首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Polygonize PC 1.1 Remote Command Execution
  日期:2018-01-11 15:17:39 点击:23 评论:0
============================================================================================================================| # Title : Polygonize PC v1.1 RCE Vulnerability || # Author : indoushka || # email : indoushka4ever@gmail.com || # Tested on
Jungo Windriver 12.5.1 - Privilege Escalation
  日期:2018-01-11 15:15:36 点击:58 评论:0
// ConsoleApplication1.cpp : Defines the entry point for the console application. // #include stdafx.h #include Windows.h #include winioctl.h #define device L \\.\WINDRVR1251 #define SPRAY_SIZE 30000 typedef NTSTATUS(WINAPI *PNtAllocateVirtualMem
Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Intege
  日期:2018-01-11 15:14:36 点击:33 评论:0
/* The method Lowerer::LowerSetConcatStrMultiItem is used to generate machine code to concatenate strings. Here's a snippet of the method. void Lowerer::LowerSetConcatStrMultiItem(IR::Instr * instr) { ... IR::IndirOpnd * dstLength = IR::IndirOpnd::N
DiskBoss Enterprise 8.8.16 - Buffer Overflow
  日期:2018-01-11 15:13:29 点击:37 评论:0
# Exploit Title: DiskBoss = 8.8.16 - Unauthenticated Remote Code Execution # Date: 2017-08-27 # Exploit Author: Arris Huijgen # Vendor Homepage: http://www.diskboss.com/ # Software Link: http://www.diskboss.com/setups/diskbossent_setup_v8.8.16.exe #
HPE iMC dbman RestoreDBase Unauthenticated Remote Command Execution
  日期:2018-01-10 17:46:39 点击:24 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Msf::
HPE iMC dbman RestartDB Unauthenticated Remote Command Execution
  日期:2018-01-10 17:45:43 点击:24 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Msf::
Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
  日期:2018-01-10 17:42:37 点击:138 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::FileDropper include Ms
Commvault Communications Service (cvd) - Command Injection (Metasploit)
  日期:2018-01-10 17:41:46 点击:30 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' class MetasploitModule Msf::Exploit::Remote Rank = GoodRanking include Ms
Microsoft Windows - 'nt!NtQuerySystemInformation (information class 138, QueryMe
  日期:2018-01-10 17:40:37 点击:27 评论:0
/* We have discovered that the nt!NtQuerySystemInformation system call invoked with the 138 information class discloses portions of uninitialized kernel pool memory to user-mode clients. The specific information class is handled by an internal nt!Ex
Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryPr
  日期:2018-01-10 17:39:53 点击:29 评论:0
/* We have discovered that the nt!NtQueryInformationProcess system call invoked with the 76 information class discloses portions of uninitialized kernel stack memory to user-mode clients. The specific information class is handled by an internal nt!P
Microsoft Edge Chakra JIT - Escape Analysis Bug
  日期:2018-01-10 17:39:11 点击:21 评论:0
/* Escape analysis: https://en.wikipedia.org/wiki/Escape_analysis Chakra fails to detect if tmp escapes the scope, allocates it to the stack. This may lead to dereference uninitialized stack values. PoC: */ function opt() { let tmp = []; tmp[0] = tm
Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
  日期:2018-01-10 17:38:26 点击:30 评论:0
/* Here's a snippet of AsmJSByteCodeGenerator::EmitAsmJsFunctionBody. AsmJsVar * initSource = nullptr; if (decl-sxVar.pnodeInit-nop == knopName) { AsmJsSymbol * initSym = mCompiler-LookupIdentifier(decl-sxVar.pnodeInit-name(), mFunction); if (initSy
Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not Ins
  日期:2018-01-10 17:37:50 点击:29 评论:0
/* The optimizations for memory operations may leave empty loops as follows: for (let i = 0; i arr.length; i++) { arr[i] = 0; } Becomes: Memset(arr, 0, arr.length); for (let i = 0; i arr.length; i++) { // empty! } These empty loops will be removed b
Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly c
  日期:2018-01-10 17:37:07 点击:43 评论:0
/* 1. Call patterns like Math.max.apply(Math, [1, 2, 3, 4, 5]) and Math.max.apply(Math, arr) can be optimized to directly call the method JavascriptMath::MaxInAnArray in the Inline Phase. 2. The method takes the original method Math.max as the first
FiberHome LM53Q1 - Multiple Vulnerabilities
  日期:2018-01-09 14:28:53 点击:60 评论:0
#!/usr/bin/python # /$$$$$$$$ /$$ /$$ /$$ /$$ /$$$$$$$ /$$ /$$$$$$$$ /$$ /$$ /$$ # | $$_____/|__/| $$ | $$ | $$ | $$__ $$ | $$ | $$_____/ | $$ |__/ | $$ # | $$ /$$| $$$$$$$ /$$$$$$ /$$$$$$ | $$ | $$ /$$$$$$ /$$$$$$/$$$$ /$$$$$$ | $$ $$ /$$$$$$ /$$$
Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command E
  日期:2018-01-09 14:27:47 点击:75 评论:0
#!/usr/bin/env python # -*- coding: utf-8 -*- # Exploit Title: Weblogic wls-wsat Component Deserialization RCE # Date Authored: Jan 3, 2018 # Date Announced: 10/19/2017 # Exploit Author: Kevin Kirsche (d3c3pt10n) # Exploit Github: https://github.com/
BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow (PoC)
  日期:2018-01-09 14:27:06 点击:36 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/BARCODEWIZ-v6.7-ACTIVEX-COMPONENT-BUFFER-OVERFLOW.txt [+] ISR: ApparitionSec Vendor: ================= www.barcodewiz.
DiskBoss Enterprise 8.5.12 - Denial of Service
  日期:2018-01-09 14:26:04 点击:22 评论:0
# Exploit Title: DiskBoss Enterprise Server 8.5.12 - Denial of Service # Date: 2017-10-20 # Exploit Author: Ahmad Mahfouz # Software Link: http:///www.diskboss.com/setups/diskbosssrv_setup_v8.5.12.exe # Version: v10.1.16 # Category; Windows Remote DO
Sync Breeze Enterprise 10.1.16 - Denial of Service
  日期:2018-01-09 14:24:06 点击:21 评论:0
# Exploit Title: Sync Breeze Enterprise Server v10.1.16 - Denial of Service # Date: 2017-10-20 # Exploit Author: Ahmad Mahfouz # Software Link: http://www.syncbreeze.com/setups/syncbreezesrv_setup_v10.1.16.exe # Version: v10.1.16 # Category; Windows
Disk Pulse Enterprise 10.1.18 - Denial of Service
  日期:2018-01-09 14:23:11 点击:38 评论:0
# Exploit Title: Disk Pulse Enterprise Server v10.1.18 - DOS, # Date: 2017-10-20 # Exploit Author: Ahmad Mahfouz # Software Link: http://www.diskpulse.com/setups/diskpulsesrv_setup_v10.1.18.exe # Version: v10.1.18 # Category; Windows Remote DOS # CVE
共637页/12733条记录 首页 上一页 [46] [47] [48] 49 [50] [51] [52] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved