Exploit
Exploit
分类类型:文章分类 | 文章数量:86
Belkin wireless G router ADSL2 modem Auth Bypass Exploit
html code to bypass the webinterface password protection of the Belkin wireless G router adsl2 modem. It worked on model F5D7632-4V6 with upgraded firmware 6.01.
Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)
#include #include /* DAP 8.x (.m3u) File BOF C Exploit for XP SP2,SP3 English SecurityFocus Advisory: Download Accelerator Plus (DAP) is prone to a buffer-overflow vulnerability because it fails
Sun xVM VirtualBox
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/ Sun xVM VirtualBox Privilege Escalation Vulnerability *Advisory Information*
VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : VMWare Workstation (hcmon.sys 6.0.0.45731) Class : DoS Published : 2008-08-17 Credit : g_ (g_ # orange-bat # com) - -
WS_FTP Home/Professional FTP Client Remote Format String PoC
################################################################################################################## # # Ipswitch WS_FTP Home/WS_FTP Professional FTP Client Remote Format String vulnerability # Vendor : http://www.ipswitch.com
iGaming CMS
#!/usr/bin/perl # ---------------------------------------------------------- # iGaming
Rianxosencabos CMS 0.9 Remote Add Admin Exploit
#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit # Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz # written by ka0x # D.O.M Labs - Security Researchers # - www.doml
CJ Ultra Plus
#!/usr/bin/perl # # CJ Ultra Plus
Sagem Routers F@ST Remote CSRF Exploit (dhcp hostname attack)
#!/usr/bin/env python # # # # OOO OOO OO OOO # O O O O O # O O O O O # O
DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit
//////////////////////////////////////////////////////////////////////////////////// // ---------------------------------------------------------------------------- // // |
Debian Sarge Multiple IMAP Server Denial of Service Exploit
/* Debian Sarge Multiple IMAP Server DoS (debianimapers.c) Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com] Testing Cyrus IMAPd: bash$ ./debianimapers 192.168.0.189 ..... 39 tries and imapd goes down! Missi
Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
#!/usr/bin/perl use LWP::UserAgent; use HTTP::Request; # ------------------------------------------------------------------------------------------------- -# # Yourownbux v4.0 -----------------------------------------
Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit
#!/usr/bin/perl -W # Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit # File affected: include/draw-delete.php (id) # Vuln Code: # 06: $did = $_GET['id']; # 08: mysql_query("DELETE FROM draw WHERE did='$did'"); # by k
Linux Kernel
/* Linux Kernel DCCP Memory Disclosure Vulnerability Synopsis: The Linux kernel is susceptible to a locally exploitable flaw which may allow local users to steal data from the kernel memory. Vulnerable Systems: Linux Kernel Versio
MS Internet Explorer (FTP Server Response) DoS Exploit
#!/usr/bin/perl # MS 07-016 FTP Server Response PoC # Usage: ./ms07016ftp.pl [LISTEN_IP] # # Tested Against: MSIE 6.02900.2180 (SP2) # # Details: The response is broken into buffers, either at length 1024, #
Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)
MS07-002 EXCEL Malformed Palette Record Vulnerability DOS POC ###### Author ###### LifeAsaGeek at gmail.com ... and Microsoft said that vuln credit is for Greg MacManus of iDefense Labs ######################## Vul
BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
MS Windows (MessageBox) Memory Corruption Local Denial of Service
// mbox.cs using System; using System.Runtime.InteropServices; class HelloWorldFromMicrosoft { [DllImport("user32.dll")] unsafe public static extern int MessageBoxA(uint hwnd, byte* lpText, byte* lpCaption, uint uTyp
MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print " n"; print " #################### Viva IslaMe Viva IslaMe #############
DigiLeave 1.2 (info_book.asp book_id) Blind SQL Injection Exploit
#!/usr/bin/perl use LWP::UserAgent; use Getopt::Long; if(!$ARGV[1]) { print " n"; print " #################### Viva IslaMe Viva IslaMe #############