首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Windows DeviceApi CMApi - User Hive Impersonation Privilege Escalation (MS16-124
  日期:2016-10-19 17:17:32 点击:139 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=875 Windows: DeviceApi CMApi User Hive Impersonation EoP Platform: Windows 10 10586 not tested 8.1 Update 2 or Windows 7 Class: Elevation of Privilege Summary: The DeviceApi CMApi P
Windows DeviceApi CMApi PiCMOpenDeviceKey - Arbitrary Registry Key Write Privile
  日期:2016-10-19 17:14:32 点击:89 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=872 Windows: DeviceApi CMApi PiCMOpenClassKey Arbitrary Registry Key Write EoP Platform: Windows 10 10586 not tested 8.1 Update 2 or Windows 7 Class: Elevation of Privilege Summary:
Cgiemail 1.6 - Source Code Disclosure
  日期:2016-10-19 17:11:41 点击:32 评论:0
#!/usr/bin/env perl # Exploit Title: cgiemail local file inclusion # Vendor Homepage: http://web.mit.edu/wwwdev/cgiemail/webmaster.html # Software Link: http://web.mit.edu/wwwdev/cgiemail/cgiemail-1.6.tar.gz # Version: 1.6 and older # Date: 2016-09-2
LanSpy 2.0.0.155 - Local Buffer Overflow
  日期:2016-10-19 17:10:23 点击:21 评论:0
#!/usr/bin/python ### LanSpy 2.0.0.155 - Buffer Overflow Exploit by n30m1nd ### # Date: 2016-10-18 # Exploit Author: n30m1nd # Vendor Homepage: www.lantricks.com # Software Link: https://www.exploit-db.com/apps/42114d0f9e88ad76acaa0f145dabf923-lanspy
Pluck CMS 4.7.3 - Cross-Site Request Forgery (Add Page)
  日期:2016-10-19 16:27:08 点击:29 评论:0
# Exploit Title: Pluck CMS 4.7.3 - Add-Page Cross-Site Request Forgery # Exploit Author: Ahsan Tahir # Date: 18-10-2016 # Software Link: http://www.pluck-cms.org/?file=download # Vendor: http://www.pluck-cms.org/ # Google Dork: 2005-2016. pluck is av
Microsoft Windows (x86) - 'afd.sys' Privilege Escalation (MS11-046)
  日期:2016-10-19 16:22:22 点击:20 评论:0
/* ################################################################ # Exploit Title: Windows x86 (all versions) AFD privilege escalation (MS11-046) # Date: 2016-10-16 # Exploit Author: Tomislav Paskalev # Vulnerable Software: # Windows XP SP3 x86 # W
Microsoft Windows Diagnostics Hub - DLL Load Privilege Escalation (MS16-125)
  日期:2016-10-18 17:50:01 点击:104 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=887 Windows: Diagnostics Hub DLL Load EoP Platform: Windows 10 10586, not tested 8.1 Update 2 or Windows 7 Class: Elevation of Privilege Summary: The fix for CVE-2016-3231 is insuff
Ruby on Rails - Dynamic Render File Upload Remote Code Execution
  日期:2016-10-18 17:48:55 点击:50 评论:0
require 'msf/core' class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info =
Firefox 49.0.1 - Denial of Service
  日期:2016-10-18 17:47:56 点击:30 评论:0
''' #Hi guys #Title: Firefox 49.0.1 crash Denial of Service #Date: 15 Oct 2016 #Author: sultan albalawi #video: https://www.facebook.com/pentest3/videos/vb.100012552940568/199310163830747/?type=2theater #Tested on:win7 #Open link in firefox #Double c
Ruby on Rails Dynamic Render File Upload Remote Code Execution
  日期:2016-10-14 15:07:41 点击:35 评论:0
require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::Remote::HttpServer include Msf::Exploit::EXE include Msf::Exploit::FileDropper def initialize(info =
VOX Music Player 2.8.8 - '.pls' Denail of Service
  日期:2016-10-14 15:06:59 点击:28 评论:0
# Exploit Title: VOX Music Player 2.8.8 '.pls' Local Crash PoC # Date: 10-12-2016 # Exploit Author: Antonio Z. # Vendor Homepage: http://coppertino.com/vox/mac/ # Software Link: http://dl.devmate.com/com.coppertino.Vox/Vox.dmg # Version: 2.8.8 # Test
Subversion 1.6.6 / 1.6.12 - Code Execution
  日期:2016-10-13 16:00:32 点击:34 评论:0
# This is an exploit for the subversion vulnerability published as CVE-2013-2088. # Author: GlacierZ0ne ( kai@ktechnologies.de ) # Exploit Type: Code Execution # Access Type: Authenticated Remote Exploit # Prerequisites: svn command line client avail
HTA Web Server
  日期:2016-10-13 15:59:30 点击:27 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::HttpServer def initia
Powershell Payload Execution
  日期:2016-10-11 14:52:12 点击:50 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'msf/core/post/windows/services'require 'msf/core/post/windows/powershell'require 'msf/cor
Linux Kernel 3.13.1 Recvmmsg Privilege Escalation
  日期:2016-10-11 14:51:07 点击:49 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require msf/coreclass MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::E
Allwinner 3.4 Legacy Kernel Local Privilege Escalation
  日期:2016-10-11 14:50:20 点击:52 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require msf/coreclass MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include M
HP Client - Automation Command Injection / Remote Code Execution
  日期:2016-10-11 14:47:38 点击:25 评论:0
# Exploit Title: [HP Client - Automation Command Injection] # Date: [10/10/2016] # Exploit Author: [SlidingWindow] , Twitter: @kapil_khot # Vendor Homepage: [Previosuly HP, now http://www.persistentsys.com/ ] # Version: [Tested on version 7.9 but sho
Apache Tomcat 8/7/6 (RedHat-Based Distros) - Privilege Escalation
  日期:2016-10-11 14:46:47 点击:30 评论:0
============================================= - Discovered by: Dawid Golunski - http://legalhackers.com - dawid (at) legalhackers.com - CVE-2016-5425 - Release date: 10.10.2016 - Revision: 1 - Severity: High ==========================================
Billion Router 7700NR4 - Remote Command Execution
  日期:2016-10-08 16:02:26 点击:38 评论:0
# Title : Billion Router 7700NR4 Remote Root Command Execution # Date : 06/10/2016 # Author : R-73eN # Tested on: Billion Router 7700NR4 # Vendor : http://www.billion.com/ # Vulnerability Description: # This router is a widely used here in Albania.
Witbe - Remote Code Execution
  日期:2016-10-08 16:01:42 点击:43 评论:0
#!/usr/bin/python # Exploit Title: Witbe RCE (Remote Code Execution) # Exploit Author: BeLmar # Date: 05/10/2016 # DEMO : https://youtu.be/ooUFXfUfIs0 # Contact : hb.mz093@gmail.com # Vendor Homepage: http://www.witbe.net # Tested on: Windows7/10 Ba
共637页/12733条记录 首页 上一页 [103] [104] [105] 106 [107] [108] [109] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved