首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Microsoft Windows - AFD.SYS Dangling Pointer Privilege Escalation (MS14-040)
  日期:2016-02-16 15:30:09 点击:92 评论:0
# Exploit Title: MS14-040 - AFD.SYS Dangling Pointer # Date: 2016-02-05 # Exploit Author: Rick Larabee # Vendor Homepage: www.microsoft.com # Version: Windows 7, 32 bit # Tested on: Win7 x32 # afd.sys - 6.1.7600.16385 # ntdll.dll - 6.1.7600.16385 # #
JMX2 Email Tester Remote Shell Upload
  日期:2016-02-16 15:28:21 点击:41 评论:0
# Exploit Title: JMX2 Email Tester - Web Shell Upload(save_email.php)# Date: 2016-02-15# Blog: http://www.hahwul.com# Vendor Homepage: https://github.com/johnfmorton/jmx2-Email-Tester# Software Link: https://github.com/johnfmorton/jmx2-Email-Tester/
Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow Exploit
  日期:2016-02-15 17:22:02 点击:146 评论:0
#!/usr/bin/env python # # # Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow Exploit # # # Vendor: Delta Electronics, Inc. # Product web page: http://www.delta.com.tw # Software link: http://www.delta.com.tw/product/em/download/down
Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder
  日期:2016-02-14 15:24:26 点击:31 评论:0
Wieland wieplan 4.1 Document Parsing Java Code Execution Using XMLDecoder Vendor: Wieland Electric GmbH Product web page: http://www.wieland-electric.com Affected version: 4.1 (Build 9) Summary: Your new software for the configuration of Wieland term
D-Link DCS-930L Authenticated Remote Command Execution
  日期:2016-02-14 15:22:38 点击:49 评论:0
## ## This module requires Metasploit: http://metasploit.com/download ## Current source: https://github.com/rapid7/metasploit-framework ### require 'msf/core' class Metasploit3 Msf::Exploit::Remote include Msf::Exploit::Remote::Telnet include Msf::Ex
Microsoft Windows WebDAV - BSoD PoC (MS16-016)
  日期:2016-02-14 15:20:22 点击:227 评论:0
/* Source: https://github.com/koczkatamas/CVE-2016-0051 Proof-of-concept BSoD (Blue Screen of Death) code for CVE-2016-0051 (MS-016). Full Proof of Concept: https://github.com/koczkatamas/CVE-2016-0051/archive/master.zip https://github.com/offensive-
FTPShell Client 5.24 - (Create NewFolder) Local Buffer Overflow Exploit
  日期:2016-02-14 15:16:21 点击:22 评论:0
#[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] #[+] Exploit Title: FTPShell Client (Add New Folder) Local Buffer Overflow #[+] Date: 2/2/2016 #[+]Exploit Author: Arash Khazaei #[+] Vendor Homepage: www.ftpshell.com #[+]Sof
Oracle 9i XDB FTP Pass Overflow Exploit
  日期:2016-02-14 15:14:41 点击:45 评论:0
''' Oracle 9i XDB FTP PASS Overflow (win32) Ported to python from the Metasploit oracle9i_xdb_ftp_pass.rb exploit Original exploit: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/ftp/oracle9i_xdb_ftp_pass.rb Desc
Baumer VeriSens Application Suite 2.6.2 - Buffer Overflow Vulnerability
  日期:2016-02-14 15:13:44 点击:164 评论:0
#!/usr/bin/env python # # # Baumer VeriSens Application Suite 2.6.2 Buffer Overflow Vulnerability # # # Vendor: Baumer Holding AG | Baumer Optronic GmbH # Product web page: http://www.baumer.com # Software link: http://www.baumer.com/us-en/products/
yTree 1.94-1.1 - Local Buffer Overflow Exploit
  日期:2016-02-14 15:12:14 点击:35 评论:0
# Program affected: yTree - File manager for terminals v1.94-1.1 # Description: yTree is prone to a stack-based overflow, an attacker could exploit # this issue to execute arbitrary code in the context of the application. # Failed exploit attempts w
Toshiba Viewer v2 p3console - Local Denial of Service Vulnerability
  日期:2016-02-14 14:59:05 点击:122 评论:0
#!/usr/bin/perl # Exploit Title: Toshiba viewer v2 p3console Local Denial of Service # Date: 02-02-2016 # Author: JaMbA # Download: http://business.toshiba.com/downloads/KB/f1Ulds/9942/viewer2-cj242-v106.zip # Version: 2 # Tested on: Windows 7 my $f
OS X - IOHDIXControllerUserClient::convertClientBuffer Integer Overflow
  日期:2016-02-14 14:58:22 点击:123 评论:0
/* Source: https://code.google.com/p/google-security-research/issues/detail?id=511 Method 5 of the IOHDIXController user client is createDrive64. This takes a 0x100 byte structure input from which it reads a userspace pointer and a size which it pass
OS X - OSMetaClassBase::safeMetaCast in IOAccelContext2::connectClient Exploitab
  日期:2016-02-14 14:57:43 点击:79 评论:0
/* Source: https://code.google.com/p/google-security-research/issues/detail?id=512 IOUserClient::connectClient is an obscure IOKit method which according to the docs is supposed to Inform a connection of a second connection. In fact IOKit provides no
iOS and OS X - NECP System Control Socket Packet Parsing Kernel Code Execution I
  日期:2016-02-14 14:56:51 点击:58 评论:0
/* Source: https://code.google.com/p/google-security-research/issues/detail?id=543 NKE control sockets are documented here: https://developer.apple.com/library/mac/documentation/Darwin/Conceptual/NKEConceptual/control/control.html By default there ar
OS X and iOS Unsandboxable Kernel Use-After-Free in Mach Vouchers
  日期:2016-02-14 14:54:49 点击:61 评论:0
/* Source: https://code.google.com/p/google-security-research/issues/detail?id=553 The mach voucher subsystem fails to correctly handle spoofed no-more-senders messages. ipc_kobject_server will be called for mach messages sent to kernel-owned mach po
OS X - IOSCSIPeripheralDeviceType00 Userclient Type 12 Exploitable Kernel NULL D
  日期:2016-02-14 14:54:04 点击:187 评论:0
/* Source: https://code.google.com/p/google-security-research/issues/detail?id=562 Opening userclient type 12 of IOSCSIPeripheralDeviceType00 leads to an exploitable kernel NULL dereference. Tested on OS X 10.11 ElCapitan (15a284) on MacBookAir5,2 */
OS X Kernel - Hypervisor Driver Use-After-Free
  日期:2016-02-14 14:52:56 点击:42 评论:0
/* Source: https://code.google.com/p/google-security-research/issues/detail?id=580 The hv_space lock group gets an extra ref dropped when you kill a process with an AppleHV userclient; one via IOService::terminateWorker calling the AppleHVClient::fre
Android sensord Local Root Exploit
  日期:2016-01-28 15:09:42 点击:475 评论:0
/* * Android sensord 0day root exploit by s0m3b0dy * tested on LG L7 (PL) * * * need pentests? s0m3b0dy1(at)gmail.com * * * * * * * * * * * * * * * * * * * * * * * * * * * some Android devices have sensord deamon, * for some ROMs the deamon is runnin
CesarFTP 0.99g - XCWD Denial of Service Exploit
  日期:2016-01-28 15:05:21 点击:31 评论:0
#!/usr/bin/env python #-*- coding:utf-8 -*- # Exploit Title : CesarFTP 0.99g -(XCWD)Remote BoF Exploit # Discovery by : Irving Aguilar # Email : im.aguilar@protonmail.ch # Discovery Date : 18.01.2016 # Tested Version : 0.99g # Vulnerability Type : D
Glassfish Server - Arbitrary File Read Vulnerability
  日期:2016-01-27 14:35:41 点击:66 评论:0
# Title: glassfish Arbitrary file read vulnerability # Date : 01/15/2016 # Author: bingbing # Software link: https://glassfish.java.net/download.html # Software: GlassFish Server # Tested: Windows 7 SP1 64bits #!/usr/bin/python import urllib2 respons
共637页/12733条记录 首页 上一页 [124] [125] [126] 127 [128] [129] [130] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved