欢迎来到福编程网,本站提供各种互联网专业知识!

无法确定分类

  • minb 0.1.0 Remote Code Execution Exploit

    #!/usr/bin/python#########################################################################################minbRemoteCodeExecutionExploit#######################################################

    更新于
  • Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

    <!--JeremyBrown(0xjbrown41@gmail.com/jbrownsec.blogspot.com)AdobeAcrobat9RemoteDoS(--)TestedonAA9/IE7/VistaIcan'tseemtoreproducethisonXP!Ohwell.OfcoursethemostpopularappforreadingpdfsisSfS/S

    更新于
  • Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

    #!/usr/bin/php<?php#------------------------------------------------------------#quick'n'dirtywordpressadmin-take0verpoc#byiso^kpsbrinaugust2oo8##worksw/wordpress2.6.1##.oO(private--donot

    更新于
  • Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

    #include<stdio.h>#include<stdlib.h>/*DAP8.x(.m3u)FileBOFCExploitforXPSP2,SP3EnglishSecurityFocusAdvisory:DownloadAcceleratorPlus(DAP)ispronetoabuffer-overflowvulnerabilitybecauseitfails

    更新于
  • OllyDBG v1.10 and ImpREC v1.7f (export name) BOF PoC

    ;-------------------------------------------------------------------------;;OllyDBGv1.10andImpRECv1.7fexportnamebufferoverflowvulnerability;PoC(probablyolderversionsaffectedtoo,nottestedthough.);;Included

    更新于
  • Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day

    #!/usr/bin/python#DownloadAcceleratorPlus-DAP8.x(m3u)0dayLocalBufferOverflowExploit#BugdiscoveredbyKrystianKloskowski(h07)<h07@interia.pl>#Testedon:DownloadAcceleratorPlus8.6/XPSP2Polish#Shellcode:

    更新于
  • Dreampics Builder (page) Remote SQL Injection Vulnerability

    ###########################################################PICSBUILDER(page)SQLInjectionVulnerability#========================================================#Author:HussinX=#

    更新于
  • BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability

    #NameOfScript:Ray#Version:3.5#DownloadFrom:http://get.boonex.com/Ray-v.3.5-Suite-Free#FoundBy:RoMaNcYxHaCkEr[RoMaNTiC-TeaM]#MyHomePage:WwW.4RxH.CoM[WeWillBeBackSoon]&Tryag.cc/cc[M

    更新于
  • AuraCMS

    #!/usr/bin/perl#k1tk4tPublicSecurityAdvisory#////////////////////////////////////////////////////////////#AuraCMS<=2.2.2(pages_data.php)ArbitraryEdit/Add/Deletedatahalamanexploit#Vendor:http://www.auracms.org/

    更新于
  • Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

    -------------------------------------------------------------------------------------------JoomlaComponentcom_contentSQLInjectionVulnerabity------------------

    更新于
  • Mole Group Last Minute Script

    -[*]================================================================================[*]--[*]LastMinuteScript<=4.0RemoteSQLInjectionVulnerability[*]--[*]=============================================================

    更新于
  • Openbsd 3.8上安装配置 APACHE + MYSQL + PHP + mod_limitipco

    本文旨在用OPENBSD自己提供的软件安装包来搭建服务器环境,当然你也可以下载原代码包编译安装,但这样就费时费力了。实际上OPENBSD给我们提供了大量的编译好的二进制安装包,利用这些二进制安装包我们可以快速部署我们需要的服务器环境,不仅省时还可以保障OP

    更新于
  • Linux系统下防止 ARP 欺骗_绑定IP地址和MAC地址

    一、约定1、网关上已经对下面所带的机器作了绑定。网关IP:192.168.1.1MAC:00:02:B3:38:08:622、要进行绑定的Linux主机IP:192.168.1.2MAC:00:04:61:9A:8D:B2二、绑定步骤1、先使用arp和arp-a查看一下当前ARP缓存列表[root@ftpsvr~]#arpAddre

    更新于
  • MyBulletinBoard (MyBB)

    <?php//forummybb<=1.2.11remotesqlinjectionvulnerability//bugfoundbyJanekVind"waraxe"http://www.waraxe.us/advisory-64.html//exploitwritebyc411k(notbrutforceonesymbol.inserthashinyourPMinoneact

    更新于
  • Acoustica Mixcraft

    #!/usr/bin/perl##AcousticaMixcraft(mx4file)LocalBufferOverflowExploit#Author:Koshi##Date:08-28-08(0day)#Application:AcousticaMixcraft#Version(s):(PossiblyOlder)/4.1Build96/4.2Build98#Site:http://

    更新于
  • Simple PHP Blog (SPHPBlog)

    <?/*sIMPLEphpbLOG0.5.0eXPLOITbYmAXzA2008*/functioncurl($url,$postvar){global$cook;$ch=curl_init($url);curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);curl_setopt($ch,CURLOPT_HEADER,1);

    更新于
  • Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

    -----------------------------------------------------------------------------UltraOfficeActiveXControlRemoteArbitraryFileCorruptionurl:http://www.ultrashareware.comAuthor:shinnaimail:shinnai[at]autistici[dot]orgsite:http:

    更新于
  • Dana IRC 1.4a Remote Buffer Overflow Exploit

    #!/usr/bin/perl#k`sOSe-08/24/2008#Thisisauselessandnotportableexploitcode,testedonlyonmywinxp-sp3VM.#IwaslookingforavulntowriteanexploitforwhenIfoundthisPoC:##http://www.milw0rm.com/exploits/5817

    更新于
  • GeekLog

    #!/usr/bin/perlusewarnings;usestrict;useLWP::UserAgent;useHTTP::Request::Common;print<<INTRO;GeekLog<=1.5.0RemoteArbitraryFileUpload

    更新于
  • NoName Script

    ################################################################################[]NoNameScript1.1BETAMultipleRemoteVulnerabilities[]DiscoveredBySirGod[]www.mortal-team.org

    更新于