首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Inteno DG301 Remote Command Execution
  日期:2014-02-10 16:01:04 点击:203 评论:0
#!/usr/bin/python ################################################################ # # # Inteno DG301 Command Injection PoC # # # # Vulnerable version: Powered by LuCI Trunk (inteno-1.0.34) # # OpenWrt Backfire 10.03.1-RC6 # # # # Written by Juan J.
Android Browser and WebView addJavascriptInterface Code Execution
  日期:2014-02-10 15:57:46 点击:130 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote include Msf::Exploit::Remote::BrowserExploitServer incl
Pandora FMS Remote Code Execution
  日期:2014-02-10 15:56:45 点击:55 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::H
Asseco SEE iBank FX Client 2.0.9.3 - Local Privilege Escalation Vulnerability
  日期:2014-02-10 15:55:37 点击:96 评论:0
Asseco SEE iBank FX Client = 2.0.9.3 Local Privilege Escalation Vulnerability Vendor: Asseco SEE Product web page: http://www.asseco.com Affected version: 2.0.9.3 (Build 22.06.2011) - Desktop/Enterprise Edition 1.2 1.1.5.1270 (Service Pack 5) - Desk
OneHTTPD 0.8 - Crash PoC
  日期:2014-02-10 15:53:57 点击:28 评论:0
# Exploit Title: onehttpd 0.8 Crash PoC # Date: Feb 7,2014 # Exploit Author: Mahmod Mahajna (Mahy) # Version: 0.8 # Software Link: https://onehttpd.googlecode.com/files/onehttpd-0.8.exe # Tested on: Windows XP SP3 # Email: m.dofo123@gmail.com from re
VLC 2.1.2 (.asf) - Crash PoC
  日期:2014-02-10 15:52:54 点击:63 评论:0
#!/usr/bin/python # VLC Media Player up to 2.1.2 DOS POC Integer Division By zero in ASF Demuxer # VLC Media Player is prone to DOS utilizing a division by zero error if minimium data packet size # is equal to zero. this was tested on windows XP sp3
XnView 1.92.1 Command-Line Arguments Buffer Overflow Vulnerability
  日期:2014-02-10 15:51:51 点击:54 评论:0
source: http: //www.securityfocus.com/bid/28259/info XnView is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers may exploit thi
Apache Struts Developer Mode OGNL Execution Exploit
  日期:2014-02-10 15:50:47 点击:98 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::H
SkyBlueCanvas CMS Remote Code Execution Exploit
  日期:2014-02-10 15:49:40 点击:15 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::H
Apache Tomcat Manager Code Execution Exploit
  日期:2014-02-10 15:46:58 点击:198 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking HttpFingerprint = { :pattern =
Linux kernel 3.4+ Arbitrary write with CONFIG_X86_X32
  日期:2014-02-10 15:45:17 点击:114 评论:0
/* * Local root exploit for CVE-2014-0038. * * https://raw.github.com/saelo/cve-2014-0038/master/timeoutpwn.c * * Bug: The X86_X32 recvmmsg syscall does not properly sanitize the timeout pointer * passed from userspace. * * Exploit primitive: Pass a
Linux kernel 3.4+ local root (CONFIG_X86_X32=y)
  日期:2014-02-10 15:43:24 点击:157 评论:0
/* *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* recvmmsg.c - linux 3.4+ local root (CONFIG_X86_X32=y) CVE-2014-0038 / x32 ABI with recvmmsg by rebel @ irc.smashthestack.org ----------------------------------- takes about 13 minutes
Linux 3.4+ recvmmsg x32 compat Proof of Concept
  日期:2014-02-10 15:42:20 点击:81 评论:0
/* * PoC trigger for the linux 3.4+ recvmmsg x32 compat bug, based on the manpage * * https://code.google.com/p/chromium/issues/detail?id=338594 * * $ while true; do echo $RANDOM /dev/udp/127.0.0.1/1234; sleep 0.25; done */ #define _GNU_SOURCE #incl
PCMAN FTP 2.07 CWD Command - Buffer Overflow Exploit
  日期:2014-02-10 15:41:31 点击:59 评论:0
# Exploit Title: PCMAN FTP 2.07 CWD Command Buffer Overflow # Date: Jan 25,2014 # Exploit Author: Mahmod Mahajna (Mahy) # Version: 2.07 # Tested on: Windows 7 sp1 x64 (english) # Email: m.dofo123@gmail.com import socket as s from sys import argv # i
haneWIN DNS Server 1.5.3 - Buffer Overflow Exploit (SEH)
  日期:2014-02-10 15:40:29 点击:104 评论:0
#!/usr/bin/python # Exploit Title: haneWIN DNS Server (SEH) # Author: Dario Estrada (dash) https://intrusionlabs.org # Date: 2014-01-29 # Version: haneWIN DNS Server 1.5.3 # Vendor Homepage: http://www.hanewin.net/ # Vulnerable app link: http://www.
PCMAN FTP 2.07 ABOR Command - Buffer Overflow Exploit
  日期:2014-02-10 15:39:39 点击:45 评论:0
# Exploit Title: PCMAN FTP 2.07 ABOR Command Buffer Overflow # Date: Jan 25,2014 # Exploit Author: Mahmod Mahajna (Mahy) # Version: 2.07 # Tested on: Windows 7 sp1 x64 (english) # Email: m.dofo123@gmail.com import socket as s from sys import argv #
Oracle Forms and Reports 11.1 - Remote Exploit
  日期:2014-02-10 15:22:19 点击:50 评论:0
require 'uri' require 'open-uri' require 'openssl' #OpenSSL::SSL::VERIFY_PEER = OpenSSL::SSL::VERIFY_NONE def upload_payload(dest) url = #{@url}/reports/rwservlet?report=test.rdf+desformat=html+destype=file+desname=/#{dest}/images/#{@payload_name}+J
Motorola SBG6580 Cable Modem & Wireless Router - DoS Reboot
  日期:2014-01-29 11:00:05 点击:53 评论:0
# Exploit Title: Motorola SBG6580 Cable Modem Wireless-N Router Denial of Service # Date: 01/03/14 # Exploit Author: nicx0 # Vendor Homepage: http://www.motorola.com/ # Software Link: http://www.motorola.com/us/SBG6580-SURFboard%C2%AE-eXtreme-Wirele
Nitro Pro Remote Code Execution Exploit
  日期:2014-01-29 10:48:02 点击:34 评论:0
#!usrbinenv python # Exploit Title: Nitro Pro Remote Code Execution Exploit # Date: 2013/03/15 # Exploit Author: Mr.XHat # Discovered By: Mr.XHat # Vendor Homepage: http://www.nitropdf.com/ # Software Link: http://www.rodfile.com/8178ciy92vu7 # V
Simple E-Document Arbitrary File Upload Exploit
  日期:2014-01-29 10:36:56 点击:35 评论:0
## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::H
共637页/12733条记录 首页 上一页 [184] [185] [186] 187 [188] [189] [190] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved