首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
IBM AIX 6.1.8+ Privilege Escalation
  日期:2014-06-12 11:32:21 点击:36 评论:0
Vulnerability title: Privilege Escalation in IBM AIXCVE: CVE-2014-3977Vendor: IBMProduct: AIXAffected version: 6.1.8 and laterFixed version: N/AReported by: Tim BrownDetails:It has been identified that libodm allows privilege escalation viaarbitrary
Openfiler NAS/SAN Appliance 2.99 XSS / Traversal / Command Injection
  日期:2014-06-12 11:31:12 点击:100 评论:0
#Tested on Openfiler NAS/SAN Appliance version 2.99#Author: MiDoveteMollare#Date: 10 June 2014OS Command Injection (after authentication) #1page: services_iscsi_target.htmlparamenter: passwordPOST /admin/services_iscsi_target.html HTTP/1.1Host: IP:4
Madness Pro <= 1.14 - SQL Injection
  日期:2014-06-09 10:46:00 点击:24 评论:0
#!/usr/bin/env python2 # -*- coding: utf-8 -*- # Exploit Title: Madness Pro = 1.14 SQL injection # Date: June 05, 2014 # Exploit Author: @botnet_hunter # Version: 1.14 # Tested on: Apache2 - Ubuntu - MySQL # ▄▄▌ ▄▄▄▄ ▄▄▄▄▄ ▌ ▄ . ▄ ▄
Madness Pro <= 1.14 - Persistent XSS
  日期:2014-06-09 10:45:20 点击:18 评论:0
#!/usr/bin/env python2 # -*- coding: utf-8 -*- # Exploit Title: Madness Pro = 1.14 Persistent XSS # Date: June 05, 2014 # Exploit Author: @botnet_hunter # Version: 1.14 # Tested on: Apache2 - Ubuntu - MySQL # ▄▄▌ ▄▄▄▄ ▄▄▄▄▄ ▌ ▄ . ▄ ▄
Sagem 2604 Password Disclosure
  日期:2014-06-09 10:44:23 点击:32 评论:0
[+]Title: Sagem 2604 Password Discolusre vulnerability[+]Author: TUNISIAN CYBER[+]Date: 6/JUN/2014[+]Type:WebApp[+]Risk:High[+]Affected Version: v2604 Hardware Version:253251193 Software Version:3.21a4G[+]Overview:Sagem modem suffers, from a passwor
linux/x86 Netcat Shellcode 58 bytes
  日期:2014-06-09 10:43:37 点击:71 评论:0
/* # Linux x86 /bin/nc -le /bin/sh -vp 17771 shellcode # This shellcode will listen on port 17771 and give you /bin/sh # Date: 31.05.2014 # Shellcode Author: Oleg Boytsev # Tested on: Debian GNU/Linux 7/i686 # Shellcode Length: 58 # For education pu
Google Compute Engine Lateral Compromise
  日期:2014-06-03 11:07:56 点击:133 评论:0
A user who creates a GCE VM with compute-rw privileges, whosubsequently has that single VM compromised, can lead to a globalcompromise of all VMs inside of the account.VMs created in the web UI, by default, come with compute-rw privileges.Googles ac
dbus-glib pam_fprintd - Local Root Exploit
  日期:2014-06-03 10:59:51 点击:99 评论:0
/* darklena. fprintd/pam_fprintd local root PoC. However dbus-glib plays an important role. * * (C) 2013 Sebastian Krahmer, all rights reversed. * * pam_fprintd uses net.reactivated.Fprint service to trigger finger swiping and * registers DBUS signa
Easy File Management Web Server v5.3 - UserID Remote Buffer Overflow (ROP)
  日期:2014-06-03 10:57:53 点击:47 评论:0
#!/usr/bin/python # Exploit Title: Easy File Management Web Server v5.3 - USERID Remote Buffer Overflow (ROP) # Version: 5.3 # Date: 2014-05-31 # Author: Julien Ahrens (@MrTuxracer) # Homepage: http://www.rcesecurity.com # Software Link: http://www.
Ubuntu 12.04.0-2LTS x64 perf_swevent_init - Kernel Local Root Exploit
  日期:2014-06-03 10:56:04 点击:128 评论:0
/** * Ubuntu 12.04 3.x x86_64 perf_swevent_init Local root exploit * by Vitaly Nikolenko (vnik5287@gmail.com) * * based on semtex.c by sd * * Supported targets: * [0] Ubuntu 12.04.0 - 3.2.0-23-generic * [1] Ubuntu 12.04.1 - 3.2.0-29-generic * [2] Ub
ElasticSearch Dynamic Script Arbitrary Java Execution
  日期:2014-06-03 10:53:18 点击:346 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::H
Microsoft Internet Explorer 11 - WeakMap Integer Divide-by-Zero
  日期:2014-06-03 10:51:41 点击:71 评论:0
!-- # Exploit title: Microsoft Internet Explorer 11 - WeakMap Integer divide-by-zero DoS # Date: 29.05.2014 # Vulnerable version: 11 # Tested on: Windows 7/8 # Author: Pawel Wylecial # http://h0wl.pl @h0wlu -- html script var a = [new WeakMap]; a.pu
Wireshark CAPWAP Dissector - Denial of Service (msf)
  日期:2014-05-29 10:28:55 点击:52 评论:0
# # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Auxiliary include Msf::Exploit::Remote::Udp include Msf::Auxiliary::Dos
TORQUE Resource Manager 2.5.x-2.5.13 - Stack Based Buffer Overflow Stub
  日期:2014-05-29 10:27:59 点击:53 评论:0
#!/usr/bin/env python # Exploit Title: TORQUE Resource Manager 2.5.x-2.5.13 stack based buffer overflow stub # Date: 27 May 2014 # Exploit Author: bwall - @botnet_hunter # Vulnerability discovered by: MWR Labs # CVE: CVE-2014-0749 # Vendor Homepage:
Easy File Sharing FTP Server 3.5 - Stack Buffer Overflow
  日期:2014-05-28 11:19:46 点击:55 评论:0
#!/usr/bin/env python # Exploit Title: Easy File Sharing FTP Server 3.5 stack buffer overflow # Date: 27 May 2014 # Exploit Author: superkojiman - http://www.techorganic.com # Vulnerability discovered by: h07 # CVE: CVE-2006-3952 # OSVDB: 27646 # Ve
Core FTP Server Version 1.2, build 535, 32-bit - Crash P.O.C.
  日期:2014-05-26 09:57:49 点击:52 评论:0
#!/usr/bin/python import socket,sys,time def Usage(): print ( Core FTP Server Version 1.2, build 535, 32-bit - Crash P.O.C. ) print ( Usage: ./coreftp_dos.py host port username password ) print ( Ex: ./coreftp_dos.py 192.168.10.10 21 ftp ftpn ) if
Dotclear Media Manager Authenticated Arbitrary File Upload
  日期:2014-05-23 11:01:47 点击:89 评论:0
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpCl
LL Page Mitigations On Windows 8 x86
  日期:2014-05-23 10:59:36 点击:60 评论:0
/* Apparently I'm being lured into pointless discussions today, so here's another. As I'm sure everyone is aware, Microsoft introduced basic NULL page mitigations for Windows 8 (both x86 and x64), and even backported the mitigation to Vista+ (On x64
Easy Address Book Web Server 1.6 - Stack Buffer Overflow
  日期:2014-05-22 11:12:16 点击:34 评论:0
#!/usr/bin/env python # Exploit Title: Easy Address Book Web Server 1.6 stack buffer overflow # Date: 19 May 2014 # Exploit Author: superkojiman - http://www.techorganic.com # Vendor Homepage: http://www.efssoft.com/web-address-book-server.html # So
Easy File Management Web Server 5.3 - Stack Buffer Overflow
  日期:2014-05-22 11:11:38 点击:30 评论:0
#!/usr/bin/env python # Exploit Title: Easy File Management Web Server 5.3 stack buffer overflow # Date: 19 May 2014 # Exploit Author: superkojiman - http://www.techorganic.com # Vendor Homepage: http://www.efssoft.com # Software Link: http://www.we
共637页/12733条记录 首页 上一页 [173] [174] [175] 176 [177] [178] [179] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved