07/06 # # diwou diwou@phucksys.org # # PHCKSEC (c) 2001-2006. # # Hey, what a mad world! # use strict; use warnings; use LWP::UserAgent; use MD5; # # args: http://url/apo
phpCC <= 4.2 beta (nickpage.php npid) Remote SQL Injection Exploit
  日期:2007-02-14 10:14:39 点击:73 评论:0
[======================================================================== [// phpCC Beta <= 4.2 (nickpage.php npid) Remote SQL Injection Exploit [// Usage: exploit.pl [target] [// Example: exploit.pl victim.c
Xaran Cms <= 2.0 (xarancms_haupt.php) SQL Injection Exploit
  日期:2007-02-14 10:13:20 点击:59 评论:0
[======================================================================== [// Xaran Cms <= V2.0 (xarancms_haupt.php) Remote SQL Injection Exploit [// Usage: exploit.pl [target] [// Example: exploit.pl victim.
AT Contenator <= v1.0 (Root_To_Script) Remote File Include Exploit
  日期:2007-02-14 10:10:14 点击:52 评论:0
//'=============================================================================================== //'[Script Name: AT Contenator <= v1.0 (Root_To_Script) Remote File Include Exploit //'[Coded by : ajann //'[Author : ajann //'[Contact
Microsoft Visual Studio 64-bit time functions DoS
  日期:2007-02-13 09:48:29 点击:83 评论:0
/*Sets File Time in Future(c) 2006-2007 Vladimir Dubrovin, 3APA3Ahttp://securityvulns.com/http://securityvulns.ru/*/#include stdio.h#include windows.hint main(int argc, char * argv[]){HANDLE h;FILETIME ft;int n;char buf[10240];if(argc != 2) {printf(
uTorrent 1.6 Remote Heap Overflow Exploit PoC
  日期:2007-02-13 09:41:33 点击:82 评论:0
/* * This is a PoC remote exploit for uTorrent 1.6 * * Author: * defsec defacedsecurity@hotmail.com * http://www.defacedsecurity.com * * * Works on XP SP1 and w2k sp1-4 * */ #include stdio.h #include stdlib.h #define NASIZE 4880 unsigned char nice_an
SunOS 5.10/5.11 in.telnetd Remote Authentication Bypass Exploit
  日期:2007-02-12 09:58:31 点击:92 评论:0
#!/bin/sh # CLASSIFIED CONFIDENTIAL SOURCE MATERIAL # # *********************ATTENTION******************************** # THIS CODE _MUST NOT_ BE DISCLOSED TO ANY THIRD PARTIES # (C) COPYRIGHT Kingcope, 2007 # #########################################
SAP Web Application Server 6.40 Arbitrary File Disclosure Exploit
  日期:2007-02-09 10:43:31 点击:104 评论:0
#!/usr/bin/perl -w ## ## SAP 'enserver.exe' file downloader ## Tested on SAP Web Application Server Java 6.40 (eval DVD) ## Found coded by Nicob ## ## The downloaded file is limited to the first 32 kilobytes ## Usual port : TCP/3200+SYSNR ## Exemple
Axigen <= 2.0.0b1 Remote Denial of Service Exploit (2)
  日期:2007-02-09 10:42:18 点击:62 评论:0
/* doaxigen-v2.c * * axigen 1.2.6 - 2.0.0b1 DoS (x86-lnx) * by mu-b - Sun Oct 29 2006 * * - Tested on: AXIGEN 1.2.6 (lnx) * AXIGEN 2.0.0b1 (lnx) * * parsing error results in login without username password! * which in turn causes a NULL pointer deref
Axigen <= 2.0.0b1 Remote Denial of Service Exploit
  日期:2007-02-09 10:40:30 点击:62 评论:0
/* doaxigen.c * * axigen 1.2.6 - 2.0.0b1 DoS (x86-lnx) * by mu-b - Sat Oct 22 2006 * * - Tested on: AXIGEN 1.2.6 (lnx) * AXIGEN 2.0.0b1 (lnx) * * 0x08088054: parsing error results in DoS (little-endian, confirmed) * DoS + off-by-one heap smash (big-e
LushiWarPlaner 1.0 (register.php) Remote SQL Injection Exploit
  日期:2007-02-09 10:39:04 点击:70 评论:0
% Response.Buffer = True % % On Error Resume Next % % Server.ScriptTimeout = 100 % % '=============================================================================================== '[Script Name: LushiWarPlaner 1.0 (register.php) Remote SQL Injectio
LushiNews <= 1.01 (comments.php) Remote SQL Injection Exploit
  日期:2007-02-09 10:36:24 点击:73 评论:0
% Response.Buffer = True % % On Error Resume Next % % Server.ScriptTimeout = 100 % % '=============================================================================================== '[Script Name: LushiNews = 1.01 (comments.php) Remote SQL Injection
LightRO CMS 1.0 (index.php projectid) Remote SQL Injection Exploit
  日期:2007-02-09 10:31:46 点击:87 评论:0
% Response.Buffer = True % % On Error Resume Next % % Server.ScriptTimeout = 100 % % '=============================================================================================== '[Script Name: LightRO CMS 1.0 (index.php projectid) Remote SQL Inje
Site-Assistant <= v0990 (paths[version]) Remote File Include Exploit
  日期:2007-02-09 10:30:15 点击:94 评论:0
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titleSite-Assistant = v0990(paths[version])Remote File Include Exploit/title script language=JavaScript //'================================================================
Advanced Poll <= 2.0.5-dev Remote Admin Session Generator Exploit
  日期:2007-02-08 12:02:10 点击:97 评论:0
#!/usr/bin/perl -w # Advanced Poll 2.0.0 = 2.0.5-dev textfile admin session gen. # # # 0day! KEEP IT PRIVATE 0day! # # date: 30/07/06 # # diwou diwou@phucksys.org # # PHCKSEC (c) 2001-2006. # # see templates for code execution ;). use strict; use war
共637页/12733条记录 首页 上一页 [560] [561] [562] 563 [564] [565] [566] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved