Exploit

关注公众号 jb51net

关闭

网络安全 > Exploit >

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

#!/usr/bin/perl -W # Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit # File affected: include/draw-delete.php (id) # Vuln Code: # 06: $did = $_GET['id']; # 08: mysql_query("DELETE FROM draw WHERE did='$did'"); # by k

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

<?php ini_set("max_execution_time",0); print_r(' ############################################################### # # pLink 2.07 - Blind SQL Injection Exploit #

Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit

#!/usr/bin/perl use LWP::UserAgent; use HTTP::Request; # ------------------------------------------------------------------------------------------------- -# # Yourownbux v4.0 -----------------------------------------

The Personal FTP Server 6.0f RETR Denial of Service Exploit

/* *** The Personal FTP Server 6.0f RETR DOS exploit *** A vulnerability exists in the way Personal FTP Server handles multiple RETR commands with overly long filenames.When confronted with such consecutive requests the server will crash.

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

<html> <pre> ============================================================================= MS08-053 Windows Media Encoder wmex.dll ActiveX Control Buffer Overflow ==============================================================

DESlock

<?php error_reporting(E_ALL); /////////////////////////////////////////////////////////////////////// /////////////////////////////////////////////////////////////////////// // IPB <= 2.3.5 sql injection exploit // Version 1.0

Debian Sarge Multiple IMAP Server Denial of Service Exploit

/* Debian Sarge Multiple IMAP Server DoS (debianimapers.c) Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com] Testing Cyrus IMAPd: bash$ ./debianimapers 192.168.0.189 ..... 39 tries and imapd goes down! Missi

DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit

//////////////////////////////////////////////////////////////////////////////////// // ---------------------------------------------------------------------------- // // |

Sagem Routers F@ST Remote CSRF Exploit (dhcp hostname attack)

#!/usr/bin/env python # # # # OOO OOO OO OOO # O O O O O # O O O O O # O

CJ Ultra Plus

#!/usr/bin/perl # # CJ Ultra Plus <= v1.0.4 Cookie SQL Injection # # found and coded by -SmoG- /GermAn hAckZ0r # contact: ICQ - 266836394 # # # # # hints: - sometimes the parameter "SID" is different to the normal

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit # Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz # written by ka0x <ka0x01 [at] gmail [dot] com> # D.O.M Labs - Security Researchers # - www.doml

iGaming CMS

#!/usr/bin/perl # ---------------------------------------------------------- # iGaming <= 1.5 Multiple Remote SQL Injection Exploit # Perl Exploit - Output: id:admin:password # Discovered On: 23/09/2008 # Discovered By: StAkeR - StA

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

----------------------------------------------------------------------------- BurnAware NMSDVDXU ActiveX Control Remote Arbitrary File Creation/Execution url: http://www.burnaware.com File: NMSDVDXU.dll <= 1.0.0.13 CLSID: {0355854A-7

ESET Smart Security 3.0.667.0 Privilege Escalation PoC

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : ESET Smart Security 3.0.667.0 Class : Privilage escalation Published : 2008-08-14 Credit : g_ (g_ # orange-bat # com) - - Details -

EO Video 1.36 Local Heap Overflow DOS / PoC

#!/usr/bin/python # -------------------------------------------------------------- # EO Video v1.36 Heap Overflow local PoC/DoS exploit # *.eop playlist file in <Name> buffer overflow # Other versions may be vulnerable too... # -
共10页:9/10上一页下一页