首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
FreeBSD Kernel Crash / Code Execution / Disclosure
  日期:2015-01-28 14:54:40 点击:50 评论:0
Core Security - Corelabs Advisoryhttp://corelabs.coresecurity.com/FreeBSD Kernel Multiple Vulnerabilities1. *Advisory Information*Title: FreeBSD Kernel Multiple VulnerabilitiesAdvisory ID: CORE-2015-0003Advisory URL: http://www.coresecurity.com/cont
Qualys Security Advisory - glibc gethostbyname Buffer Overflow
  日期:2015-01-28 14:52:24 点击:107 评论:0
Qualys Security Advisory CVE-2015-0235GHOST: glibc gethostbyname buffer overflow--[ Contents ]----------------------------------------------------------------1 - Summary2 - Analysis3 - Mitigating factors4 - Case studies5 - Exploitation6 - Acknowledg
D-Link DSL-2740R - Unauthenticated Remote DNS Change Exploit
  日期:2015-01-28 14:40:39 点击:27 评论:0
#!/bin/bash # # D-Link DSL-2740R Unauthenticated Remote DNS Change Exploit # # Copyright 2015 (c) Todor Donev todor.donev at gmail.com # http://www.ethical-hacker.org/ # # Description: # Different D-Link Routers are vulnerable to DNS change. # The vu
Symantec Data Center Security - Multiple Vulnerabilities
  日期:2015-01-27 11:36:38 点击:80 评论:0
SEC Consult Vulnerability Lab Security Advisory 20150122-0 ======================================================================= title: Multiple critical vulnerabilities products: Symantec Data Center Security: Server Advanced (SDCS:SA) Symantec Cr
PHP Webquest 2.6 - SQL Injection
  日期:2015-01-27 11:34:56 点击:54 评论:0
# Exploit Title: sql injection # Google Dork: inurl:webquest/soporte_horizontal_w.php?id_actividad= # Date: [24/01/2015] # Exploit Author: [jord4nroo7] anonjo@aol.com # Vendor Homepage: [http://phpwebquest.org] # Software Link: [http://phpwebquest.o
Comodo Backup 4.4.0.0 - NULL Pointer Dereference EOP
  日期:2015-01-27 11:30:51 点击:44 评论:0
/* Exploit Title - Comodo Backup Null Pointer Dereference Privilege Escalation Date - 23rd January 2015 Discovered by - Parvez Anwar (@parvezghh) Vendor Homepage - https://www.comodo.com Tested Version - 4.4.0.0 Driver Version - 1.0.0.957 - bdisk.sy
Android WiFi-Direct Denial of Service
  日期:2015-01-27 11:29:09 点击:180 评论:0
Core Security - Corelabs Advisory http://corelabs.coresecurity.com/ Android WiFi-Direct Denial of Service 1. *Advisory Information* Title: Android WiFi-Direct Denial of Service Advisory ID: CORE-2015-0002 Advisory URL: http://www.coresecurity.com/ad
Zhone GPON 2520 R4.0.2.566b - Crash PoC
  日期:2015-01-27 11:24:00 点击:51 评论:0
from httplib2 import Http from urllib import urlencode import sys,time #main function if __name__ == __main__ : if (len(sys.argv) != 2): print '*********************************************************************************' print ' GPON Zhone R4.
Cisco Ironport Appliances Privilege Escalation Exploit
  日期:2015-01-26 15:02:09 点击:68 评论:0
#include stdio.h #include stdlib.h #include string.h #include ctype.h #include md5.h #include getopt.h #define MAX_BUFFER 128 #define SECRET_PASS woofwoof void usage( char *name); void to_lower( char *str); void fuzz_string( char *str); int main( in
libpng 1.6.15 Heap Overflow Exploit
  日期:2015-01-26 15:00:42 点击:91 评论:0
/********************************* * Alex Eubanks * * endeavor@rainbowsandpwnies.com * * libpng 1.6.15 heap overflow * * 18 December 2014 * *********************************/ /************* * A foreword * *************/ // this bug was found with am
Windows < 8.1 (32/64 bit) - Privilege Escalation (User Profile Service) (MS15-00
  日期:2015-01-26 14:58:50 点击:63 评论:0
## Source: https://code.google.com/p/google-security-research/issues/detail?id=123Platform: Windows 8.1 Update 32/64 bit (No other OS tested)When a user logs into a computer the User Profile Service is used to create certain directories and mount th
Crystal Player 1.99 - Memory Corruption Vulnerability
  日期:2015-01-26 14:57:42 点击:18 评论:0
Document Title: =============== Crystal Player 1.99 - Memory Corruption Vulnerability Date: ============= 21/01/2015 Vendor Homepage: ================ http://www.crystalreality.com/ Abstract Advisory Information: ============================== Memory
Arris VAP2500 tools_command.php Command Execution
  日期:2015-01-23 17:00:58 点击:45 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::HttpClie
Symantec SDCS:SA / SCSP XSS / Bypass / SQL Injection / Disclosure
  日期:2015-01-23 17:00:04 点击:97 评论:0
SEC Consult Vulnerability Lab Security Advisory 20150122-0 ======================================================================= title: Multiple critical vulnerabilities products: Symantec Data Center Security: Server Advanced (SDCS:SA) Symantec C
Exif Pilot 4.7.2 Buffer Overflow Exploit
  日期:2015-01-22 10:56:36 点击:40 评论:0
#!/usr/bin/env ruby # Exploit Title: Exif Pilot SEH Based Buffer Overflow # Version: version 4.7.2 # Download: http://www.colorpilot.com/load/exif.exe # Tested on: Windows XP sp2 # Exploit Author: Osanda M. Jayathissa # E-Mail: osanda[cat]unseen.is
GetGo Download Manager HTTP Response Buffer Overflow
  日期:2015-01-21 12:35:14 点击:18 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Seh incl
Microsoft Windows NtApphelpCacheControl Improper Authorization Check
  日期:2015-01-21 12:34:19 点击:22 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'msf/core/post/windows/reflective_dll_injection'class Metasploit3 Msf::Exploit::Local Rank
OS X 10.9.5 IOKit IntelAccelerator NULL Pointer Dereference
  日期:2015-01-21 12:28:09 点击:104 评论:0
// clang -o ig_2_3_exploit ig_2_3_exploit.c -framework IOKit -framework CoreFoundation -m32 -D_FORTIFY_SOURCE=0 // ianbeer #include stdint.h #include stdio.h #include stdlib.h #include sys/mman.h #include sys/stat.h #include unistd.h #include CoreFou
OS X networkd "effective_audit_token" XPC Type Confusion Sandbox Escape
  日期:2015-01-21 12:27:06 点击:85 评论:0
// Requires Lorgnette: https://github.com/rodionovd/liblorgnette // clang -o networkd_exploit networkd_exploit.c liblorgnette/lorgnette.c -framework CoreFoundation // ianbeer #include dlfcn.h #include stdint.h #include stdio.h #include stdlib.h #inc
OS X 10.10 IOKit IntelAccelerator NULL Pointer Dereference
  日期:2015-01-21 12:25:44 点击:41 评论:0
#include fcntl.h #include stdio.h #include stdlib.h #include string.h #include IOKit/IOKitLib.h int main(){ kern_return_t err; CFMutableDictionaryRef matching = IOServiceMatching(IntelAccelerator); if(!matching){ printf(unable to create service match
共637页/12733条记录 首页 上一页 [154] [155] [156] 157 [158] [159] [160] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved