首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
CloudMe Sync 1.9.2 Remote Buffer Overflow
  日期:2018-03-06 17:07:07 点击:56 评论:0
#!/usr/bin/python# CloudMe Sync 1.9.2 Remote Exploit# Written by r00tpgp @ http://www.r00tpgp.com# Usage: python CloudMe-1.9.2-Exploit.py victim-ip port# Spawns reverse meterpreter LHOST=192.168.0.68 LPORT=1990# CVE: CVE-2018-6892# CloudMe Installer
Chrome V8 JIT JSBuiltinReducer::ReduceObjectCreate NULL Check Fail
  日期:2018-03-06 17:06:40 点击:40 评论:0
Chrome: V8: JIT: JSBuiltinReducer::ReduceObjectCreate fails to ensure that the prototype is null I think this commit has introduced the bug.a href=https://chromium.googlesource.com/v8/v8/+/ff7063c7d5d8ad8eafcce3da59e65d7fe2b4f915%5E%21/#F2 title= cl
Chrome V8 Out-Of-Bounds Read
  日期:2018-03-06 17:05:59 点击:36 评论:0
Chrome: V8: Empty BytecodeJumpTable may lead to OOB read In the current implementation, the bytecode generator also emits empty jump tables.a href=https://cs.chromium.org/chromium/src/v8/src/interpreter/bytecode-array-writer.cc?rcl=111e990462823c9fa
Chrome V8 JIT Optmization Bug
  日期:2018-03-06 17:05:34 点击:39 评论:0
Chrome: V8: JIT: Simplified-lowererer IrOpcode::kStoreField, IrOpcode::kStoreElement optimization bug I think this commit has introduced the bugs: a href=https://chromium.googlesource.com/v8/v8/+/c22ca7f73ba92f22d0cd29b06bb2944a545a8d3e%5E%21/#F0 ti
Softros Network Time System Server 2.3.4 Denial Of Service
  日期:2018-03-06 17:04:54 点击:29 评论:0
[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/SOFTROS-NETWORK-TIME-SYSTEM-SERVER-v2.3.4-DENIAL-OF-SERVICE.txt[+] ISR: Apparition Security Vendor:=============www.sof
Chrome V8 JIT GetSpecializationContext Type Confusion
  日期:2018-03-06 17:04:25 点击:27 评论:0
Chrome: V8: JIT: Type confusion in GetSpecializationContext PoC:function* opt(arg = () = arg) { let tmp = opt.x; // LdaNamedProperty for (;;) { arg; yield; function inner() { tmp; } break; }}for (let i = 0; i 100000; i++) { opt();}PoC for release bu
Memcached - 'memcrashed' Denial of Service
  日期:2018-03-06 17:03:07 点击:40 评论:0
# Written by Alex Conrey # Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44254.zip # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General
Tenda AC15 Router - Pe-authenticated Remote Code Execution
  日期:2018-03-06 17:01:49 点击:31 评论:0
#!/usr/bin/env python # EDB Note ~ Source: https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/ import urllib2 import struct import time import socket from optparse import * import SimpleHTTPServer import SocketServer import threading im
ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions
  日期:2018-03-06 17:00:50 点击:24 评论:0
ActivePDF Toolkit 8.1.0 multiple RCE Introduction ============ The ActivePDF Toolkit is a Windows library which enhances business processes to stamp, stitch, merge, form-fill, add digital signatures, barcodes to PDF. Both .NET and native APIs are pro
Sophos UTM 9.410 - 'loginuser' 'confd' Service Privilege Escalation
  日期:2018-03-06 16:59:38 点击:93 评论:0
KL-001-2018-007 : Sophos UTM 9 loginuser Privilege Escalation via confd Service Title: Sophos UTM 9 loginuser Privilege Escalation via confd Service Advisory ID: KL-001-2018-007 Publication Date: 2018.03.02 Publication URL: https://www.korelogic.com/
Dup Scout Enterprise 10.5.12 - 'Share Username' Local Buffer Overflow
  日期:2018-03-06 16:59:02 点击:36 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: Dup Scout Enterprise 10.5.12 - Local Buffer Overflow # Date: 02-22-2018 # Vulnerable Software: Dup Scout Enterprise v10.5.12 # Vendor Homepage: http://www.dupscout.com # Ve
Xion 1.0.125 - '.m3u' Local SEH-Based Unicode Venetian Exploit
  日期:2018-03-06 16:57:42 点击:20 评论:0
#!/usr/bin/perl # ######################################################################## # Title: Xion 1.0.125 (.m3u File) Local SEH-based Unicode The Venetian Exploit # Vulnerability Type: Execute Code, Overflow UTF-16LE buffer, Memory corruption
Papenmeier WiFi Baby Monitor Free & Lite < 2.02.2 - Remote Audio Record
  日期:2018-03-06 16:56:23 点击:115 评论:0
Whilst analysing a number of free communication based applications on the Google Play Store, I took a look at WiFi Baby Monitor: Free Lite (the free version of WiFi Baby Monitor). Although the premium version offered users the ability to specify a pa
NETGEAR Magic telnetd Enabler
  日期:2018-03-05 15:31:10 点击:32 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Udp include Msf::
DualDesk 20 - 'Proxy.exe' Denial of Service
  日期:2018-03-05 15:30:21 点击:24 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/DUALDESK-v20-DENIAL-OF-SERVICE.txt [+] ISR: Apparition Security Vendor: =============== www.dualdesk.com Product: ====
SEGGER embOS/IP FTP Server 3.22 - Denial of Service
  日期:2018-03-05 15:29:41 点击:35 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/SEGGER-embOS-FTP-SERVER-v3.22-FTP-COMMANDS-DENIAL-OF-SERVICE.txt [+] ISR: Apparition Security Vendor: ============= ww
IrfanView 4.50 Email Plugin - Buffer Overflow (SEH Unicode)
  日期:2018-03-05 15:29:06 点击:42 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: IrfanView 4.50 Email PlugIn - Local Buffer Overflow (SEH Unicode) # Date: 02-07-2018 # Vulnerable Software: IrfanView 4.50 Email PlugIn # Vendor Homepage: http://www.irfanv
IrfanView 4.44 Email Plugin - Buffer Overflow (SEH)
  日期:2018-03-05 15:28:22 点击:23 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: IrfanView 4.44 Email PlugIn - Local Buffer Overflow (SEH) # Date: 02-07-2018 # Vulnerable Software: IrfanView 4.44 Email PlugIn # Vendor Homepage: http://www.irfanview.com/
ActivePDF Toolkit Code Execution
  日期:2018-03-01 15:02:39 点击:54 评论:0
ActivePDF Toolkit 8.1.0 multiple RCEIntroduction============The ActivePDF Toolkit is a Windows library which enhances businessprocesses to stamp, stitch, merge, form-fill, add digital signatures,barcodes to PDF. Both .NET and native APIs are provide
Sony Playstation 4 (PS4) 4.07 Code Execution
  日期:2018-03-01 14:59:25 点击:25 评论:0
function stage4_(){ function malloc(sz) { var backing = new Uint8Array(1000+sz); window.nogc.push(backing); var ptr = p.read8(p.leakval(backing).add32(0x10)); ptr.backing = backing; return ptr; } function malloc32(sz) { var backing = new Uint8Array(
共637页/12733条记录 首页 上一页 [38] [39] [40] 41 [42] [43] [44] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved