首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Apple iOS 11.2.5 / watchOS 4.2.2 / tvOS 11.2.5 - 'bluetoothd' Memory Corruption
  日期:2018-03-01 14:55:30 点击:30 评论:0
// // main.m // bluetoothdPoC // // Created by Rani Idan. // Copyright 2018 zLabs. All rights reserved. // #import AppDelegate.h #include mach/mach.h extern kern_return_t bootstrap_look_up(mach_port_t bs, const char *service_name, mach_port_t *servic
Concrete5 < 8.3.0 - Username / Comments Enumeration
  日期:2018-02-28 14:33:17 点击:24 评论:0
#!/usr/bin/env python3 # Concrete5 8.3 vulnerable to Authorization Bypass Through User-Controlled Key (IDOR) # CVE-2017-18195 # Chapman (R3naissance) Schleiss from queue import Queue from threading import Thread from bs4 import BeautifulSoup from ta
Microsoft Windows Windows 8.1/2012 R2 - SMB Denial of Service
  日期:2018-02-28 14:32:30 点击:71 评论:0
# Exploit Title: Microsoft Windows SMB Client Null Pointer Dereference Denial of Service # Date: 26/02/2018 # Exploit Author: Nabeel Ahmed # Version: SMBv3 # Tested on: Windows 8.1 (x86), Windows Server 2012 R2 (x64) # CVE : CVE-2018-0833 import Soc
GetGo Download Manager 5.3.0.2712 - Buffer Overflow (SEH)
  日期:2018-02-28 14:31:45 点击:25 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: GetGo Download Manager 5.3.0.2712 - Remote Buffer Overflow (SEH) # Date: 02-24-2018 # Vulnerable Software: GetGo Download Manager 5.3.0.2712 # Vendor Homepage: http://www.
Sony Playstation 4 4.55 FW - Local Kernel
  日期:2018-02-28 14:30:25 点击:20 评论:0
function stage4_() { function malloc(sz) { var backing = new Uint8Array(1000+sz); window.nogc.push(backing); var ptr = p.read8(p.leakval(backing).add32(0x10)); ptr.backing = backing; return ptr; } function malloc32(sz) { var backing = new Uint8Array(
Asterisk 15.2.0 chan_pjsip INVITE Denial Of Service
  日期:2018-02-27 12:31:36 点击:61 评论:0
# Crash occurs when sending a repeated number of INVITE messages over TCP or TLS transport- Authors: - Alfred Farrugia alfred@enablesecurity.com - Sandro Gauci sandro@enablesecurity.com- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip
Asterisk 15.2.0 chan_pjsip SDP Media Format Denial Of Service
  日期:2018-02-27 12:30:55 点击:35 评论:0
# Segmentation fault occurs in Asterisk with an invalid SDP media format description- Authors: - Alfred Farrugia alfred@enablesecurity.com - Sandro Gauci sandro@enablesecurity.com- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip`- Ref
Asterisk 15.2.0 chan_pjsip SDP fmtp Denial Of Service
  日期:2018-02-27 12:30:06 点击:34 评论:0
# Segmentation fault occurs in asterisk with an invalid SDP fmtp attribute- Authors: - Alfred Farrugia alfred@enablesecurity.com - Sandro Gauci sandro@enablesecurity.com- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip`- References: A
Asterisk 15.2.0 chan_pjsip SUBSCRIBE Stack Corruption
  日期:2018-02-27 12:28:51 点击:23 评论:0
# SUBSCRIBE message with a large Accept value causes stack corruption- Authors: - Alfred Farrugia alfred@enablesecurity.com - Sandro Gauci sandro@enablesecurity.com- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip`- Tested vulnerable
Chrome V8 PropertyArray Integer Overflow
  日期:2018-02-27 12:28:18 点击:61 评论:0
Chrome: V8: Integer overflow with PropertyArray There's a snippet of the MigrateFastToFast function which is used to create a new PropertyArray object. int number_of_fields = new_map-NumberOfFields(); int inobject = new_map-GetInObjectProperties();
Chrome V8 TranslatedState::MaterializeCapturedObjectAt Caching Bug
  日期:2018-02-27 12:27:39 点击:41 评论:0
Chrome: V8: TranslatedState::MaterializeCapturedObjectAt caching bug Here'a snippet of TranslatedState::MaterializeCapturedObjectAt. case JS_SET_KEY_VALUE_ITERATOR_TYPE: case JS_SET_VALUE_ITERATOR_TYPE: { HandleJSSetIterator object = HandleJSSetIter
Microsoft Edge Chakra JIT CallRegExSymbolFunction Return Check Fail
  日期:2018-02-27 12:26:54 点击:18 评论:0
Microsoft Edge: Chakra: JIT: CallRegExSymbolFunction doesn#39;t check the return type The CallRegExSymbolFunction method is used to call symbol functions in regexp objects. But it doesn't check the return value's type. Since the user can define the
Disk Savvy Enterprise 10.4.18 Buffer Ovreflow
  日期:2018-02-26 16:51:35 点击:36 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Tcp include Msf::Expl
CloudMe Sync 1.10.9 Buffer Overflow
  日期:2018-02-26 16:50:51 点击:40 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::Tcp include Msf::Expl
AsusWRT LAN Unauthenticated Remote Code Execution
  日期:2018-02-26 16:49:57 点击:49 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include
UserSpice 4.3 - Blind SQL Injection
  日期:2018-02-26 16:39:21 点击:23 评论:0
#!/usr/env/python Application UserSpice PHP user management Vulnerability UserSpice = 4.3 Blind SQL Injection exploit URL https://userspice.com Date 1.2.2018 Author Dolev Farhi About the App: What makes userspice different from almost any other PHP U
Wavpack 5.1.0 - Denial of Service
  日期:2018-02-26 16:36:58 点击:78 评论:0
# Exploit title: Wavpack 5.1.0 - Denial of Service # Date: 20.02.2018 # Exploit Author: r4xis # https://github.com/r4xis # # Vendor Homepage: http://www.wavpack.com/ # Software Links: http://www.wavpack.com/downloads.html # https://github.com/dbry/W
Microsoft Internet Explorer 11 - 'Js::RegexHelper::RegexReplace' Use-After-Free
  日期:2018-02-26 16:36:15 点击:28 评论:0
!-- There is a Use-after-free vulnerability in Internet Explorer that could potentially be used for memory disclosure. This was tested on IE11 running on Window 7 64-bit with the latest patches applied. Note that the PoC was tested in a 64-bit tab p
Microsoft Windows Kernel - 'nt!RtlpCopyLegacyContextX86' Stack Memory Disclosure
  日期:2018-02-26 16:35:29 点击:66 评论:0
/* We have discovered a new Windows kernel memory disclosure vulnerability in the creation and copying of a CONTEXT structure to user-mode memory. Two previous bugs in the nearby code area were reported in issues #1177 and #1311 ; in fact, the probl
Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module < 4.25 - Denial of
  日期:2018-02-26 16:34:24 点击:48 评论:0
# Exploit Title: Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module V4.25 - Denial of Service # Date: 14.02.2018 # Exploit Author: M. Can Kurnaz # Contact: https://twitter.com/0x43414e # Vendor Homepage: https://www.siemens.com # Version:
共637页/12733条记录 首页 上一页 [39] [40] [41] 42 [43] [44] [45] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved