首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Disk Savvy Enterprise 9.0.32 - Buffer Overflow
  日期:2016-10-08 16:00:57 点击:25 评论:0
#!/usr/bin/python print Disk Savvy Enterprise 9.0.32 Buffer Overflow Exploit print Author: Tulpa / tulpa[at]tulpa-security[dot]com #Author website: www.tulpa-security.com #Author twitter: @tulpa_security #Exploit will land you NT AUTHORITYSYSTEM #Y
Disk Sorter Enterprise 9.0.24 - Buffer Overflow
  日期:2016-10-08 16:00:25 点击:15 评论:0
#!/usr/bin/python print Disk Sorter Enterprise 9.0.24 Buffer Overflow Exploit print Author: Tulpa / tulpa[at]tulpa-security[dot]com #Author website: www.tulpa-security.com #Author twitter: @tulpa_security #Exploit will land you NT AUTHORITYSYSTEM #
Dup Scout Enterprise 9.0.28 - Buffer Overflow
  日期:2016-10-08 15:59:52 点击:25 评论:0
#!/usr/bin/python print Dup Scout Enterprise 9.0.28 Buffer Overflow Exploit print Author: Tulpa / tulpa[at]tulpa-security[dot]com #Author website: www.tulpa-security.com #Author twitter: @tulpa_security #Exploit will land you NT AUTHORITYSYSTEM #Yo
Sync Breeze Enterprise 8.9.24 - Buffer Overflow
  日期:2016-10-08 15:59:11 点击:70 评论:0
#!/usr/bin/python print Sync Breeze Enterprise 8.9.24 Buffer Overflow Exploit print Author: Tulpa / tulpa[at]tulpa-security[dot]com #Author website: www.tulpa-security.com #Author twitter: @tulpa_security #Exploit will land you NT AUTHORITYSYSTEM #
VX Search Enterprise 9.0.26 - Buffer Overflow
  日期:2016-10-08 15:58:39 点击:22 评论:0
#!/usr/bin/python print VX Search Enterprise 9.0.26 Buffer Overflow Exploit print Author: Tulpa / tulpa[at]tulpa-security[dot]com #Author website: www.tulpa-security.com #Author twitter: @tulpa_security #Exploit will land you NT AUTHORITYSYSTEM #You
ISC BIND 9 - Denial of Service
  日期:2016-10-08 15:57:14 点击:28 评论:0
import socket import struct TARGET = ('192.168.200.10', 53) Q_A = 1 Q_TSIG = 250 DNS_MESSAGE_HEADERLEN = 12 def build_bind_nuke(question=x06googlex03comx00, udpsize=512): query_A = x8fx65x00x00x00x01x00x00x00x00x00x01 + question + int
Disk Pulse Enterprise 9.0.34 - Buffer Overflow
  日期:2016-10-08 15:56:27 点击:30 评论:0
#!/usr/bin/python print Disk Pulse Enterprise 9.0.34 Buffer Overflow Exploit print Author: Tulpa // tulpa[at]tulpa-security[dot]com #Author website: www.tulpa-security.com #Author twitter: @tulpa-security.com #Exploit will land you NT AUTHORITYSYST
Street Fighter 5 - 'Capcom.sys' Kernel Execution (Metasploit)
  日期:2016-10-08 15:55:47 点击:97 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'msf/core/post/windows/reflective_dll_injection' require 'rex' class MetasploitModule
Apache Tomcat 8/7/6 (Debian-Based Distros) - Privilege Escalation
  日期:2016-10-08 15:54:52 点击:45 评论:0
============================================= - Discovered by: Dawid Golunski - http://legalhackers.com - dawid (at) legalhackers.com - CVE-2016-1240 - Release date: 30.09.2016 - Revision: 1 - Severity: High =========================================
DWebPro 8.4.2 - Multiple Vulnerabilities
  日期:2016-10-08 15:54:01 点击:15 评论:0
# Exploit Title: DWebPro 8.4.2 Remote Binary Execution # Date: 01/10/2016 # Exploit Author: Tulpa # Contact: tulpa@tulpa-security.com # Author website: www.tulpa-security.com # Author twitter: @tulpa_security # Vendor Homepage: http://www.dwebpro.co
Grandsteam GXV3611_HD - SQL Injection
  日期:2016-10-08 15:53:02 点击:33 评论:0
# Exploit Title: Grandstream GXV3611_HD Telnet SQL Injection and backdoor command # Exploit Author: pizza1337 # Vendor Homepage: http://www.grandstream.com/ # Version: GXV3611_HD Core 1.0.3.6, 1.0.4.3 # GXV3611IR_HD Core 1.0.3.5 # Tested on: # -GXV3
KeepNote 0.7.8 - Command Execution
  日期:2016-09-30 17:38:09 点击:22 评论:0
# Title : KeepNote 0.7.8 Remote Command Execution # Date : 29/09/2016 # Author : R-73eN # Twitter : https://twitter.com/r_73en # Tested on : KeepNote 0.7.8 (Kali Linux , and Windows 7) # Software : http://keepnote.org/index.shtml#download # Vendor :
VLC Media Player 2.2.1 - Buffer Overflow
  日期:2016-09-29 15:25:36 点击:35 评论:0
Exploit Title: VLC Media Player 2.2.1 Buffer Overflow 2016-09-28 Author: sultan albalawi Software Link: https://www.videolan.org/vlc/releases/2.2.1.html Tested on:win7 video :https://www.facebook.com/pentest3/videos/vb.100012552940568/189735791454851
FreePBX < 13.0.188 - Remote Command Execution (Metasploit)
  日期:2016-09-28 14:33:54 点击:47 评论:0
#Title : Freepbx 13.0.188 , Remote root exploit #Vulnerable software : Freepbx 13.0.188 #Author : Ahmed Sultan (0x4148) #Email : 0x4148@gmail.com #Current software status : patch released #Vendor : Sangoma freepbx.org =begin Freepbx 13.x are vulnerab
Linux Kernel 4.6.3 Netfilter Privilege Escalation
  日期:2016-09-27 14:04:27 点击:70 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require msf/coreclass MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::E
Android Stagefright MP4 tx3g Integer Overflow
  日期:2016-09-27 14:03:12 点击:50 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Htt
Metasploit Web UI Static secret_key_base Value
  日期:2016-09-26 15:25:17 点击:55 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking #Helper Classes copy/paste fro
Metasploit Web UI - Diagnostic Console Command Execution
  日期:2016-09-23 15:28:02 点击:154 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remo
Kerberos in Microsoft Windows - Security Feature Bypass (MS16-101)
  日期:2016-09-23 15:27:07 点击:30 评论:0
# Exploit Title: Kerberos Security Feature Bypass Vulnerability (Kerberos to NTLM Fallback) # Date: 22-09-2016 # Exploit Author: Nabeel Ahmed # Tested on: Windows 7 Professional (x32/x64) and Windows 10 x64 # CVE : CVE-2016-3237 # Category: Local Exp
Microsoft Internet Explorer 11 CORS Disrespect
  日期:2016-09-23 15:25:53 点击:92 评论:0
IE11 is not following CORS specification for local files like Chromeand Firefox.I've contacted Microsoft and they say this is not a security issue soI'm sharing it.From my tests IE11 is not following CORS specifications for localfiles as supposed to
共637页/12733条记录 首页 上一页 [104] [105] [106] 107 [108] [109] [110] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved