首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
Linux Kernel - 'AF_PACKET' Use-After-Free
  日期:2017-10-19 16:10:12 点击:0 评论:0
/*Source: https://blogs.securiteam.com/index.php/archives/3484Vulnerabilities summaryThe following advisory describes a use-after-free vulnerability found in Linux Kernel’s implementation of AF_PACKET that can lead to privilege escalation. AF_PACKET
Microsoft Windows - 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memor
  日期:2017-10-19 16:09:00 点击:0 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1303 it means that between 1 and about 56 bytes of uninitialized kernel pool memory can be leaked with a single nt!NtQueryObject call. The attached proof of concept program has been
Micro Focus VisiBroker C++ 8.5 SP2 Memory Corruption
  日期:2017-10-17 14:35:25 点击:2 评论:0
SEC Consult Vulnerability Lab Security Advisory 20171016-0 ======================================================================= title: Multiple vulnerabilities product: Micro Focus VisiBroker C++ vulnerable version: 8.5 SP2 fixed version: 8.5 SP4
Webmin 1.850 SSRF / CSRF / Cross Site Scripting
  日期:2017-10-17 14:33:20 点击:5 评论:0
[+] SSD Beyond Security: https://blogs.securiteam.com/index.php/archives/3430[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/WEBMIN-v1.850-REMOTE-COMMAND-EXECUTION.txt
Microsoft Edge Chakra StackScriptFunction::BoxState::Box Uninitialized Pointers
  日期:2017-10-16 16:05:46 点击:3 评论:0
Microsoft Edge: Chakra: Accesses to uninitialized pointers in StackScriptFunction::BoxState::Box CVE-2017-11809Here's a snippet of the method that interprets a javascript function's bytecode.Js::Var Js::InterpreterStackFrame::INTERPRETERLOOPNAME(){
Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call
  日期:2017-10-16 16:05:00 点击:3 评论:0
Microsoft Edge: Chakra: JIT: RegexHelper::StringReplace must call the callback function with updating ImplicitCallFlags CVE-2017-11802The String.prototype.replace method can be inlined in the JIT process. So in the method, all the calls which may br
Microsoft Edge Chakra JIT Incorrect GenerateBailOut Calling Patterns
  日期:2017-10-16 16:04:26 点击:3 评论:0
Microsoft Edge: Chakra: JIT: Incorrect GenerateBailOut calling patterns CVE-2017-11799Bailout:ChakraCoreas background JIT compiler generates highly optimized JITaed code based upon the data and infers likely usage patterns based on the profile data
Opentext Documentum Content Server File Hijack / Privilege Escalation
  日期:2017-10-16 16:03:11 点击:4 评论:0
#!/usr/bin/env python# Opentext Documentum Content Server (formerly known as EMC Documentum Content Server)# does not properly validate input of PUT_FILE RPC-command which allows any# authenticated user to hijack arbitrary file from Content Server f
Opentext Documentum Content Server Privilege Escalation
  日期:2017-10-16 16:02:11 点击:5 评论:0
#!/usr/bin/env python# Opentext Documentum Content Server (formerly known as EMC Documentum Content Server)# contains following design gap, which allows authenticated user to gain privileges# of superuser:## Content Server stores information about u
Opentext Documentum Content Server File Download
  日期:2017-10-16 16:00:54 点击:5 评论:0
#!/usr/bin/env python# Opentext Documentum Content Server (formerly known as EMC Documentum Content Server)# contains following design gap, which allows authenticated user to download arbitrary# content files regardless attacker's repository permiss
Opentext Documentum Content Server Privilege Escalation
  日期:2017-10-16 15:59:25 点击:2 评论:0
#!/usr/bin/env python# Opentext Documentum Content Server (formerly known as EMC Documentum Content Server)# contains following design gap, which allows authenticated user to gain privileges# of superuser:## Content Server allows to upload content u
Sync Breeze Enterprise 10.1.16 - Buffer Overflow (SEH) (Metasploit)
  日期:2017-10-16 15:57:47 点击:6 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remo
Windows Escalate UAC Protection Bypass (In Memory Injection) Abusing WinSXS
  日期:2017-10-13 14:27:06 点击:6 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/exploit/exe'class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Exploit::EX
Tomcat JSP Upload Bypass Remote Code Execution
  日期:2017-10-13 14:24:20 点击:5 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def ini
Sync Breeze Enterprise 10.1.16 SEH Overflow
  日期:2017-10-13 14:21:38 点击:4 评论:0
#!/usr/bin/env python## Exploit Title : Sync Breeze Enterprise v10.1.16 0day# Date : 10/11/2017# Vendor HomePage : http://www.syncbreeze.com# Exploit Author : Milton Valencia (wetw0rk)# Software : http://www.syncbreeze.com/downloads.html# Version :
ASX to MP3 3.1.3.7 - '.m3u' Buffer Overflow
  日期:2017-10-12 14:27:50 点击:5 评论:0
# Exploit Title: Buffer Overflow via crafted malicious .m3u file # Exploit Author: Parichay Rai # Tested on: XP Service Pack 3 # CVE : CVE-2017-15221 Description ------------ A buffer overflow Attack possible due to improper input mechanism Proof of
VX Search Enterprise 10.1.12 - Buffer Overflow
  日期:2017-10-12 14:26:27 点击:8 评论:0
#!/usr/bin/env python # Exploit Title : VX Search Enterprise v10.1.12 Remote Buffer Overflow # Exploit Author : Revnic Vasile # Email : revnic[at]gmail[dot]com # Date : 09-10-2017 # Vendor Homepage : http://www.flexense.com/ # Software Link : http://
Trend Micro InterScan Messaging Security (Virtual Appliance) - Remote Code Execu
  日期:2017-10-12 14:25:24 点击:3 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def
ASX To MP3 Converter Stack Overflow
  日期:2017-10-11 16:06:41 点击:4 评论:0
import struct,syshead ='''ASX version=3.0EntryREF HREF=mms://site.com/ach/music/smpl/LACA-05928-002-tes_''' #offset 17375junk = A *17375 #0x1003df8e#0x774e1035EIP=x36x10x4ex77 adjust=A *4 def create_rop_chain(): rop_gadgets = [ 0x73dd5dce, # POP
Trend Micro OfficeScan Remote Code Execution
  日期:2017-10-11 16:05:37 点击:10 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include
共578页/11560条记录 首页 1 [2] [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Stock Photo Selling 1.0 - SQ
·Apache - HTTP OPTIONS Memory
·Dnsmasq < 2.78 - 2-byte Heap
·Fibaro Home Center 2 - Remot
·Cash Back Comparison Script
·NodeJS Debugger Command Inje
·Apache Tomcat < 9.0.1 (Beta)
·FLIR Systems FLIR Thermal Ca
·Trend Micro OfficeScan Remot
·VX Search Enterprise 10.1.12
·FLIR Systems FLIR Thermal Ca
·Microsoft Windows Kernel - '
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2017 VFocuS.Net All Rights Reserved