首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
Linux Kernel < 4.16.11 - 'ext4_read_inline_data()' Memory Corruption
  日期:2018-06-11 17:18:23 点击:10 评论:0
ext4 can store data for small regular files as inline data, meaning that the data is stored inside the corresponding inode instead of in separate blocks. Inline data is stored in two places: The first 60 bytes go in the i_block field in the inode (wh
Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasp
  日期:2018-06-11 17:15:32 点击:13 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/exe' require 'msf/core/exploit/powershell' class MetasploitModule Msf::Exploit::Local
CyberArk < 10 - Memory Disclosure
  日期:2018-06-11 17:14:45 点击:3 评论:0
# Exploit Title: CyberArk 10 - Memory Disclosure # Date: 2018-06-04 # Exploit Author: Thomas Zuk # Vendor Homepage: https://www.cyberark.com/products/privileged-account-security-solution/enterprise-password-vault/ # Version: 9.7 and 10 # Tested on: W
Zip-n-Go 4.9 - Buffer Overflow (SEH)
  日期:2018-06-11 17:14:01 点击:5 评论:0
#!/usr/bin/python #----------------------------------------------------------------------------------------------------------# # Exploit Title : Zip-n-Go v4.9 - Local Buffer Overflow (SEH) # # Exploit Author : Hashim Jawad - @ihack4falafel # # Vendor
Git < 2.17.1 - Remote Code Execution
  日期:2018-06-11 17:13:03 点击:2 评论:0
# Exploit Title: Git (code execution) # Date: 2018-05-29 # Exploit Author: JameelNabbo # Website: jameelnabbo.com http://jameelnabbo.com/ # Vendor Homepage: https://github.com/git/git https://github.com/git/git # CVE: CVE-2018-11235 #Version: =2.17.1
Microsoft Edge Chakra - EntrySimpleObjectSlotGetter Type Confusion
  日期:2018-06-11 17:12:24 点击:2 评论:0
/* function opt(w, arr) { arr[0] = 1.1; let res = w.event; arr[0] = 2.3023e-320; return res; } let arr = [1.1]; for (let i = 0; i 10000; i++) { opt(window, arr); } The above code will be compiled as follows: 000001a8`8000122b 48b8503dcfd5ff7f0000 mov
Sony Playstation 4 (PS4) 5.1 - Kernel (PoC)
  日期:2018-06-11 16:56:34 点击:1 评论:0
log(--- trying kernel exploit --); function malloc(sz) { var backing = new Uint8Array(0x10000+sz); window.nogc.push(backing); var ptr = p.read8(p.leakval(backing).add32(0x10)); ptr.backing = backing; return ptr; } function malloc32(sz) { var backing
Procps-ng - Multiple Vulnerabilities
  日期:2018-05-31 17:44:26 点击:15 评论:0
Qualys Security Advisory Procps-ng Audit Report ======================================================================== Contents ======================================================================== Summary 1. FUSE-backed /proc/PID/cmdline 2. Unp
Siemens SIMATIC S7-300 CPU - Remote Denial of Service
  日期:2018-05-31 17:43:03 点击:3 评论:0
# Exploit Title: Siemens SIMATIC S7-300 CPU - Remote Denial Of Service # Google Dork: inurl:/Portal/Portal.mwsl # Date: 2018-05-30 # Exploit Author: t4rkd3vilz # Vendor Homepage: https://www.siemens.com/ # Version: SIMATIC S7-300 CPU family: all vers
GNU Barcode 0.99 - Memory Leak
  日期:2018-05-30 16:23:58 点击:7 评论:0
# GNU Barcode 0.99 - Memory Leak # Vendor: The GNU Project | Free Software Foundation, Inc. # Product web page: https://www.gnu.org/software/barcode/ # https://directory.fsf.org/wiki/Barcode # Affected version: 0.99 # Tested on: Ubuntu 16.04.4 # Auth
GNU Barcode 0.99 - Buffer Overflow
  日期:2018-05-30 16:18:03 点击:6 评论:0
# GNU Barcode 0.99 - Buffer Overflow # Vendor: The GNU Project | Free Software Foundation, Inc. # Product web page: https://www.gnu.org/software/barcode/ # https://directory.fsf.org/wiki/Barcode # Author: Gjoko 'LiquidWorm' Krstic # Tested on: Ubuntu
ALFTP 5.31 - Local Buffer Overflow (SEH Bypass)
  日期:2018-05-29 16:25:30 点击:4 评论:0
# Exploit Title: ALFTP 5.31 - Local Buffer Overflow (SEH Bypass) # Exploit Author: Gokul Babu # Vendor Homepage: http://www.altools.com/downloads/alftp.aspx # Vulnerable Software: http://advert.estsoft.com/?event=201001127730323 # Tested on: Windows
CloudMe Sync < 1.11.0 - Buffer Overflow (SEH) (DEP Bypass)
  日期:2018-05-29 16:24:14 点击:9 评论:0
# Exploit: CloudMe Sync 1.11.0 - Buffer Overflow (SEH) (DEP Bypass) # Date: 2018-05-27 # Author: Juan Prescotto # Tested Against: Win7 Pro SP1 64 bit # Software Download: https://www.cloudme.com/downloads/CloudMe_1109.exe # Tested Against Version: 1.
Bitmain Antminer D3/L3+/S9 - Remote Command Execution
  日期:2018-05-28 16:13:24 点击:7 评论:0
# Exploit Title: Bitmain Antminer D3, L3+, and S9 devices allow Remote Command Execution # Google Dork: N/A # Date: 27/05/2018 # Exploit Author: Corrado Liotta # Vendor Homepage: https://www.bitmain.com/ # Software Link: N/A # Version: Antminer - D3
D-Link DSL-2750B - OS Command Injection (Metasploit)
  日期:2018-05-28 16:12:37 点击:35 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpClient includ
Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write
  日期:2018-05-28 16:11:47 点击:11 评论:0
!-- Skia bug report: https://bugs.chromium.org/p/skia/issues/detail?id=7674 Mozilla bug report: https://bugzilla.mozilla.org/show_bug.cgi?id=1441941 In Skia, SkTDArray stores length (fCount) and capacity (fReserve) as 32-bit ints and does not perfor
Microsoft Edge Chakra - Cross Context Use-After-Free
  日期:2018-05-28 16:11:11 点击:9 评论:0
!-- 1. Background The CrossSite class is used for passing JavaScript variables across different contexts. Chakra is basically trying to wrap every variable being passed from a context to another context. The way it wraps an object is, first overwrit
SAP Internet Transaction Server 6200.x - Session Fixation / Cross-Site Scripting
  日期:2018-05-28 16:10:16 点击:6 评论:0
# Exploit Title: SAP Internet Transaction Server (ITS) 6200.X.X - Session Fixation/ Cross-Site Scripting # Dork: /scripts/wgate/ # Date: 25.05.2018 # Exploit Author: J. Carrillo Lencina (0xd0m7) # Vendor Homepage: https://www.sap.com # Version: SAP
GNU glibc < 2.27 - Local Buffer Overflow
  日期:2018-05-28 16:09:12 点击:15 评论:0
# Exploit Title: GNU glibc 2.27 - Local Buffer Overflow # Date: 2018-05-24 # Exploit Author: JameelNabbo # Website: jameelnabbo.com http://jameelnabbo.com/ # Vendor Homepage: http://www.gnu.org/ http://www.gnu.org/ # CVE: CVE-2018-11237 # POC: $ cat
Microsoft Internet Explorer 11 (Windows 7 x64/x86) - vbscript Code Execution
  日期:2018-05-28 16:07:03 点击:56 评论:0
!doctype html html lang=en head meta http-equiv=Content-Type content=text/html; charset=UTF-8 meta http-equiv=x-ua-compatible content=IE=10 meta http-equiv=Expires content=0 meta http-equiv=Pragma content=no-cache meta http-equiv=Cache-control conte
共612页/12228条记录 首页 上一页 [1] [2] [3] [4] 5 [6] [7] 下一页 末页
  本月热点文章
·Nagios XI 5.2.6-5.4.12 - Cha
·Enhanced Mitigation Experien
·HomeMatic Zentrale CCU2 Unau
·D-Link DIR601 2.02 - Credent
·DHCP Client - Command Inject
·HP VAN SDN Controller Root C
·VMware NSX SD-WAN Edge < 3.1
·Microsoft Windows .library-m
·FTPShell Client 6.70 (Enterp
·Oracle WebLogic 12.1.2.0 - R
·Microsoft Windows POP/MOV SS
·CMS Made Simple 2.2.5 Authen
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved