首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Wedding Slideshow Studio 1.36 - Buffer Overflow
  日期:2018-08-06 15:13:01 点击:31 评论:0
########################################################################################### # Exploit Title: Socumsoft Wedding Slideshow Studio 1.36 # Date: 02.08.2018 # Exploit Author: Achilles # Vendor Homepage: http://www.socusoft.com # Vulnerable
Fortinet FortiClient 5.2.3 (Windows 10 x64 Creators) - Local Privilege Escalatio
  日期:2018-08-06 15:08:45 点击:196 评论:0
#include stdafx.h #include stdio.h #include Windows.h #include Psapi.h #include Shlobj.h #pragma comment (lib,psapi) PULONGLONG leak_buffer = (PULONGLONG)VirtualAlloc((LPVOID)0x000000001a000000, 0x2000, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE); ULON
Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
  日期:2018-08-03 14:35:27 点击:67 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Post::Linux::Pri
Seq 4.2.476 Authentication Bypass
  日期:2018-08-03 14:34:18 点击:25 评论:0
# Exploit Title: Seq 4.2.476 - Authentication Bypass# Date: 2018-08-02# Exploit Author: Daniel Chactoura# Vendor Homepage: https://getseq.net/# Software Link: https://getseq.net/Download/All# Version: = 4.2.476# CVE : CVE-2018-8096# Post Reference:
Linkedin iOS 9.11.8592.4 CPU Resource Exhaustion
  日期:2018-08-03 14:33:11 点击:43 评论:0
#!/usr/bin/env python# -*- coding: utf-8 -*-## Exploit Author: Juan Sacco juan.sacco@kpn.com at KPN Red Team -http://www.kpn.com# Linkedin Mobile iOS - v9.11 CPU Resource exhaustion## Found this and more exploits at my open source security project:h
AgataSoft Auto PingMaster 1.5 - 'Host name' Denial of Service (PoC)
  日期:2018-08-03 14:31:44 点击:29 评论:0
# Exploit Title: AgataSoft Auto PingMaster 1.5 - 'Host name' Denial of Service (PoC) # Discovery by: Luis Martinez # Discovery Date: 2018-08-02 # Vendor Homepage: http://agatasoft.com/ # Software Link : http://agatasoft.com/Ping_Master.exe # Tested V
SecureSphere 12.0.0.50 - SealMode Shell Escape (Metasploit)
  日期:2018-08-03 14:30:22 点击:33 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::SSH def initiali
CoSoSys Endpoint Protector 4.5.0.1 - Authenticated Remote Root Command Injection
  日期:2018-08-03 14:28:22 点击:21 评论:0
# Title : CoSoSys Endpoint Protector - Authenticated Remote Root Command Injection # Date : Vulnerability submitted in 01/12/2017 and published in 01/08/2018 # Author : 0x09AL # Tested on : Endpoint Protector 4.5.0.1 # Software Link : https://www.en
Imperva SecureSphere 11.5 / 12.0 / 13.0 - Privilege Escalation
  日期:2018-08-03 14:27:12 点击:29 评论:0
# Title: Imperva SecureSphere = v13 - Privilege Escalation # Author: 0x09AL # Date: 01/08/2018 # Tested on: Imperva SecureSphere 11.5,12.0,13.0 # Vendor: https://www.imperva.com/ # Vulnerability Description # There is a program named PCE.py which ru
Sun Solaris 11.3 AVS - Local Kernel root Exploit
  日期:2018-08-03 14:25:35 点击:34 评论:0
/* # Exploit Title: Solaris/OpenSolaris AVS kernel code execution # Google Dork: [if applicable] # Date: 24/7/2018 # Exploit Author: mu-b # Vendor Homepage: oracle.com # Software Link: # Version: Solaris 10, Solaris = 11.3 # Tested on: Solaris 11.X,
Allok Fast AVI MPEG Splitter 1.2 SEH Overwrite
  日期:2018-08-02 17:02:52 点击:27 评论:0
#!/usr/bin/env python# Exploit Title : Allok Fast AVI MPEG Splitter 1.2 SEH Overwrite POC # Vulnerability Type: SEH Overwrite POC# Discovery by : Shubham Singh# Known As : Spirited Wolf [Twitter: @Pwsecspirit]# Email : spiritedwolf@protonmail.com# Y
My Video Converter 1.5.24 Buffer Overflow
  日期:2018-08-02 17:01:53 点击:40 评论:0
#!/usr/bin/env python# Exploit Title : My Video Converter 1.5.24 - Remote Buffer Overflow # Discovery by : Shubham Singh# Known As : Spirited Wolf [Twitter: @Pwsecspirit]# Email : spiritedwolf@protonmail.com# Youtube Channel : www.youtube.com/c/Pent
Easy DVD Creator 2.5.11 Buffer Overflow
  日期:2018-08-02 16:45:36 点击:27 评论:0
#!/usr/bin/env python# Exploit Title : Easy DVD Creator 2.5.11 - Buffer Overflow in 'Registration UserName Field' (SEH) # Discovery by : Shubham Singh# Known As : Spirited Wolf [Twitter: @Pwsecspirit]# Email : spiritedwolf@protonmail.com# Youtube Ch
Switch Port Mapping Tool 2.81 - 'SNMP Community Name' Denial of Service (PoC)
  日期:2018-08-02 16:40:20 点击:28 评论:0
# Exploit Title: Switch Port Mapping Tool 2.81 - 'SNMP Community Name' Denial of Service (PoC) # Discovery by: Luis Martinez # Discovery Date: 2018-07-27 # Vendor Homepage: https://switchportmapper.com/ # Software Link : http://download.switchportma
MicroFocus Secure Messaging Gateway Remote Code Execution
  日期:2018-08-01 13:55:05 点击:34 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def in
SonicWall Global Management System XMLRPC
  日期:2018-08-01 13:54:20 点击:30 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def in
Vtiger CRM 6.3.0 Authenticated Logo Upload Remote Command Execution
  日期:2018-08-01 13:52:01 点击:28 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient includ
Charles Proxy 4.2 Local Root Privilege Escalation
  日期:2018-07-31 15:23:43 点击:24 评论:0
Charles Proxy is a great mac application for debugging web services andinspecting SSL traffic for any application on your machine. In order to inspect the SSL traffic it needs to configure the system to use aproxy so that it can capture the packets
fusermount Restriction Bypass
  日期:2018-07-31 15:22:41 点击:52 评论:0
fusermount user_allow_other restriction bypass and SELinux label control CVE-2018-10906It is possible to bypass fusermount's restrictions on the use of theallow_other mount option as follows if SELinux is active.Here's a minimal demo, tested on a De
H2 Database 1.4.197 Information Disclosure
  日期:2018-07-31 15:21:43 点击:47 评论:0
# Exploit Title: H2 Database 1.4.197 - Information Disclosure# Date: 2018-07-16# Exploit Author: owodelta# Vendor Homepage: www.h2database.com# Software Link: http://www.h2database.com/html/download.html# Version: all versions# Tested on: Linux# CVE
共637页/12733条记录 首页 上一页 [21] [22] [23] 24 [25] [26] [27] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved