首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure
  日期:2018-04-13 15:09:45 点击:17 评论:0
# -*- coding: utf-8 -*- #!/usr/bin/python # Exploit Title: Ticketbleed # Google Dork: n/a # Date: Exploit: 02/13/17, Advisory Published: 02/09/17 # Exploit Author: @0x00string # Vendor Homepage: https://f5.com/ # Software Link: https://support.f5.co
SysGauge Pro 4.6.12 Local Buffer Overflow
  日期:2018-04-12 15:08:46 点击:22 评论:0
#!/usr/bin/python################################################################################################################### Exploit Title : SysGauge Pro v4.6.12 - Local Buffer Overflow (SEH) ## Exploit Author : Hashim Jawad ## Twitter : @ih
Google Chrome V8 JIT - 'LoadElimination::ReduceTransitionElementsKind' Type Conf
  日期:2018-04-11 16:00:29 点击:4 评论:0
/* I think this commit has introduced the bug: https://chromium.googlesource.com/v8/v8.git/+/9884bc5dee488bf206655f07b8a487afef4ded9b Reduction LoadElimination::ReduceTransitionElementsKind(Node* node) { ... if (object_maps.contains(ZoneHandleSetMap(
DVD X Player Standard 5.5.3.9 - Buffer Overflow
  日期:2018-04-11 15:54:02 点击:6 评论:0
###################################################### # Exploit Title: Buffer Overflow on DVD X Player Standard 5.5.3.9 # Date: 29.03.2018 # Vendor Homepage: http://www.dvd-x-player.com # Software Link: http://www.dvd-x-player.com/download/DVDXPlaye
CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Executi
  日期:2018-04-10 14:52:15 点击:4 评论:0
Advisory: CyberArk Password Vault Web Access Remote Code Execution The CyberArk Password Vault Web Access application uses authentication tokens which consist of serialized .NET objects. By crafting manipulated tokens, attackers are able to gain unau
CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure
  日期:2018-04-10 14:50:59 点击:6 评论:0
Advisory: CyberArk Password Vault Memory Disclosure Data in the CyberArk Password Vault may be accessed through a proprietary network protocol. While answering to a client's logon request, the vault discloses around 50 bytes of its memory to the clie
GoldWave 5.70 - Local Buffer Overflow (SEH Unicode)
  日期:2018-04-10 14:49:55 点击:12 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: GoldWave 5.70 - Local Buffer Overflow (SEH Unicode) # Date: 04-05-2018 # Vulnerable Software: GoldWave 5.70 # Vendor Homepage: https://www.goldwave.com/ # Version: 5.70 # S
H2 Database - 'Alias' Arbitrary Code Execution
  日期:2018-04-10 14:48:20 点击:2 评论:0
''' Exploit Title: H2 Database Alias Abuse Date: 05/04/2018 Exploit Author: gambler Vendor Homepage:www.h2database.com Software Link: http://www.h2database.com/html/download.html Version: all versions Tested on: Linux, Mac OS ''' import sys import ar
SSH / SSL RSA Private Key Passphrase Dictionary Enumerator Exploit
  日期:2018-04-10 14:46:31 点击:7 评论:0
#!/usr/bin/perl # # SSH/SSL RSA Private Key Passphrase dictionary enumerator # # Copyright 2018 (c) Todor Donev todor.donev at gmail.com # https://ethical-hacker.org/ # https://facebook.com/ethicalhackerorg # # [A class=__cf_email__ href=/cdn-cgi/l/
Adobe Flash 28.0.0.137 Remote Code Execution
  日期:2018-04-08 14:58:27 点击:18 评论:0
#!/usr/bin/env python# coding: UTF-8import BaseHTTPServerimport sysfrom SimpleHTTPServer import SimpleHTTPRequestHandlerprint @Syfi2kprint [+] CVE-2018-4878 poc print --------------------------------print Calc.exe Shellcode via Msfvenomprint Based o
PMS 0.42 Stack-Based Buffer Overflow
  日期:2018-04-08 14:58:27 点击:11 评论:0
PMS 0.42 Stack-Based Buffer Overflow
Sophos Endpoint Protection Control Panel 10.7 - Weak Password Encryption
  日期:2018-04-08 14:57:34 点击:11 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-CONTROL-PANEL-v10.7-INSECURE-CRYPTO-CVE-2018-9233.txt [+] ISR: Apparition Security Vendor:
Sophos Endpoint Protection 10.7 - Tamper-Protection Bypass
  日期:2018-04-08 14:56:53 点击:9 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-v10.7-TAMPER-PROTECTION-BYPASS-CVE-2018-4863.txt [+] ISR: Apparition Security Vendor: ====
Microsoft Windows - Multiple Use-After-Free Issues in jscript Array Methods
  日期:2018-04-08 14:55:52 点击:5 评论:0
!-- There are multiple use-after-free issues in Array methods in jscript. When jscript executes an Array method (such as Array.join), it first retrieves the length of an array. If the input is not an array but an object, then the length property of t
ProcessMaker Plugin Code Execution
  日期:2018-04-04 13:57:08 点击:10 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include
DuckDuckGo 4.2.0 WebRTC Private IP Leakage
  日期:2018-04-04 13:56:15 点击:16 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Auxiliary include Msf::Exploit::Remote::HttpServer def initialize(info = {}) super( upd
Moxa AWK-3131A 1.4 < 1.7 - 'Username' OS Command Injection
  日期:2018-04-04 13:55:26 点击:2 评论:0
#!/usr/bin/env python2 import telnetlib import re import random import string # Split string into chunks, of which each is = length def chunkstring(s, length): return (s[0+i:length+i] for i in range(0, len(s), length)) # Split strings based on MAX_LE
Microsoft Edge Chakra JIT - Stack-to-Heap Copy (Incomplete Fix 2)
  日期:2018-04-04 13:53:36 点击:7 评论:0
/*Here's a snippet of JavascriptArray::BoxStackInstance. template typename T T * JavascriptArray::BoxStackInstance(T * instance, bool deepCopy) { Assert(ThreadContext::IsOnStack(instance)); // On the stack, the we reserved a pointer before the objec
Microsoft Edge Chakra JIT - Stack-to-Heap Copy (Incomplete Fix)
  日期:2018-04-04 13:52:49 点击:3 评论:0
/* Here's a snippet of JavascriptArray::BoxStackInstance. To fix issue 1420 , deepCopy was introduced. But it only deep-copies the array when instance-head is on the stack. So simply by adding a single line of code that allocates head to the heap, we
Google Chrome V8 - 'Genesis::InitializeGlobal' Out-of-Bounds Read/Write
  日期:2018-04-04 13:52:03 点击:4 评论:0
/* Bug: The Genesis::InitializeGlobal method initializes the constructor of RegExp as follows: // Builtin functions for RegExp.prototype. HandleJSFunction regexp_fun = InstallFunction( global, RegExp, JS_REGEXP_TYPE, JSRegExp::kSize + JSRegExp::kInOb
共603页/12046条记录 首页 上一页 [1] 2 [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Linux Kernel < 4.4.0-116 (Ub
·Drupal < 7.58 / < 8.3.9 / <
·Hikvision IP Camera versions
·Vtiger CRM 6.3.0 - Authentic
·SysGauge Pro 4.6.12 Local Bu
·Nginx 1.13.10 Accept-Encodin
·Adobe Flash 28.0.0.137 Remot
·Crashmail 1.6 Buffer Overflo
·F5 BIG-IP 11.6 SSL Virtual S
·Exodus Wallet (ElectronJS Fr
·DuckDuckGo 4.2.0 WebRTC Priv
·Cisco node-jos < 0.11.0 - Re
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved