首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
JBoss Remoting 6.14.18 - Denial of Service
  日期:2018-02-26 16:33:27 点击:48 评论:0
# Exploit Title: Exploit Denial of Service JBoss Remoting (4447/9999) # Date: 14-02-2018 # Exploit Author: Frank Spierings # Vendor Homepage: https://www.redhat.com/en/technologies/jboss-middleware/application-platform/get-started # Software Link: h
Chrome V8 - 'Runtime_RegExpReplace' Integer Overflow
  日期:2018-02-26 16:32:20 点击:20 评论:0
/* Here's a snippet of the method. ASSIGN_RETURN_FAILURE_ON_EXCEPTION( isolate, captures_length_obj, Object::ToLength(isolate, captures_length_obj)); const int captures_length = PositiveNumberToUint32(*captures_length_obj); ... if (functional_replace
Microsoft Edge Chakra JIT - 'LdThis' Type Confusion
  日期:2018-02-26 16:29:55 点击:19 评论:0
/* LdThis instructions' value type is assumed to be Object. Since this can be other objects like an array, it has to be assumed to be LikelyObject, otherwise, operations to this will not be checked properly. PoC: */ function opt(arr) { arr[0] = 1.1;
Microsoft Edge Chakra JIT - 'NewScObjectNoCtor' Array Type Confusion
  日期:2018-02-26 16:29:18 点击:17 评论:0
/* This is similar to the previous issues 1457, 1459 (MSRC 42551, MSRC 42552). If a JavaScript function is used as a consturctor, it sets the new object's __proto__ to its prototype. The JIT compiler uses NewScObjectNoCtor instructions to perform it
Microsoft Edge Chakra JIT - 'Array.prototype.reverse' Array Type Confusion
  日期:2018-02-26 16:28:19 点击:27 评论:0
/* This is simillar to the previous issue 1457. But this time, we use Array.prototype.reverse. Array.prototype.reverse can be inlined and may invoke EnsureNonNativeArray to convert the prototype of this to a Var array. Call flow: JavascriptArray::En
Microsoft Edge Chakra JIT - Array Type Confusion via InitProto Instructions
  日期:2018-02-26 16:27:42 点击:18 评论:0
/* If a native array is used as a prototype, it is converted to a Var array by the Js::JavascriptNativeFloatArray::SetIsPrototype method. In the JIT compiler, it uses InitProto instructions to set object literals' prototype. But when optimizing thos
Microsoft Edge Chakra JIT - ImplicitCallFlags Checks Bypass
  日期:2018-02-26 16:27:05 点击:66 评论:0
/* Here's a snippet of ExecuteImplicitCall which is responsible for updating the ImplicitCallFlags flag. template class Fn inline Js::Var ExecuteImplicitCall(Js::RecyclableObject * function, Js::ImplicitCallFlags flags, Fn implicitCall) { ... Js::Im
Microsoft Edge Chakra JIT - Memory Corruption
  日期:2018-02-26 16:26:20 点击:22 评论:0
/* Let's consider the following example code. function opt() { let arr = []; return arr['x']; } // Optimize the opt function. for (let i = 0; i 100; i++) { opt(); } Array.prototype.__defineGetter__('x', function () { }); opt(); Once the opt function
Microsoft Edge Chakra JIT - 'GlobOpt::OptTagChecks' Must Consider IsLoopPrePass
  日期:2018-02-26 16:25:30 点击:29 评论:0
It seems this is the patch for the bug. https://github.com/Microsoft/ChakraCore/pull/4226/commits/874551dd00ff6f404e593c7e0162efb54b953f5a The following two cases will bypass the fix. 1: function opt() { let obj = new Number(2.3023e-320); for (let i
GNU binutils 2.26.1 - Integer Overflow (PoC)
  日期:2018-02-26 16:24:10 点击:24 评论:0
# Exploit Title: Objdump - Integer Overflow Crash POC # Date: 12.02.2018 # Exploit Author: r4xis # Tested Version: 2.26.1 # Vuln Version: 2.29.1 # CVE: cve-2018-6323 # Tested on: Ubuntu 16.04 32-bit # Vulnerability Details: # https://www.cvedetails.
NoMachine < 6.0.80 (x64) - 'nxfuse' Privilege Escalation
  日期:2018-02-26 16:22:29 点击:31 评论:0
from ctypes import * from ctypes.wintypes import * import struct import sys import os MEM_COMMIT = 0x00001000 MEM_RESERVE = 0x00002000 PAGE_EXECUTE_READWRITE = 0x00000040 GENERIC_READ = 0x80000000 GENERIC_WRITE = 0x40000000 OPEN_EXISTING = 0x3 STATU
NoMachine < 6.0.80 (x86) - 'nxfuse' Privilege Escalation
  日期:2018-02-26 16:20:58 点击:22 评论:0
#include stdafx.h #include Windows.h #define DEVICE L\\.\nxfs-709fd562-36b5-48c6-9952-302da6218061 #define DEVICE2 L\\.\nxfs-net-709fd562-36b5-48c6-9952-302da6218061{709fd562-36b5-48c6-9952-302da6218061} #define IOCTL 0x00222014 #define IOCTL2
MagniComp SysInfo - mcsiwrapper Privilege Escalation (Metasploit)
  日期:2018-02-26 16:13:55 点击:59 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include Msf::Exploit
ABRT - raceabrt Privilege Escalation(Metasploit)
  日期:2018-02-26 16:01:04 点击:32 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include Msf::Exploit
Disk Pulse Enterprise 10.4.18 - 'Import Command' Buffer Overflow (SEH)
  日期:2018-02-26 16:00:08 点击:47 评论:0
#!/usr/bin/env python # Exploit Title: Disk Pulse Enterprise v10.4.18 - 'Import Command' Buffer Overflow (SEH) # Date: 2018-01-22 # Exploit Author: Daniel Teixeira # Author Homepage: www.danielteixeira.com # Vendor Homepage: http://www.diskpulse.com
Disk Savvy Enterprise 10.4.18 - Buffer Overflow (SEH)
  日期:2018-02-26 15:58:57 点击:72 评论:0
# Exploit Title: Disk Savvy Enterprise v10.4.18 Server - Unauthenticated Remote Buffer Overflow SEH # Date: 01/02/2018 # Exploit Author: Daniel Teixeira # Vendor Homepage: http://www.disksavvy.com/ # Software Link: http://www.disksavvy.com/setups/di
EChat Server 3.1 - 'CHAT.ghp' Buffer Overflow
  日期:2018-02-26 15:58:10 点击:39 评论:0
# Exploit Author: Juan Sacco jsacco@exploitpack.com # Vulnerability found using Exploit Pack v10 - http://exploitpack.com # # Impact: # An attacker could exploit this vulnerability to execute arbitrary code in the # context of the application. Faile
μTorrent (uTorrent) Classic/Web - JSON-RPC Remote Code Execution / Information
  日期:2018-02-26 15:57:21 点击:337 评论:0
By default, utorrent create an HTTP RPC server on port 10000 (uTorrent classic) or 19575 (uTorrent web). There are numerous problems with these RPC servers that can be exploited by any website using XMLHTTPRequest(). To be clear, visiting *any* webs
Advantech WebAccess 8.3.0 - Remote Code Execution
  日期:2018-02-26 15:56:16 点击:39 评论:0
Vulnerability Title: Advantech WebAccess Node8.3.0 AspVBObj.dll - Remote Code Execution Discovered by: Nassim Asrir Contact: wassline@gmail.com / https://www.linkedin.com/in/nassim-asrir-b73a57122/ CVE: CVE-2018-6911 Tested on: IE11 / Win10 Technica
CloudMe Sync < 1.11.0 - Buffer Overflow
  日期:2018-02-26 15:55:21 点击:98 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txt [+] ISR: Apparition Security [+] SSD Beyond Security Submissi
共637页/12733条记录 首页 上一页 [40] [41] [42] 43 [44] [45] [46] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved