首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
CyberArk < 10 - Memory Disclosure
  日期:2018-06-11 17:14:45 点击:1 评论:0
# Exploit Title: CyberArk 10 - Memory Disclosure # Date: 2018-06-04 # Exploit Author: Thomas Zuk # Vendor Homepage: https://www.cyberark.com/products/privileged-account-security-solution/enterprise-password-vault/ # Version: 9.7 and 10 # Tested on: W
Zip-n-Go 4.9 - Buffer Overflow (SEH)
  日期:2018-06-11 17:14:01 点击:0 评论:0
#!/usr/bin/python #----------------------------------------------------------------------------------------------------------# # Exploit Title : Zip-n-Go v4.9 - Local Buffer Overflow (SEH) # # Exploit Author : Hashim Jawad - @ihack4falafel # # Vendor
Git < 2.17.1 - Remote Code Execution
  日期:2018-06-11 17:13:03 点击:2 评论:0
# Exploit Title: Git (code execution) # Date: 2018-05-29 # Exploit Author: JameelNabbo # Website: jameelnabbo.com http://jameelnabbo.com/ # Vendor Homepage: https://github.com/git/git https://github.com/git/git # CVE: CVE-2018-11235 #Version: =2.17.1
Microsoft Edge Chakra - EntrySimpleObjectSlotGetter Type Confusion
  日期:2018-06-11 17:12:24 点击:1 评论:0
/* function opt(w, arr) { arr[0] = 1.1; let res = w.event; arr[0] = 2.3023e-320; return res; } let arr = [1.1]; for (let i = 0; i 10000; i++) { opt(window, arr); } The above code will be compiled as follows: 000001a8`8000122b 48b8503dcfd5ff7f0000 mov
Sony Playstation 4 (PS4) 5.1 - Kernel (PoC)
  日期:2018-06-11 16:56:34 点击:1 评论:0
log(--- trying kernel exploit --); function malloc(sz) { var backing = new Uint8Array(0x10000+sz); window.nogc.push(backing); var ptr = p.read8(p.leakval(backing).add32(0x10)); ptr.backing = backing; return ptr; } function malloc32(sz) { var backing
Procps-ng - Multiple Vulnerabilities
  日期:2018-05-31 17:44:26 点击:13 评论:0
Qualys Security Advisory Procps-ng Audit Report ======================================================================== Contents ======================================================================== Summary 1. FUSE-backed /proc/PID/cmdline 2. Unp
Siemens SIMATIC S7-300 CPU - Remote Denial of Service
  日期:2018-05-31 17:43:03 点击:3 评论:0
# Exploit Title: Siemens SIMATIC S7-300 CPU - Remote Denial Of Service # Google Dork: inurl:/Portal/Portal.mwsl # Date: 2018-05-30 # Exploit Author: t4rkd3vilz # Vendor Homepage: https://www.siemens.com/ # Version: SIMATIC S7-300 CPU family: all vers
GNU Barcode 0.99 - Memory Leak
  日期:2018-05-30 16:23:58 点击:6 评论:0
# GNU Barcode 0.99 - Memory Leak # Vendor: The GNU Project | Free Software Foundation, Inc. # Product web page: https://www.gnu.org/software/barcode/ # https://directory.fsf.org/wiki/Barcode # Affected version: 0.99 # Tested on: Ubuntu 16.04.4 # Auth
GNU Barcode 0.99 - Buffer Overflow
  日期:2018-05-30 16:18:03 点击:6 评论:0
# GNU Barcode 0.99 - Buffer Overflow # Vendor: The GNU Project | Free Software Foundation, Inc. # Product web page: https://www.gnu.org/software/barcode/ # https://directory.fsf.org/wiki/Barcode # Author: Gjoko 'LiquidWorm' Krstic # Tested on: Ubuntu
ALFTP 5.31 - Local Buffer Overflow (SEH Bypass)
  日期:2018-05-29 16:25:30 点击:4 评论:0
# Exploit Title: ALFTP 5.31 - Local Buffer Overflow (SEH Bypass) # Exploit Author: Gokul Babu # Vendor Homepage: http://www.altools.com/downloads/alftp.aspx # Vulnerable Software: http://advert.estsoft.com/?event=201001127730323 # Tested on: Windows
CloudMe Sync < 1.11.0 - Buffer Overflow (SEH) (DEP Bypass)
  日期:2018-05-29 16:24:14 点击:9 评论:0
# Exploit: CloudMe Sync 1.11.0 - Buffer Overflow (SEH) (DEP Bypass) # Date: 2018-05-27 # Author: Juan Prescotto # Tested Against: Win7 Pro SP1 64 bit # Software Download: https://www.cloudme.com/downloads/CloudMe_1109.exe # Tested Against Version: 1.
Bitmain Antminer D3/L3+/S9 - Remote Command Execution
  日期:2018-05-28 16:13:24 点击:6 评论:0
# Exploit Title: Bitmain Antminer D3, L3+, and S9 devices allow Remote Command Execution # Google Dork: N/A # Date: 27/05/2018 # Exploit Author: Corrado Liotta # Vendor Homepage: https://www.bitmain.com/ # Software Link: N/A # Version: Antminer - D3
D-Link DSL-2750B - OS Command Injection (Metasploit)
  日期:2018-05-28 16:12:37 点击:13 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpClient includ
Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write
  日期:2018-05-28 16:11:47 点击:11 评论:0
!-- Skia bug report: https://bugs.chromium.org/p/skia/issues/detail?id=7674 Mozilla bug report: https://bugzilla.mozilla.org/show_bug.cgi?id=1441941 In Skia, SkTDArray stores length (fCount) and capacity (fReserve) as 32-bit ints and does not perfor
Microsoft Edge Chakra - Cross Context Use-After-Free
  日期:2018-05-28 16:11:11 点击:9 评论:0
!-- 1. Background The CrossSite class is used for passing JavaScript variables across different contexts. Chakra is basically trying to wrap every variable being passed from a context to another context. The way it wraps an object is, first overwrit
SAP Internet Transaction Server 6200.x - Session Fixation / Cross-Site Scripting
  日期:2018-05-28 16:10:16 点击:6 评论:0
# Exploit Title: SAP Internet Transaction Server (ITS) 6200.X.X - Session Fixation/ Cross-Site Scripting # Dork: /scripts/wgate/ # Date: 25.05.2018 # Exploit Author: J. Carrillo Lencina (0xd0m7) # Vendor Homepage: https://www.sap.com # Version: SAP
GNU glibc < 2.27 - Local Buffer Overflow
  日期:2018-05-28 16:09:12 点击:13 评论:0
# Exploit Title: GNU glibc 2.27 - Local Buffer Overflow # Date: 2018-05-24 # Exploit Author: JameelNabbo # Website: jameelnabbo.com http://jameelnabbo.com/ # Vendor Homepage: http://www.gnu.org/ http://www.gnu.org/ # CVE: CVE-2018-11237 # POC: $ cat
Microsoft Internet Explorer 11 (Windows 7 x64/x86) - vbscript Code Execution
  日期:2018-05-28 16:07:03 点击:35 评论:0
!doctype html html lang=en head meta http-equiv=Content-Type content=text/html; charset=UTF-8 meta http-equiv=x-ua-compatible content=IE=10 meta http-equiv=Expires content=0 meta http-equiv=Pragma content=no-cache meta http-equiv=Cache-control conte
Siemens SCALANCE S613 - Remote Denial of Service
  日期:2018-05-28 16:06:20 点击:1 评论:0
# Exploit Title: Siemens SCALANCE S613 - Remote Denial of Service # Date: 2018-05-23 # Exploit Author: t4rkd3vilz # Vendor Homepage: https://www.siemens.com/ # Version: SCALANCE S613 (MLFB: 6GK5613-0BA00-2AA3): All versions. # Tested on: Kali Linux
FTPShell Server 6.80 - Denial of Service
  日期:2018-05-28 15:27:35 点击:8 评论:0
# Exploit Title: FTPShell Server 6.80 - Local Denial of Service # Exploit Author: Hashim Jawad # Date: 2018-05-23 # Vendor Homepage: http://www.ftpshell.com/ # Vulnerable Software: http://www.ftpshell.com/downloadserver.htm # Tested on: Windows 7 Ent
共609页/12166条记录 首页 上一页 [1] 2 [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Microsoft Internet Explorer
·HPE iMC 7.3 - Remote Code Ex
·Linux 4.4.0 < 4.4.0-53 - AF_
·R 3.4.4 - Local Buffer Overf
·FTPShell Server 6.80 - Buffe
·Linux 2.6.30 < 2.6.36-rc8 -
·DynoRoot DHCP - Client Comma
·Prime95 29.4b8 - Stack Buffe
·D-Link DSL-2750B - OS Comman
·Nanopool Claymore Dual Miner
·GNU glibc < 2.27 - Local Buf
·Procps-ng - Multiple Vulnera
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved