首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
Arq 5.10 - Local Privilege Escalation (2)
  日期:2018-01-30 16:21:30 点击:2 评论:0
#!/bin/bash ################################################################# ###### Arq = 5.10 local root privilege escalation exploit ###### ###### by m4rkw - https://m4.rkw.io/blog.html ###### ######################################################
Arq 5.10 - Local Privilege Escalation (1)
  日期:2018-01-30 16:19:31 点击:1 评论:0
#!/usr/bin/env ruby ################################################################# ###### Arq = 5.10 local root privilege escalation exploit ###### ###### by m4rkw - https://m4.rkw.io/blog.html ###### ##############################################
macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding
  日期:2018-01-30 16:18:44 点击:2 评论:0
/* The sysctls vfs.generic.conf.* are handled by sysctl_vfs_generic_conf(), which is implemented as follows: static int sysctl_vfs_generic_conf SYSCTL_HANDLER_ARGS { int *name, namelen; struct vfstable *vfsp; struct vfsconf vfsc; (void)oidp; name = a
Oracle WebLogic wls-wsat Component Deserialization Remote Code Execution
  日期:2018-01-29 16:01:06 点击:16 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient # incl
Trend Micro Threat Discovery Appliance 2.6.1062r1 - 'dlp_policy_upload.cgi' Remo
  日期:2018-01-29 15:59:22 点击:10 评论:0
#!/usr/local/bin/python Trend Micro Threat Discovery Appliance = 2.6.1062r1 dlp_policy_upload.cgi Remote Code Execution Vulnerability Found by: Steven Seeley of Source Incite Roberto Suggi Liverani - @malerisch - http://blog.malerisch.net/ File: TDA_
BMC BladeLogic 8.3.00.64 - Remote Command Execution
  日期:2018-01-29 15:58:07 点击:3 评论:0
# Exploit Title: BMC BladeLogic RSCD agent remote exec - XMLRPC version # Filename: BMC_rexec.py # Github: https://github.com/bao7uo/bmc_bladelogic # Date: 2018-01-24 # Exploit Author: Paul Taylor / Foregenix Ltd # Website: http://www.foregenix.com/b
Asus Router Cross Site Script / Authentication Bypass
  日期:2018-01-29 15:57:16 点击:4 评论:0
In the name of god-------------------------Exploit Title :--------------------Asus Routers (DSL-RT-N13 , DSL-N14U B1) VulnerabilityExploit Author :---------------------4TT4CK3RCategory :---------------------Remote and LocalHome Page :---------------
ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password
  日期:2018-01-29 15:56:26 点击:4 评论:0
import requests import sys import urllib3 ip = sys.argv[1] user = sys.argv[2] newPassword = sys.argv[3] #requests.packages.urilib3.disable_warnings() urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) data = {group_id: '', action_mod
AsusWRT Router < 3.0.0.4.380.7743 - Unauthenticated LAN Remote Code Execution
  日期:2018-01-26 14:01:44 点击:12 评论:0
Unauthenticated LAN remote code execution in AsusWRT Discovered by Pedro Ribeiro ( pedrib@gmail.com ), Agile Information Security ================================================================================= Disclosure: 22/01/2018 / Last updated
Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape
  日期:2018-01-25 15:17:23 点击:6 评论:0
# SSD Advisory Oracle VirtualBox Multiple Guest to Host Escape Vulnerabilities Source: https://blogs.securiteam.com/index.php/archives/3649 ## Vulnerabilities summary The following advisory describes two (2) guest to host escape found in Oracle Virtu
RAVPower 2.000.056 - Root Remote Code Execution
  日期:2018-01-25 15:15:18 点击:10 评论:0
# Exploit Title: RAVPower - remote root # Date: 23/01/2018 # Exploit Authors: Daniele Linguaglossa # Vendor Homepage: https://www.ravpower.com/ # Software Link: https://www.ravpower.com/ # Version: 2.000.056 # Tested on: OSX # CVE : CVE-2018-5997 im
Sync Breeze Enterprise 9.5.16 Import Command Buffer Overflow
  日期:2018-01-24 16:26:04 点击:4 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT include Msf::Expl
Kaltura Remote PHP Code Execution
  日期:2018-01-24 16:25:18 点击:5 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking CookieSecret = 'y3tAno3therS$cr3T' include Msf:
GoAhead Web Server LD_PRELOAD Arbitrary Module Load
  日期:2018-01-24 16:24:06 点击:9 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def in
MikroTik RouterOS < 6.38.5 Remote Command Execution Exploit
  日期:2018-01-24 16:18:03 点击:14 评论:0
MikroTik RouterOS < 6.38.5 Remote Command Execution Exploit
Asus Unauthenticated LAN Remote Command Execution Exploit
  日期:2018-01-24 16:18:03 点击:6 评论:0
Vulnerabilities Summary The following advisory describes two ( 2 ) vulnerabilities found in AsusWRT Version 3 . 0 . 0 . 4 . 380 . 7743 . The combination of the vulnerabilities leads to LAN remote command execution on any Asus router. AsusWRT is THE
Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin)
  日期:2018-01-24 16:16:59 点击:4 评论:0
!-- # # # # # # Exploit Title: Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin) # Dork: N/A # Date: 23.01.2018 # Vendor Homepage: http://ronnieswietek.com/ # Software Link: https://codecanyon.net/item/client-photo-studio-photography-cms/1
HP Connected Backup 8.6/8.8.6 - Local Privilege Escalation
  日期:2018-01-24 16:14:56 点击:5 评论:0
#Tested on HP Connected Backup version 8.8.2.0 on Windows 7 x64 import os import sys import time import requests from bs4 import BeautifulSoup def send_request(body): url= http://localhost:16386/ headers = {Content-Type: text/xml; charset=utf-8, 'SOA
RAVPower 2.000.056 - Memory Disclosure
  日期:2018-01-24 16:13:58 点击:7 评论:0
# Exploit Title: RAVPower - remote stack disclosure # Date: 22/01/2018 # Exploit Author: Daniele Linguaglossa # Vendor Homepage: https://www.ravpower.com/ # Software Link: https://www.ravpower.com/ # Version: 2.000.056 # Tested on: OSX # CVE : CVE-2
MixPad 5.00 - Buffer Overflow
  日期:2018-01-24 16:13:04 点击:3 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: NCH Software MixPad v5.00 - Unicode Buffer Overflow # Date: 21-01-2017 # Vulnerable Software: NCH Software MixPad # Vendor Homepage: http://www.nch.com.au/mixpad # Version:
共594页/11872条记录 首页 上一页 [1] [2] 3 [4] [5] [6] [7] 下一页 末页
  本月热点文章
·MS17-010 EternalRomance / Et
·Cisco ASA - Crash PoC
·D-Link DNS-325 ShareCenter 1
·Oracle WebLogic wls-wsat Com
·LabF nfsAxe 3.7 TFTP Client
·MikroTik RouterOS < 6.38.5 R
·AsusWRT Router < 3.0.0.4.380
·Trend Micro Threat Discovery
·RAVPower 2.000.056 - Root Re
·BMC Server Automation RSCD A
·GoAhead Web Server LD_PRELOA
·System Shield 5.0.0.136 - Pr
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved