Exploit

关注公众号 jb51net

关闭

网络安全 > Exploit >

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

############################################################### #################### Viva IslaM Viva IslaM #################### ## ## Remote SQL InjEcti0n Vulnerability ## ## WebCMS Portal ( index.php menu ) ##

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

==================================================================== Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability ==================================================================== ,--^----------,--------,-----,

jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities

--== ================================================================================ ==-- --== jSite 1.0 OE Multiple Remote SQL/LFI Vulnerbility ==-- --== =========================================================

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

<?php ## ## Name: Fuzzylime 3.01 Remote Code Execution Exploit ## Credits: Charles "real" F. <charlesfol[at]hotmail.fr> ## ## Conditions: None ## ## Greetz: Inphex, hEEGy and austeN ## ## Exp

Maian Recipe

-[*] ================================================================================ [*]- -[*] Maian Recipe <= v1.2 Insecure Cookie Handling Vulnerability [*]- -[*] ======================================================

Maian Guestbook

-[*] ================================================================================ [*]- -[*] Maian Guestbook <= 3.2 Insecure Cookie Handling Vulnerability [*]- -[*] ======================================================

Maian Weblog

-[*] ================================================================================ [*]- -[*] Maian Weblog <= v4.0 Insecure Cookie Handling Vulnerability [*]- -[*] ======================================================

Maian Search

-[*] ================================================================================ [*]- -[*] Maian Search <= v1.1 Insecure Cookie Handling Vulnerability [*]- -[*] ======================================================

Maian Uploader

-[*] ================================================================================ [*]- -[*] Maian Uploader <= v4.0 Insecure Cookie Handling Vulnerability [*]- -[*] ======================================================

Safari Quicktime

#!/usr/bin/perl # # quickbite.pl # # Safari Quicktime <= 7.3 RTSP Content-Type overflow exploit # for Mac OS X (Intel) # # Tested with OS X 10.4. # On victim, browse to http://server:8080/ # Binds shell on port 4444.

Ultrastats

#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; # # [!] Discovered.: DNX # [!] Vendor.....: http://www.shooter-szene.de | http://www.ultrastats.org # [!] Detected...: 29.06.2008 # [!] Reported...: 04.07.2008 # [!] Re

Mole Group Real Estate Script

-[*] ================================================================================ [*]- -[*] Real Estate Script <= 1.1 Remote SQL Injection Vulnerability [*]- -[*] ==============================================================

trixbox (langChoice) Local File Inclusion Exploit (connect-back)

#!/usr/bin/perl -w # Jean-Michel BESNARD - LEXSI Audit # 2008-07-08 # perl trixbox_fi.pl 192.168.1.212 # Please listen carefully as our menu option has changed # Choose from the following options: # 1> Remote TCP shell #

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

# Name Of Script : Dolphin PHP # Version : 6.1.2 # Download From : http://heanet.dl.sourceforge.net/sourceforge/boonex-dolphin/Dolphin-v.6.1.2-Free.zip # Found By : RoMaNcYxHaCkEr [ RoMaNTiC-TeaM ] # My Home Page : WwW.4RxH.CoM [

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

#!/usr/bin/perl #================================================= # BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit #================================================= # # ,--^----------,--------,-----,-------^--, # | ||||||||| `-----
共10页:7/10上一页下一页