首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS17-017)
  日期:2018-04-19 17:39:26 点击:32 评论:0
#include Windows.h #include wingdi.h #include iostream #include Psapi.h #pragma comment(lib, psapi.lib) #define POCDEBUG 0 #if POCDEBUG == 1 #define POCDEBUG_BREAK() getchar() #elif POCDEBUG == 2 #define POCDEBUG_BREAK() DebugBreak() #else #define P
Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS16-039)
  日期:2018-04-19 17:37:25 点击:99 评论:0
#include Windows.h #include wingdi.h #include iostream #include Psapi.h #pragma comment(lib, psapi.lib) #define POCDEBUG 0 #if POCDEBUG == 1 #define POCDEBUG_BREAK() getchar() #elif POCDEBUG == 2 #define POCDEBUG_BREAK() DebugBreak() #else #define P
Barco ClickShare CSE-200 - Remote Denial of Service
  日期:2018-04-17 14:27:21 点击:28 评论:0
#!/usr/bin/python # Exploit Title: Barco ClickShare CSE-200 - Remote Denial of Service # Date: 11-04-2018 # Hardware Link: https://www.barco.com/de/product/clickshare-cse-200 # Exploit Author: Florian Hauser # Contact: florian DOT g DOT hauser AT gma
GNU Beep 1.3 - 'HoleyBeep' Local Privilege Escalation
  日期:2018-04-16 17:38:20 点击:26 评论:0
#!/usr/bin/env python3 # # E-DB Note ~ https://gist.github.com/Arignir/0b9d45c56551af39969368396e27abe8/ec853f14afd6e86fb3f2efce2086e28f33039ddc # E-DB Note ~ https://sigint.sh/#/holeybeep # # This is an exploit for HoleyBeep. # # To use it, place a
MikroTik 6.41.4 - FTP daemon Denial of Service PoC
  日期:2018-04-16 17:37:05 点击:26 评论:0
################ #Title: MikroTik 6.41.4 Denial of service FTP daemon crash #CVE: CVE-2018-10070 #CWE: CWE-400 #Exploit Author: Hosein Askari (FarazPajohan) #Vendor HomePage: https://mikrotik.com/ #Version : 6.41.4 (Released 2018-Apr-05) | All Versi
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execut
  日期:2018-04-16 17:35:09 点击:120 评论:0
# EDB-Note. Have the contents of shell on http://attacker/shell.php require 'net/http' # Hans Topo ruby port from Drupalggedon2 exploit. # Based on Vitalii Rudnykh exploit target = ARGV[0] command = ARGV[1] url = target + '/user/register?element_pare
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execut
  日期:2018-04-16 17:33:54 点击:40 评论:0
#!/usr/bin/env import sys import requests print ('################################################################') print ('# Proof-Of-Concept for CVE-2018-7600') print ('# by Vitalii Rudnykh') print ('# Thanks by AlbinoDrought, RicterZ, FindYanot,
F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure
  日期:2018-04-13 15:09:45 点击:76 评论:0
# -*- coding: utf-8 -*- #!/usr/bin/python # Exploit Title: Ticketbleed # Google Dork: n/a # Date: Exploit: 02/13/17, Advisory Published: 02/09/17 # Exploit Author: @0x00string # Vendor Homepage: https://f5.com/ # Software Link: https://support.f5.co
SysGauge Pro 4.6.12 Local Buffer Overflow
  日期:2018-04-12 15:08:46 点击:77 评论:0
#!/usr/bin/python################################################################################################################### Exploit Title : SysGauge Pro v4.6.12 - Local Buffer Overflow (SEH) ## Exploit Author : Hashim Jawad ## Twitter : @ih
Google Chrome V8 JIT - 'LoadElimination::ReduceTransitionElementsKind' Type Conf
  日期:2018-04-11 16:00:29 点击:61 评论:0
/* I think this commit has introduced the bug: https://chromium.googlesource.com/v8/v8.git/+/9884bc5dee488bf206655f07b8a487afef4ded9b Reduction LoadElimination::ReduceTransitionElementsKind(Node* node) { ... if (object_maps.contains(ZoneHandleSetMap(
DVD X Player Standard 5.5.3.9 - Buffer Overflow
  日期:2018-04-11 15:54:02 点击:40 评论:0
###################################################### # Exploit Title: Buffer Overflow on DVD X Player Standard 5.5.3.9 # Date: 29.03.2018 # Vendor Homepage: http://www.dvd-x-player.com # Software Link: http://www.dvd-x-player.com/download/DVDXPlaye
CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Executi
  日期:2018-04-10 14:52:15 点击:53 评论:0
Advisory: CyberArk Password Vault Web Access Remote Code Execution The CyberArk Password Vault Web Access application uses authentication tokens which consist of serialized .NET objects. By crafting manipulated tokens, attackers are able to gain unau
CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure
  日期:2018-04-10 14:50:59 点击:41 评论:0
Advisory: CyberArk Password Vault Memory Disclosure Data in the CyberArk Password Vault may be accessed through a proprietary network protocol. While answering to a client's logon request, the vault discloses around 50 bytes of its memory to the clie
GoldWave 5.70 - Local Buffer Overflow (SEH Unicode)
  日期:2018-04-10 14:49:55 点击:127 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: GoldWave 5.70 - Local Buffer Overflow (SEH Unicode) # Date: 04-05-2018 # Vulnerable Software: GoldWave 5.70 # Vendor Homepage: https://www.goldwave.com/ # Version: 5.70 # S
H2 Database - 'Alias' Arbitrary Code Execution
  日期:2018-04-10 14:48:20 点击:45 评论:0
''' Exploit Title: H2 Database Alias Abuse Date: 05/04/2018 Exploit Author: gambler Vendor Homepage:www.h2database.com Software Link: http://www.h2database.com/html/download.html Version: all versions Tested on: Linux, Mac OS ''' import sys import ar
SSH / SSL RSA Private Key Passphrase Dictionary Enumerator Exploit
  日期:2018-04-10 14:46:31 点击:41 评论:0
#!/usr/bin/perl # # SSH/SSL RSA Private Key Passphrase dictionary enumerator # # Copyright 2018 (c) Todor Donev todor.donev at gmail.com # https://ethical-hacker.org/ # https://facebook.com/ethicalhackerorg # # [A class=__cf_email__ href=/cdn-cgi/l/
Adobe Flash 28.0.0.137 Remote Code Execution
  日期:2018-04-08 14:58:27 点击:81 评论:0
#!/usr/bin/env python# coding: UTF-8import BaseHTTPServerimport sysfrom SimpleHTTPServer import SimpleHTTPRequestHandlerprint @Syfi2kprint [+] CVE-2018-4878 poc print --------------------------------print Calc.exe Shellcode via Msfvenomprint Based o
PMS 0.42 Stack-Based Buffer Overflow
  日期:2018-04-08 14:58:27 点击:61 评论:0
PMS 0.42 Stack-Based Buffer Overflow
Sophos Endpoint Protection Control Panel 10.7 - Weak Password Encryption
  日期:2018-04-08 14:57:34 点击:37 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-CONTROL-PANEL-v10.7-INSECURE-CRYPTO-CVE-2018-9233.txt [+] ISR: Apparition Security Vendor:
Sophos Endpoint Protection 10.7 - Tamper-Protection Bypass
  日期:2018-04-08 14:56:53 点击:44 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/SOPHOS-ENDPOINT-PROTECTION-v10.7-TAMPER-PROTECTION-BYPASS-CVE-2018-4863.txt [+] ISR: Apparition Security Vendor: ====
共637页/12733条记录 首页 上一页 [33] [34] [35] 36 [37] [38] [39] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved