首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Apache APISIX 2.12.1 - Remote Code Execution (RCE)
  日期:2022-03-18 15:17:44 点击:164 评论:0
# Exploit Title: Apache APISIX 2.12.1 - Remote Code Execution (RCE)# Date: 2022-03-16# Exploit Author: Ven3xy# Vendor Homepage: https://apisix.apache.org/# Version: Apache APISIX 1.3 2.12.1# Tested on: CentOS 7# CVE : CVE-2022-24112import requestsim
Linux Kernel 5.8 < 5.16.11 - Local Privilege Escalation (DirtyPipe)
  日期:2022-03-14 15:52:09 点击:77 评论:0
// Exploit Title: Linux Kernel 5.8 5.16.11 - Local Privilege Escalation (DirtyPipe)// Exploit Author: blasty (peter@haxx.in)// Original Author: Max Kellermann (max.kellermann@ionos.com)// CVE: CVE-2022-0847/* SPDX-License-Identifier: GPL-2.0 *//* *
Google Chrome 81.0.4044 V8 - Remote Code Execution
  日期:2021-04-06 17:50:33 点击:117 评论:0
# Exploit Title: Google Chrome 81.0.4044 V8 - Remote Code Execution# Date: 05/04/2021# Exploit Author: Tobias Marcotto# Tested on: Kali Linux x64 # Version: 83.0.4103.106# Description: Out of bounds write in V8 in Google Chrome prior to 83.0.4103.10
Google Chrome 86.0.4240 V8 - Remote Code Execution
  日期:2021-04-06 17:48:43 点击:106 评论:0
# Exploit Title: Google Chrome 86.0.4240 V8 - Remote Code Execution# Date: 05/04/2021# Exploit Author: Tobias Marcotto# Tested on: Kali Linux x64 # Version: 87.0.4280.88# Description: Insufficient data validation in V8 in Google Chrome prior to 87.0
vsftpd 3.0.3 - Remote Denial of Service
  日期:2021-04-06 17:46:48 点击:107 评论:0
# Exploit Title: vsftpd 3.0.3 - Remote Denial of Service# Date: 22-03-2021# Exploit Author: xynmaps# Vendor Homepage: https://security.appspot.com/vsftpd.html# Software Link: https://security.appspot.com/downloads/vsftpd-3.0.3.tar.gz# Version: 3.0.3
Microsoft Exchange 2019 - SSRF to Arbitrary File Write (Proxylogon)
  日期:2021-04-06 17:42:00 点击:64 评论:0
import requestsfrom urllib3.exceptions import InsecureRequestWarningimport randomimport stringimport sysdef id_generator(size=6, chars=string.ascii_lowercase + string.digits): return ''.join(random.choice(chars) for _ in range(size))if len(sys.argv)
Monitoring System (Dashboard) 1.0 - File Upload RCE (Authenticated)
  日期:2021-03-12 18:58:23 点击:77 评论:0
# Exploit Title: Monitoring System (Dashboard) 1.0 - File Upload RCE (Authenticated)# Exploit Author: Richard Jones# Date: 2021-03-11# Vendor Homepage: https://www.sourcecodester.com/php/11741/monitoring-system-dashboard.html# Software Link: https:/
Nsasoft Hardware Software Inventory 1.6.4.0 - 'multiple' Denial of Service (PoC)
  日期:2021-03-12 18:57:03 点击:103 评论:0
# Exploit Title: Nsasoft Hardware Software Inventory 1.6.4.0 - 'multiple' Denial of Service (PoC)# Exploit Author : Enes zeser# Exploit Date: 2021-02-28# Vendor Homepage : https://www.nsauditor.com/# Link Software : https://www.nsauditor.com/downloa
Atlassian JIRA 8.11.1 - User Enumeration
  日期:2021-03-12 18:55:27 点击:61 评论:0
# Title: Atlassian JIRA 8.11.1 - User Enumeration# Author: Dolev Farhi# Vulnerable versions: version 7.13.16, 8.0.0 version 8.5.7, 8.6.0 version 8.12.0# CVE: CVE-2020-14181# Credit to original CVE author: Mikhail Klyuchnikov of Positive Technologies
Golden FTP Server 4.70 - 'PASS' Buffer Overflow
  日期:2021-03-12 18:53:34 点击:53 评论:0
# Golden FTP Server 4.70 - 'PASS' Buffer Overflow (2)# Author: 1F98D# Original Authors: Craig Freyman (cd1zz) and Gerardo Iglesias Galvan (iglesiasgg)# Tested on Windows 10 (x64)## A buffer overflow exists in GoldenFTP during the authentication proc
Joomla JCK Editor 6.4.4 - 'parent' SQL Injection
  日期:2021-03-12 18:51:53 点击:73 评论:0
# Exploit Title: Joomla JCK Editor 6.4.4 - 'parent' SQL Injection (2)# Googke Dork: inurl:/plugins/editors/jckeditor/plugins/jtreelink/# Date: 05/03/2021# Exploit Author: Nicholas Ferreira# Vendor Homepage: http://docs.arkextensions.com/downloads/jc
Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)
  日期:2021-03-12 18:47:47 点击:15 评论:0
# Exploit Title: Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)# Date: 07-03-2021# Exploit Author: Christian Vierschilling# Vendor Homepage: https://www.sourcecodester.com# Software Link: https://www.sourcecodester.c
AnyDesk 5.5.2 - Remote Code Execution
  日期:2021-03-03 19:34:49 点击:24 评论:0
# Exploit Title: AnyDesk 5.5.2 - Remote Code Execution# Date: 09/06/20# Exploit Author: scryh# Vendor Homepage: https://anydesk.com/en# Version: 5.5.2# Tested on: Linux# Walkthrough: https://devel0pment.de/?p=1881#!/usr/bin/env pythonimport structim
Zen Cart 1.5.7b - Remote Code Execution (Authenticated)
  日期:2021-03-03 19:32:45 点击:30 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework######## This exploit write payload in database and trig to command# a bug in an zencart v1.5.7b web application####c
Tiny Tiny RSS - Remote Code Execution
  日期:2021-03-03 19:30:44 点击:19 评论:0
# Exploit Title: Tiny Tiny RSS - Remote Code Execution# Date: 21/09/2020# Exploit Author: Daniel Neagaru Benjamin Nadarevi# Blog post: https://www.digeex.de/blog/tinytinyrss/# Software Link: https://git.tt-rss.org/fox/tt-rss# Version: all before 202
Covid-19 Contact Tracing System 1.0 - Remote Code Execution (Unauthenticated)
  日期:2021-03-03 19:29:17 点击:22 评论:0
# Exploit Title: Covid-19 Contact Tracing System 1.0 - Remote Code Execution (Unauthenticated)# Date: 28-02-2021# Exploit Author: Christian Vierschilling# Vendor Homepage: https://www.sourcecodester.com# Software Link: https://www.sourcecodester.com
Online Catering Reservation System 1.0 - Remote Code Execution (Unauthenticated)
  日期:2021-03-03 19:25:05 点击:13 评论:0
# Exploit Title: Online Catering Reservation System 1.0 - Unauthenticated Remote Code Execution# Date: 28-02-2021# Exploit Author: Christian Vierschilling# Vendor Homepage: https://www.sourcecodester.com# Software Link: https://www.sourcecodester.co
VMware vCenter Server 7.0 - Unauthenticated File Upload
  日期:2021-03-03 19:15:31 点击:61 评论:0
pre# Exploit Title: VMware vCenter Server 7.0 - Unauthenticated File Upload # Date: 2021-02-27 # Exploit Author: Photubias # Vendor Advisory: [1] https://www.vmware.com/security/advisories/VMSA-2021-0002.html # Version: vCenter Server 6.5 (7515524lt
WiFi Mouse 1.7.8.5 - Remote Code Execution
  日期:2021-03-03 19:13:31 点击:46 评论:0
# Exploit Title: WiFi Mouse 1.7.8.5 - Remote Code Execution# Date: 25-02-2021# Author: H4rk3nz0# Vendor Homepage: http://necta.us/# Software Link: http://wifimouse.necta.us/#download# Version: 1.7.8.5# Tested on: Windows Enterprise Build 17763# Desk
FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload (Metasploit)
  日期:2021-03-03 19:11:38 点击:25 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::EXE prepend Msf::Exploit::Re
共637页/12733条记录 首页 1 [2] [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved