首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Windows Speech Recognition - Buffer Overflow
  日期:2018-07-25 15:14:47 点击:85 评论:0
# Title: Windows Speech Recognition- Buffer Overflow # Author: Nassim Asrir # Contact: wassline@gmail.com | https://www.linkedin.com/in/nassim-asrir-b73a57122/ # Vendor: https://www.microsoft.com/ About Windows Speech Recognition: ==================
Davolink DVW 3200 Router - Password Disclosure
  日期:2018-07-25 15:11:53 点击:100 评论:0
# Exploit Title: Davolink DVW 3200 Router - Password Disclosure# Google Dork: N/A# Zoomeye dork : https://www.zoomeye.org/searchResult?q=%22var%20user_passwd%22%20%2Bapp%3A%22DAVOLINK%20GAPD-7000%20WAP%20httpd%22 # Date: 2018-07-13# Exploit Author:
Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)
  日期:2018-07-25 15:10:43 点击:31 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: Splinterware System Scheduler Pro 5.12 - Local Buffer Overflow (SEH) # Date: 07-21-18 # Vulnerable Software: System Scheduler Pro 5.12 # Vendor Homepage: https://www.splin
Google Chrome - SwiftShader OpenGL Texture Bindings Reference Count Leak
  日期:2018-07-25 15:09:13 点击:218 评论:0
!-- There's an object lifetime issue in the Swiftshader OpenGL texture bindings (OpenGL/libGLESv2/Texture.cpp). The same bug is present in all versions of TextureXX::copyImage, below is the simplest function: void Texture2D::copyImage(GLint level, G
Google Chrome - Swiftshader Blitting Floating-Point Precision Errors
  日期:2018-07-25 14:28:35 点击:84 评论:0
!--There is a bug in the Swiftshader renderer handling blitting between surfaces (Renderer/Blitter.cpp).For simplicity's sake, we'll consider the case when JITting fails (so ignoring the call to blitReactor) - in practice, the JITted code has the sa
Microsoft dnslint.exe DNS Tool Forced Drive-By Download
  日期:2018-07-23 15:20:12 点击:47 评论:0
[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DNSLINT.EXE-FORCED-DRIVE-BY-DOWNLOAD.txt[+] ISR: Apparition Security ***Greetz: indoushka | Eduardo*** Vendor
CMS Made Simple 2.2.5 Authenticated Remote Command Execution
  日期:2018-07-20 16:37:03 点击:52 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def in
PrestaShop < 1.6.1.19 - AES CBC Privilege Escalation Exploit
  日期:2018-07-19 16:26:55 点击:67 评论:0
#!/usr/bin/env python3 # PrestaShop = 1.6.1.19 AES (Rijndael) / openssl_encrypt() Cookie Read # Charles Fol # # See https://ambionics.io/blog/prestashop-privilege-escalation # # This POC will reveal the content of an employee's cookie. # By modifyin
Modx Revolution Remote Code Execution
  日期:2018-07-19 16:09:13 点击:30 评论:0
# Exploit Title: Modx Revolution 2.6.4 - Remote Code Execution# Date: 2018-07-13# Exploit Author: Vitalii Rudnykh# Vendor Homepage: https://modx.com/# Version: = 2.6.4# CVE : CVE-2018-1000207 #!/usr/bin/env python3# -*- coding: utf-8 -*-import sysim
JavaScript Core Arbitrary Code Execution
  日期:2018-07-19 16:08:00 点击:31 评论:0
// Load Int library, thanks saelo!load('util.js');load('int64.js'); // Helpers to convert from float to in a few random placesvar conva = new ArrayBuffer(8);var convf = new Float64Array(conva);var convi = new Uint32Array(conva);var convi8 = new Uint
Linux BPF Sign Extension Local Privilege Escalation
  日期:2018-07-19 16:06:02 点击:99 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GreatRanking include Msf::Post::Linux::Priv include Msf::Post::Li
HomeMatic Zentrale CCU2 Unauthenticated Remote Code Execution
  日期:2018-07-18 14:53:47 点击:50 评论:0
# Exploit Title: HomeMatic Zentrale CCU2 Unauthenticated RCE# Date: 16-07-2018# Software Link: https://www.homematic.com/# Exploit Author: Kacper Szurek - ESET# Contact: https://twitter.com/KacperSzurek# Website: https://security.szurek.pl/# YouTube
Microsoft Windows Enterprise Mode Site List 1/2 XML Injection
  日期:2018-07-17 16:51:25 点击:32 评论:0
[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-ENTERPRISE-MODE-SITE-LIST-MANAGER-XXE.txt[+] ISR: Apparition Security ***Greetz: indoushka | Eduardo*
Microsoft Windows .library-ms Information Disclosure
  日期:2018-07-17 16:49:57 点击:56 评论:0
[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-.LIBRARY-MS-FILETYPE-INFORMATION-DISCLOSURE.txt[+] ISR: Apparition Security***Greetz: indoushka|Eduar
QNAP Q'Center change_passwd Command Execution
  日期:2018-07-17 16:48:53 点击:69 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient includ
Nanopool Claymore Dual Miner APIs Remote Code Execution
  日期:2018-07-17 16:46:53 点击:41 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/exploit/powershell'class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Ms
Linux/Ubuntu Coredump Reading Access Bypass
  日期:2018-07-16 14:51:41 点击:33 评论:0
Linux/Ubuntu: other users#39; coredumps can be read via setgid directory and killpriv bypass Note: I am both sending this bug report to a href=mailto:security@kernel.org title= class= rel=nofollowsecurity@kernel.org/a and filing it inthe Ubuntu bugt
Hadoop YARN ResourceManager Unauthenticated Command Execution
  日期:2018-07-16 14:50:43 点击:38 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient includ
Microsoft Windows POP/MOV SS Local Privilege Elevation
  日期:2018-07-16 14:49:06 点击:54 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/post/common'require 'msf/core/post/file'require 'msf/core/post/windows/priv'require 'msf/core/pos
G DATA Total Security 25.4.0.3 - Activex Buffer Overflow
  日期:2018-07-16 14:46:24 点击:33 评论:0
=====[ Tempest Security Intelligence - ADV-24/2018 ]===G DATA TOTAL SECURITY v25.4.0.3 Activex Buffer OverflowAuthor: Filipe Xavier OliveiraTempest Security Intelligence - Recife, Pernambuco - Brazil=====[ Table of Contents]=========================
共637页/12733条记录 首页 上一页 [23] [24] [25] 26 [27] [28] [29] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved