PHP < 4.4.5 / 5.2.1 WDDX Session Deserialization Information Leak 
	 
 
 
 
  
				日期:2007-03-06 11:13:04 
点击:62 评论:0 
				 
 
 
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _  // // | __ |/ _` || '_|/ _` |/ -_)| '  / -_)/ _` ||___|| _/| __ || _/ // // |_||_ 
 
 
 
 
	
		
		PHP 4 unserialize() ZVAL Reference Counter Overflow 
	 
 
 
 
  
				日期:2007-03-06 10:57:13 
点击:77 评论:0 
				 
 
 
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _  // // | __ |/ _` || '_|/ _` |/ -_)| '  / -_)/ _` ||___|| _/| __ || _/ // // |_|| 
 
 
 
 
	
		
		Links Management Application 1.0 (lcnt) Remote SQL Injection Exploit 
	 
 
 
 
  
				日期:2007-03-06 10:56:25 
点击:63 评论:0 
				 
 
 
#!/usr/bin/perl #[Script Name: Links Management Application V1.0 (lcnt) Remote BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.monitor-line.com #[$$ : $34.99 #[.. : ajann,Turkey use IO::Socket; if( 
 
 
 
 
	
		
		Konqueror 3.5.5 (JavaScript Read of FTP Iframe) DoS Exploit 
	 
 
 
 
  
				日期:2007-03-06 10:55:35 
点击:87 评论:0 
				 
 
 
html body Demo of how to make Konqueror 3.5.5 crash by mark@bindshell.net.p Simply load this file in Konqueror. Vulnerable versions should segfault instantly with a null pointer exception.p p script read_iframe = function(iframe_name) { var banner = 
 
 
 
 
	
		
		AJ Forum 1.0 (topic_title.php) Remote SQL Injection Exploit 
	 
 
 
 
  
				日期:2007-03-06 10:54:40 
点击:61 评论:0 
				 
 
 
#!/usr/bin/perl #[Script Name: AJ Forum 1.0 (topic_title.php) Remote BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.ajsquare.com #[Dork : /subcat.php?cate_id= #[$$ : 250.00 USD #[.. : ajann,Turkey 
 
 
 
 
	
		
		AJDating 1.0 (view_profile.php) Remote SQL Injection Exploit 
	 
 
 
 
  
				日期:2007-03-06 10:53:26 
点击:50 评论:0 
				 
 
 
html head meta http-equiv=Content-Type content=text/html; charset=windows-1254 titleAJDating 1.0 (view_profile.php) Remote BLIND SQL Injection Exploit/title script language=JavaScript //'=============================================================== 
 
 
 
 
	
		
		AJ Auction Pro All Versions (subcat.php) Remote SQL Injection Exploit 
	 
 
 
 
  
				日期:2007-03-06 10:52:32 
点击:63 评论:0 
				 
 
 
#!/usr/bin/perl #[Script Name: AJ Auction All Version (subcat.php) Remote BLIND SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.ajsquare.com #[Dork : /subcat.php?cate_id= #[$$ : 250.00 USD #[.. : ajann,T 
 
 
 
 
	
		
		Asterisk <= 1.2.15 / 1.4.0 pre-auth Remote Denial of Service Exploit 
	 
 
 
 
  
				日期:2007-03-06 10:50:53 
点击:61 评论:0 
				 
 
 
/* this will cause asterisk to segfault, the bug that this exploits has been patched in release 1.2.16 1.4.1 CLI Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 1082719152 (LWP 2510)] register_verify (p=0x81cf600, sin=0x4088 
 
 
 
 
	
		
		WebMod 0.48 (Content-Length) Remote Buffer Overflow Exploit PoC 
	 
 
 
 
  
				日期:2007-03-02 09:48:24 
点击:113 评论:0 
				 
 
 
/* * WebMod Stack Buffer Overflow * * by cybermind (Kevin Masterson) * cybermind@gmail.com * * WebMod v0.48 exploit PoC code * */ #include stdio.h #include stdlib.h #include string.h #define WIN32_LEAN_AND_MEAN #include windows.h #include winsock.h # 
 
 
 
 
	
		
		PHP 4 Userland ZVAL Reference Counter Overflow Exploit PoC 
	 
 
 
 
  
				日期:2007-03-02 09:47:25 
点击:73 评论:0 
				 
 
 
?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ | || || _  // // | __ |/ _` || '_|/ _` |/ -_)| '  / -_)/ _` ||___|| _/| __ || _/ // // |_||_ 
 
 
 
 
	
		
		phpMyFAQ <= 1.6.7 Remote SQL Injection / Command Execution Exploit 
	 
 
 
 
  
				日期:2007-03-02 09:46:30 
点击:68 评论:0 
				 
 
 
#!/usr/bin/php5-cgi -q ? /* Sql injection / remote command execution exploit for phpmyfaq 1.6.8 Bugtraq: http://www.securityfocus.com/bid/21944 CVS: http://thinkforge.org/plugins/scmcvs/cvsweb.php/phpmyfaq/admin/attachment.php.diff?r1=1.7.2.11.2.5;r2 
 
 
 
 
	
		
		DivX Web Player 1.3.0 (npdivx32.dll) Remote Denial of Service Exploit 
	 
 
 
 
  
				日期:2007-03-02 09:45:29 
点击:80 评论:0 
				 
 
 
pre codespan style=font: 10pt Courier New;span class=general1-symbol----------------------------------------------------------------------------- DivX Web Player 1.3.0 (npdivx32.dll) Resize method Denial of Service url: http://www.divx.com/ author: s 
 
 
 
 
	
		
		Snort 2.6.1 DCE/RPC Preprocessor Remote Buffer Overflow Exploit 
	 
 
 
 
  
				日期:2007-03-02 09:44:04 
点击:77 评论:0 
				 
 
 
#!/usr/bin/python # # Snort DCE/RPC Preprocessor Buffer Overflow (Command Execution Version) # # Author: Trirat Puttaraksa trir00t [at] gmail.com # # http://sf-freedom.blogspot.com # ###################################################### # For educat 
 
 
 
 
	
		
		madwifi <= 0.9.2.1 WPA/RSN IE Remote Kernel Buffer Overflow Exploit 
	 
 
 
 
  
				日期:2007-03-02 09:42:03 
点击:171 评论:0 
				 
 
 
/* ---- madwifi WPA/RSN IE remote kernel buffer overflow ------ * expoit code by: sgrakkyu at antifork.org -- 10/1/2007 * * CVE: 2006-6332 (Laurent BUTTI, Jerome RAZNIEWSKI, Julien TINNES) * * (for wpa) * .... * memcpy(buf, se-se_wpa_ie, se-se_wpa_ie 
 
 
 
 
	
		
		3Com TFTP Service <= 2.0.1 (Long Transporting Mode) Exploit (perl) 
	 
 
 
 
  
				日期:2007-03-01 13:02:09 
点击:120 评论:0 
				 
 
 
#!/usr/bin/perl -w # =============================================================================================== # 3Com TFTP Service = 2.0.1 (Long Transporting Mode) Overflow Perl Exploit # By Umesh Wanve (umesh_345@yahoo.com) # ================= 
 
 
 
 
	
		
		vBulletin <= 3.6.4 (inlinemod.php postids) Remote SQL Injection Exploit 
	 
 
 
 
  
				日期:2007-03-01 12:56:31 
点击:117 评论:0 
				 
 
 
?php print_r(' ----------------------------------------------------------------------------- vBulletin = 3.6.4 inlinemod.php postids sql injection / privilege escalation by session hijacking exploit by rgod mail: retrog at alice dot it site: http://r 
 
 
 
 
	
		
		McAfee VirusScan for Mac (Virex) <= 7.7 Local Root Exploit 
	 
 
 
 
  
				日期:2007-03-01 09:55:46 
点击:61 评论:0 
				 
 
 
#!/usr/bin/perl # # http://www.digitalmunition.com # written by kf (kf_lists[at]digitalmunition[dot]com) # # Following symlinks is bad mmmmmmmmmmkay! # $dest = /var/cron/tabs/root; $tgts{0} = Virex 7.7.dmg:/Library/Application Support/Virex/VShieldE 
 
 
 
 
	
		
		XM Easy Personal FTP Server 5.30 (ABOR) Format String DoS Exploit 
	 
 
 
 
  
				日期:2007-03-01 09:54:07 
点击:59 评论:0 
				 
 
 
#!/usr/bin/perl -w #========================================================================================================= # XM Easy Personal FTP Server 5.3.0 Multiple vulnerabilities # By Umesh Wanve #============================================= 
 
 
 
 
	
		
		Debian Apache 1.3.33/1.3.34 (CGI TTY) Local Root Exploit 
	 
 
 
 
  
				日期:2007-03-01 09:51:47 
点击:83 评论:0 
				 
 
 
/* :: Kristian Hermansen :: Date: 20070228 Description: Local attacker can influence Apache to direct commands into an open tty owned by user who started apache process, usually root. This results in arbitrary command execution. Affects: Debian Stabl 
 
  
 
 
 
 共637页/12733条记录  首页 
 上一页 
 [558] 
[559] 
[560] 
561
[562] 
[563] 
[564] 
 下一页 
 末页 
 
1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 
29 
30 
31 
32 
33 
34 
35 
36 
37 
38 
39 
40 
41 
42 
43 
44 
45 
46 
47 
48 
49 
50 
51 
52 
53 
54 
55 
56 
57 
58 
59 
60 
61 
62 
63 
64 
65 
66 
67 
68 
69 
70 
71 
72 
73 
74 
75 
76 
77 
78 
79 
80 
81 
82 
83 
84 
85 
86 
87 
88 
89 
90 
91 
92 
93 
94 
95 
96 
97 
98 
99 
100 
101 
102 
103 
104 
105 
106 
107 
108 
109 
110 
111 
112 
113 
114 
115 
116 
117 
118 
119 
120 
121 
122 
123 
124 
125 
126 
127 
128 
129 
130 
131 
132 
133 
134 
135 
136 
137 
138 
139 
140 
141 
142 
143 
144 
145 
146 
147 
148 
149 
150 
151 
152 
153 
154 
155 
156 
157 
158 
159 
160 
161 
162 
163 
164 
165 
166 
167 
168 
169 
170 
171 
172 
173 
174 
175 
176 
177 
178 
179 
180 
181 
182 
183 
184 
185 
186 
187 
188 
189 
190 
191 
192 
193 
194 
195 
196 
197 
198 
199 
200 
201 
202 
203 
204 
205 
206 
207 
208 
209 
210 
211 
212 
213 
214 
215 
216 
217 
218 
219 
220 
221 
222 
223 
224 
225 
226 
227 
228 
229 
230 
231 
232 
233 
234 
235 
236 
237 
238 
239 
240 
241 
242 
243 
244 
245 
246 
247 
248 
249 
250 
251 
252 
253 
254 
255 
256 
257 
258 
259 
260 
261 
262 
263 
264 
265 
266 
267 
268 
269 
270 
271 
272 
273 
274 
275 
276 
277 
278 
279 
280 
281 
282 
283 
284 
285 
286 
287 
288 
289 
290 
291 
292 
293 
294 
295 
296 
297 
298 
299 
300 
301 
302 
303 
304 
305 
306 
307 
308 
309 
310 
311 
312 
313 
314 
315 
316 
317 
318 
319 
320 
321 
322 
323 
324 
325 
326 
327 
328 
329 
330 
331 
332 
333 
334 
335 
336 
337 
338 
339 
340 
341 
342 
343 
344 
345 
346 
347 
348 
349 
350 
351 
352 
353 
354 
355 
356 
357 
358 
359 
360 
361 
362 
363 
364 
365 
366 
367 
368 
369 
370 
371 
372 
373 
374 
375 
376 
377 
378 
379 
380 
381 
382 
383 
384 
385 
386 
387 
388 
389 
390 
391 
392 
393 
394 
395 
396 
397 
398 
399 
400 
401 
402 
403 
404 
405 
406 
407 
408 
409 
410 
411 
412 
413 
414 
415 
416 
417 
418 
419 
420 
421 
422 
423 
424 
425 
426 
427 
428 
429 
430 
431 
432 
433 
434 
435 
436 
437 
438 
439 
440 
441 
442 
443 
444 
445 
446 
447 
448 
449 
450 
451 
452 
453 
454 
455 
456 
457 
458 
459 
460 
461 
462 
463 
464 
465 
466 
467 
468 
469 
470 
471 
472 
473 
474 
475 
476 
477 
478 
479 
480 
481 
482 
483 
484 
485 
486 
487 
488 
489 
490 
491 
492 
493 
494 
495 
496 
497 
498 
499 
500 
501 
502 
503 
504 
505 
506 
507 
508 
509 
510 
511 
512 
513 
514 
515 
516 
517 
518 
519 
520 
521 
522 
523 
524 
525 
526 
527 
528 
529 
530 
531 
532 
533 
534 
535 
536 
537 
538 
539 
540 
541 
542 
543 
544 
545 
546 
547 
548 
549 
550 
551 
552 
553 
554 
555 
556 
557 
558 
559 
560 
561 
562 
563 
564 
565 
566 
567 
568 
569 
570 
571 
572 
573 
574 
575 
576 
577 
578 
579 
580 
581 
582 
583 
584 
585 
586 
587 
588 
589 
590 
591 
592 
593 
594 
595 
596 
597 
598 
599 
600 
601 
602 
603 
604 
605 
606 
607 
608 
609 
610 
611 
612 
613 
614 
615 
616 
617 
618 
619 
620 
621 
622 
623 
624 
625 
626 
627 
628 
629 
630 
631 
632 
633 
634 
635 
636 
637 
  
 
 
 
		
 
 
  
本月热点文章  
 
 
 
 
   
 
 
 
 
 
  
本月推荐文章  
 
 
 
 
    
 
 
	
 
 
  
相关分类