首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
Hashicorp vagrant-vmware-fusion 5.0.0 - Local root Privilege Escalation
  日期:2017-12-06 17:13:49 点击:3 评论:0
# After three CVEs and multiple exploits disclosed to Hashicorp they have finally upped their game with this plugin. Now the previously vulnerable non-root-owned # ruby code that get executed as root by the sudo helper is no more and the sudo helper
Sera 1.2 - Local root Privilege Escalation / Password Disclosure
  日期:2017-12-06 17:12:59 点击:2 评论:0
# Sera is a free app for mac and iOS that lets you unlock your mac automatically # when your iphone is within a configured proximity. # Unfortunately to facilitate this it stores the users login password in their # home directory at: # ~/Library/Pref
Hashicorp vagrant-vmware-fusion 5.0.1 - Local root Privilege Escalation
  日期:2017-12-06 17:12:11 点击:3 评论:0
# I recently blogged about how the installation process of version 5.0.0 of this # plugin could be hihacked by a local attacker or malware in order to escalate # privileges to root. Hashicorp pushed some mitigations for this issue fairly # quickly bu
Hashicorp vagrant-vmware-fusion 5.0.3 - Local root Privilege Escalation
  日期:2017-12-06 17:11:22 点击:1 评论:0
# Another day, another root privesc bug in this plugin. Not quite so serious this # time - this one is only exploitable if the user has the plugin installed but # VMware Fusion *not* installed. This is a fairly unlikely scenario but it's a # straight
Arq 5.9.6 - Local root Privilege Escalation
  日期:2017-12-06 17:10:38 点击:3 评论:0
# Arq Backup from Haystack Software is a great application for backing up macs and # windows machines. Unfortunately versions of Arq for mac before 5.9.7 are # vulnerable to a local root privilege escalation exploit. # The updater binary has a setper
Murus 1.4.11 - Local root Privilege Escalation
  日期:2017-12-06 17:09:50 点击:2 评论:0
# I recently blogged about the prevalence of escalation hijack vulnerabilities amongst macOS applications. One example of this is the latest version of Murus # firewall. By design it requires the user to authenticate every time in order to obtain the
Arq 5.9.7 - Local root Privilege Escalation
  日期:2017-12-06 17:08:58 点击:2 评论:0
=begin As well as the other bugs affecting Arq = 5.9.6 there is also another issue with the suid-root restorer binaries in Arq for Mac. There are three of them and they are used to execute restores of backed up files from the various cloud providers.
WinduCMS 3.1 - Local File Disclosure
  日期:2017-12-06 17:08:05 点击:3 评论:0
#!/usr/bin/python # # Exploit Title: WinduCMS = 3.1 - Local File Disclosure # Date: 2017-12-03 # Exploit Author: Maciek Krupa # Vendor Homepage: http://windu.org # Version: 3.1 # Tested on: Linux Debian 9 # # // Description // # # Local File Disclosu
VX Search 10.2.14 - 'command_name' Buffer Overflow
  日期:2017-12-06 17:02:30 点击:5 评论:0
#!/usr/bin/python print *** VX Search Enterprise v10.2.14 Buffer Overflow (SEH) ***n # Exploit Title : VX Search Enterprise v10.2.14 Buffer Overflow (SEH) # Discovery by : W01fier00t # Twitter : @wolfieroot # Discovery Date : 22/11/2017 # Software L
Abyss Web Server < 2.11.6 - Heap Memory Corruption
  日期:2017-12-04 14:54:17 点击:15 评论:0
[+] Credits: John Page (aka HyP3rlinX) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/ABYSS-WEB-SERVER-MEMORY-HEAP-CORRUPTION.txt [+] ISR: ApparitionSec Vendor: ========== aprelium.com Product: =========
Artica Web Proxy 3.06 - Remote Code Execution
  日期:2017-12-04 14:53:33 点击:12 评论:0
[+] Credits: John Page (aka Hyp3rlinX) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt [+] ISR: ApparitionSec Vendor: ======= www.articatech
MistServer 2.12 - Cross-Site Scripting
  日期:2017-12-04 14:52:15 点击:4 评论:0
[+] Credits: John Page (aka Hyp3rlinX) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt [+] ISR: ApparitionSec Vendor: ============= mist
WinduCMS 3.1 Local File Disclosure
  日期:2017-12-04 14:51:12 点击:4 评论:0
#!/usr/bin/python## Exploit Title: WinduCMS = 3.1 - Local File Disclosure# Date: 2017-12-03# Exploit Author: Maciek Krupa# Vendor Homepage: http://windu.org# Version: 3.1# Tested on: Linux Debian 9## // Description //# # Local File Disclosure vulner
SocuSoft Co. Photo 2 Video Converter 8.0.0 Code Execution / DoS
  日期:2017-12-04 14:50:18 点击:2 评论:0
================================================================================= _ _____ _____ _____ | | | _ | |____ | |____ | | |__ | |/' |_ __ ___ / / ___ _ __ / /_ __ | '_ | /| | '_ ` _ / __| '__| / / / | | | |_/ / | | | | |.___/
aws-cfn-bootstrap Local Code Execution
  日期:2017-12-04 14:31:40 点击:3 评论:0
aws-cfn-bootstrap local code execution as root==============================================The latest version of this advisory is available at:https://sintonen.fi/advisories/aws-cfn-bootstrap-local-code-execution-as-root.txtOverview--------AWS EC2
HP iMC Plat 7.2 - Remote Code Execution
  日期:2017-12-04 14:30:40 点击:7 评论:0
#!/opt/local/bin/python2.7 # Exploit Title: HP iMC Plat 7.2 dbman Opcode 10008 Command Injection RCE # Date: 11-29-2017 # Exploit Author: Chris Lyne (@lynerc) # Vendor Homepage: www.hpe.com # Software Link: https://h10145.www1.hpe.com/Downloads/Down
HP iMC Plat 7.2 - Remote Code Execution
  日期:2017-12-04 14:29:36 点击:7 评论:0
#!/opt/local/bin/python2.7 # Exploit Title: HP iMC Plat 7.2 dbman Opcode 10007 Command Injection RCE # Date: 11-28-2017 # Exploit Author: Chris Lyne (@lynerc) # Vendor Homepage: www.hpe.com # Software Link: https://h10145.www1.hpe.com/Downloads/Downl
Linux Kernel - 'The Huge Dirty Cow' Overwriting The Huge Zero Page
  日期:2017-12-01 14:56:28 点击:10 评论:0
// EDB Note: Source ~ https://medium.com/bindecy/huge-dirty-cow-cve-2017-1000405-110eca132de0 // EDB Note: Source ~ https://github.com/bindecy/HugeDirtyCowPOC // Author Note: Before running, make sure to set transparent huge pages to always: `echo al
Mac OS X Root Privilege Escalation
  日期:2017-11-30 16:30:43 点击:4 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include Msf::Exploit::EX
Asterisk 13.17.2~dfsg-2 Memory Exhaustion
  日期:2017-11-30 16:29:31 点击:8 评论:0
# Exploit Author: Juan Sacco juan.sacco@kpn.com at KPN Red Team -http://www.kpn.com# Date and time of release: Nov, 15 2017# Found this and more exploits on my open source security project:http://www.exploitpack.com## Tested on: Asterisk 13.17.2~dfs
共585页/11687条记录 首页 上一页 [1] 2 [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Abyss Web Server < 2.11.6 -
·Artica Web Proxy 3.06 - Remo
·Linux Kernel - 'The Huge Dir
·iOS < 11.1 / tvOS < 11.1 / w
·Linux Kernel - DCCP Socket U
·pfSense 2.3.1_1 Remote Comma
·phpMyFAQ 2.9.9 Code Injectio
·Claymore's Dual Miner 10.1 S
·Asterisk 13.17.2~dfsg-2 Memo
·Linux - 'mincore()' Uninitia
·HP iMC Plat 7.2 - Remote Cod
·WebKit - 'WebCore::Style::Tr
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2017 VFocuS.Net All Rights Reserved