Exploit

关注公众号 jb51net

关闭

网络安全 > Exploit >

PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit

#!/usr/bin/perl #inphex #PHPizabi v0.848b C1 HFP1 Remote Code Execution #http://www.dz-secure.com/tools/1/WebESploit.pl.txt #if you are seeking for a partner to work on some project(s) just send an email inphex0 [ at ] gmail [ dot ] com #s

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

|___________________________________________________| | |AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability | |___________________________________________________ |---------------------Hussin X----------------------|

Joomla Component DT Register Remote SQL injection Vulnerability

/--------------------------------------------------------------- / / Joomla Component DT Register Remote SQL injection / ---------------------------------

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

/* Exploiting Microsoft DNS Dynamic Updates for Fun and profit Andres Tarasco Acu?a - (c) 2007 Url: http://www.514.es By default, most Microsoft DNS servers integrated with active directory allow insecure dynamic updates f

tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities

############################################################### #################### Viva IslaM Viva IslaM #################### ## ## Remote SQL injection Vulnerability ## ## tplSoccerSite 1.0 ( player.php id ) ##

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

#!/usr/bin/perl # # http://www.securityfocus.com/bid/11775 # credit to Muts for this vulnerability # acaro [at] jervus.it use IO::Socket::INET; use Switch; if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$p

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Cart v1.1 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Powered by Maian Cart v1.1 Description: Maian Car v1.1 is suffering from insecure cook

Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability

################################################################# # # Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability # #======================================================== #

Maian Gallery 2.0 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Gallery v2.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Maian Gallery v2.0 Copyright © 2006-2008 Maian Script World. All Rights Reserved.

Maian Events 2.0 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Events v2.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Maian Events v2.0 Copyright © 2005-2008 Maian Script World. All Rights Reserved De

Maian Music 1.0 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Music v1.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Maian Music v1.0. Copyright © 2007-2008 Maian Script World. All Rights Reserved. De

Maian Greetings 2.1 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.co.uk Dork: Powered by: Maian Greetings v2.1 Description: Maian Greetings v2.1 is suffering f

Joomla Component n-forms 1.01 Blind SQL Injection Exploit

#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print " n"; print " ######################################################

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

#!/usr/bin/php <?php ## ## Fuzzylime 3.01 Remote Code Execution ## Credits: Inphex and real ## ## [C:]# php fuzzylime.php http://www.target.com/fuzzylime/ ## [target][cmd]# id ## uid=63676(dswrealty) gid=888(vusers) groups=

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

#!/usr/bin/perl #!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!! #after i noticed that there was a problem changing $cmd,i fixed it.this is the result. ## ## Fuzzylime 3.01 Remote Code Execution ## Credit
共10页:6/10上一页下一页