网络安全 > Exploit >
PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit
#!/usr/bin/perl #inphex #PHPizabi v0.848b C1 HFP1 Remote Code Execution #http://www.dz-secure.com/tools/1/WebESploit.pl.txt #if you are seeking for a partner to work on some project(s) just send an email inphex0 [ at ] gmail [ dot ] com #sAlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability
|___________________________________________________| | |AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability | |___________________________________________________ |---------------------Hussin X----------------------|Joomla Component DT Register Remote SQL injection Vulnerability
/--------------------------------------------------------------- / / Joomla Component DT Register Remote SQL injection / ---------------------------------Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
/* Exploiting Microsoft DNS Dynamic Updates for Fun and profit Andres Tarasco Acu?a - (c) 2007 Url: http://www.514.es By default, most Microsoft DNS servers integrated with active directory allow insecure dynamic updates ftplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities
############################################################### #################### Viva IslaM Viva IslaM #################### ## ## Remote SQL injection Vulnerability ## ## tplSoccerSite 1.0 ( player.php id ) ##Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
#!/usr/bin/perl # # http://www.securityfocus.com/bid/11775 # credit to Muts for this vulnerability # acaro [at] jervus.it use IO::Socket::INET; use Switch; if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$pMaian Cart 1.1 Insecure Cookie Handling Vulnerability
Author: Saime Date: July 12, 2008 Script: Maian Cart v1.1 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Powered by Maian Cart v1.1 Description: Maian Car v1.1 is suffering from insecure cookMillion Pixels 3 (id_cat) Remote SQL Injection Vulnerability
################################################################# # # Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability # #======================================================== #Maian Gallery 2.0 Insecure Cookie Handling Vulnerability
Author: Saime Date: July 12, 2008 Script: Maian Gallery v2.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Maian Gallery v2.0 Copyright © 2006-2008 Maian Script World. All Rights Reserved.Maian Events 2.0 Insecure Cookie Handling Vulnerability
Author: Saime Date: July 12, 2008 Script: Maian Events v2.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Maian Events v2.0 Copyright © 2005-2008 Maian Script World. All Rights Reserved DeMaian Music 1.0 Insecure Cookie Handling Vulnerability
Author: Saime Date: July 12, 2008 Script: Maian Music v1.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Maian Music v1.0. Copyright © 2007-2008 Maian Script World. All Rights Reserved. DeMaian Greetings 2.1 Insecure Cookie Handling Vulnerability
Author: Saime Date: July 12, 2008 Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Powered by: Maian Greetings v2.1 Description: Maian Greetings v2.1 is suffering fJoomla Component n-forms 1.01 Blind SQL Injection Exploit
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print " n"; print " ######################################################fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)
#!/usr/bin/php <?php ## ## Fuzzylime 3.01 Remote Code Execution ## Credits: Inphex and real ## ## [C:]# php fuzzylime.php http://www.target.com/fuzzylime/ ## [target][cmd]# id ## uid=63676(dswrealty) gid=888(vusers) groups=fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)
#!/usr/bin/perl #!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!! #after i noticed that there was a problem changing $cmd,i fixed it.this is the result. ## ## Fuzzylime 3.01 Remote Code Execution ## Credit