首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Google Chrome 81.0.4044 V8 - Remote Code Execution
  日期:2021-04-06 17:50:33 点击:1 评论:0
# Exploit Title: Google Chrome 81.0.4044 V8 - Remote Code Execution# Date: 05/04/2021# Exploit Author: Tobias Marcotto# Tested on: Kali Linux x64 # Version: 83.0.4103.106# Description: Out of bounds write in V8 in Google Chrome prior to 83.0.4103.10
Google Chrome 86.0.4240 V8 - Remote Code Execution
  日期:2021-04-06 17:48:43 点击:1 评论:0
# Exploit Title: Google Chrome 86.0.4240 V8 - Remote Code Execution# Date: 05/04/2021# Exploit Author: Tobias Marcotto# Tested on: Kali Linux x64 # Version: 87.0.4280.88# Description: Insufficient data validation in V8 in Google Chrome prior to 87.0
vsftpd 3.0.3 - Remote Denial of Service
  日期:2021-04-06 17:46:48 点击:0 评论:0
# Exploit Title: vsftpd 3.0.3 - Remote Denial of Service# Date: 22-03-2021# Exploit Author: xynmaps# Vendor Homepage: https://security.appspot.com/vsftpd.html# Software Link: https://security.appspot.com/downloads/vsftpd-3.0.3.tar.gz# Version: 3.0.3
Microsoft Exchange 2019 - SSRF to Arbitrary File Write (Proxylogon)
  日期:2021-04-06 17:42:00 点击:1 评论:0
import requestsfrom urllib3.exceptions import InsecureRequestWarningimport randomimport stringimport sysdef id_generator(size=6, chars=string.ascii_lowercase + string.digits): return ''.join(random.choice(chars) for _ in range(size))if len(sys.argv)
Monitoring System (Dashboard) 1.0 - File Upload RCE (Authenticated)
  日期:2021-03-12 18:58:23 点击:14 评论:0
# Exploit Title: Monitoring System (Dashboard) 1.0 - File Upload RCE (Authenticated)# Exploit Author: Richard Jones# Date: 2021-03-11# Vendor Homepage: https://www.sourcecodester.com/php/11741/monitoring-system-dashboard.html# Software Link: https:/
Nsasoft Hardware Software Inventory 1.6.4.0 - 'multiple' Denial of Service (PoC)
  日期:2021-03-12 18:57:03 点击:6 评论:0
# Exploit Title: Nsasoft Hardware Software Inventory 1.6.4.0 - 'multiple' Denial of Service (PoC)# Exploit Author : Enes zeser# Exploit Date: 2021-02-28# Vendor Homepage : https://www.nsauditor.com/# Link Software : https://www.nsauditor.com/downloa
Atlassian JIRA 8.11.1 - User Enumeration
  日期:2021-03-12 18:55:27 点击:5 评论:0
# Title: Atlassian JIRA 8.11.1 - User Enumeration# Author: Dolev Farhi# Vulnerable versions: version 7.13.16, 8.0.0 version 8.5.7, 8.6.0 version 8.12.0# CVE: CVE-2020-14181# Credit to original CVE author: Mikhail Klyuchnikov of Positive Technologies
Golden FTP Server 4.70 - 'PASS' Buffer Overflow
  日期:2021-03-12 18:53:34 点击:5 评论:0
# Golden FTP Server 4.70 - 'PASS' Buffer Overflow (2)# Author: 1F98D# Original Authors: Craig Freyman (cd1zz) and Gerardo Iglesias Galvan (iglesiasgg)# Tested on Windows 10 (x64)## A buffer overflow exists in GoldenFTP during the authentication proc
Joomla JCK Editor 6.4.4 - 'parent' SQL Injection
  日期:2021-03-12 18:51:53 点击:11 评论:0
# Exploit Title: Joomla JCK Editor 6.4.4 - 'parent' SQL Injection (2)# Googke Dork: inurl:/plugins/editors/jckeditor/plugins/jtreelink/# Date: 05/03/2021# Exploit Author: Nicholas Ferreira# Vendor Homepage: http://docs.arkextensions.com/downloads/jc
Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)
  日期:2021-03-12 18:47:47 点击:2 评论:0
# Exploit Title: Hotel and Lodge Management System 1.0 - Remote Code Execution (Unauthenticated)# Date: 07-03-2021# Exploit Author: Christian Vierschilling# Vendor Homepage: https://www.sourcecodester.com# Software Link: https://www.sourcecodester.c
AnyDesk 5.5.2 - Remote Code Execution
  日期:2021-03-03 19:34:49 点击:6 评论:0
# Exploit Title: AnyDesk 5.5.2 - Remote Code Execution# Date: 09/06/20# Exploit Author: scryh# Vendor Homepage: https://anydesk.com/en# Version: 5.5.2# Tested on: Linux# Walkthrough: https://devel0pment.de/?p=1881#!/usr/bin/env pythonimport structim
Zen Cart 1.5.7b - Remote Code Execution (Authenticated)
  日期:2021-03-03 19:32:45 点击:4 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework######## This exploit write payload in database and trig to command# a bug in an zencart v1.5.7b web application####c
Tiny Tiny RSS - Remote Code Execution
  日期:2021-03-03 19:30:44 点击:7 评论:0
# Exploit Title: Tiny Tiny RSS - Remote Code Execution# Date: 21/09/2020# Exploit Author: Daniel Neagaru Benjamin Nadarevi# Blog post: https://www.digeex.de/blog/tinytinyrss/# Software Link: https://git.tt-rss.org/fox/tt-rss# Version: all before 202
Covid-19 Contact Tracing System 1.0 - Remote Code Execution (Unauthenticated)
  日期:2021-03-03 19:29:17 点击:5 评论:0
# Exploit Title: Covid-19 Contact Tracing System 1.0 - Remote Code Execution (Unauthenticated)# Date: 28-02-2021# Exploit Author: Christian Vierschilling# Vendor Homepage: https://www.sourcecodester.com# Software Link: https://www.sourcecodester.com
Online Catering Reservation System 1.0 - Remote Code Execution (Unauthenticated)
  日期:2021-03-03 19:25:05 点击:3 评论:0
# Exploit Title: Online Catering Reservation System 1.0 - Unauthenticated Remote Code Execution# Date: 28-02-2021# Exploit Author: Christian Vierschilling# Vendor Homepage: https://www.sourcecodester.com# Software Link: https://www.sourcecodester.co
VMware vCenter Server 7.0 - Unauthenticated File Upload
  日期:2021-03-03 19:15:31 点击:40 评论:0
pre# Exploit Title: VMware vCenter Server 7.0 - Unauthenticated File Upload # Date: 2021-02-27 # Exploit Author: Photubias # Vendor Advisory: [1] https://www.vmware.com/security/advisories/VMSA-2021-0002.html # Version: vCenter Server 6.5 (7515524lt
WiFi Mouse 1.7.8.5 - Remote Code Execution
  日期:2021-03-03 19:13:31 点击:16 评论:0
# Exploit Title: WiFi Mouse 1.7.8.5 - Remote Code Execution# Date: 25-02-2021# Author: H4rk3nz0# Vendor Homepage: http://necta.us/# Software Link: http://wifimouse.necta.us/#download# Version: 1.7.8.5# Tested on: Windows Enterprise Build 17763# Desk
FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload (Metasploit)
  日期:2021-03-03 19:11:38 点击:11 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::EXE prepend Msf::Exploit::Re
VMware vCenter 6.5 / 7.0 Remote Code Execution
  日期:2021-02-26 19:48:41 点击:13 评论:0
import tarfile import os from io import BytesIO import requests proxies = { http: http://127.0.0.1:8080 , https: http://127.0.0.1:8080 , } def return_zip(): with tarfile.open(test.tar, 'w') as tar: payload = BytesIO() id_rsa_pub = 'ssh-rsa AAAAB3Nza
Remote Desktop Web Access - Authentication Timing Attack (Metasploit Module)
  日期:2021-02-26 19:43:23 点击:5 评论:0
#!/usr/bin/env python3# -*- coding: utf-8 -*-# standard modulesfrom metasploit import module# extra modulesDEPENDENCIES_MISSING = Falsetry: import base64 import itertools import os import requestsexcept ImportError: DEPENDENCIES_MISSING = True# Meta
共637页/12731条记录 首页 1 [2] [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Monitoring System (Dashboard
·Joomla JCK Editor 6.4.4 - 'p
·Nsasoft Hardware Software In
·Golden FTP Server 4.70 - 'PA
·Atlassian JIRA 8.11.1 - User
·Hotel and Lodge Management S
·Microsoft Exchange 2019 - SS
·Google Chrome 86.0.4240 V8 -
·Google Chrome 81.0.4044 V8 -
·vsftpd 3.0.3 - Remote Denial
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2021 VFocuS.Net All Rights Reserved