首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
VX Search Enterprise 10.1.12 - Denial of Service
  日期:2018-01-09 14:22:18 点击:19 评论:0
# Exploit Title: VX Search Enterprise Server v10.1.12 - Denial of Service # Date: 2017-10-20 # Exploit Author: Ahmad Mahfouz # Software Link: http://www.vxsearch.com/setups/vxsearchsrv_setup_v10.1.12.exe # Version: v10.1.12 # Category; Windows Remote
Cisco IOS - Remote Code Execution
  日期:2018-01-08 16:12:22 点击:64 评论:0
#!/usr/bin/env python if False: ''' CVE-2017-6736 / cisco-sa-20170629-snmp Cisco IOS remote code execution =================== This repository contains Proof-Of-Concept code for exploiting remote code execution vulnerability in SNMP service disclosed
Microsoft Windows win32k - Using SetClassLong to Switch Between CS_CLASSDC and C
  日期:2018-01-08 16:11:41 点击:82 评论:0
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1389desc=6 Windows maintains a DC cache in win32kbase!gpDispInfo-pdceFirst. If you create multiple windows from a shared class while switching between CS_OWNDC and CS_CLASSDC, you can
GetGo Download Manager 5.3.0.2712 - 'Proxy' Buffer Overfl
  日期:2018-01-08 16:10:42 点击:26 评论:0
# Exploit Title: Buffer overflow vulnerability in GetGo Download Manager proxy options 5.3.0.2712 # Date: 01-02-2018 # Tested on Windows 8 64 bits # Exploit Author: devcoinfet # Contact: https://twitter.com/wabefet # Software Link: http://www.getgoso
Ayukov NFTP FTP Client Buffer Overflow
  日期:2018-01-05 16:00:26 点击:40 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::TcpServer def initia
VMware Workstation ALSA Config File Local Privilege Escalation
  日期:2018-01-05 15:58:25 点击:39 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Exploit::EXE include Msf::Post::Fil
D-Link DNS-320L 'mydlinkBRionyg' Backdoor
  日期:2018-01-05 15:57:53 点击:63 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def ini
Western Digital WDMyCloud 'mydlinkBRionyg' Backdoor
  日期:2018-01-05 15:56:26 点击:82 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def ini
Iopsys Router - 'dhcp' Remote Code Execution
  日期:2018-01-05 15:55:27 点击:59 评论:0
#!/usr/bin/python import json import sys import subprocess import socket import os from time import sleep from websocket import create_connection def ubusAuth(host, username, password): ws = create_connection(ws:// + host, header = [Sec-WebSocket-Pro
Multiple CPUs - 'Spectre' Information Disclosure (PoC)
  日期:2018-01-05 15:51:44 点击:81 评论:0
#include stdio.h #include stdlib.h #include stdint.h #ifdef _MSC_VER #include intrin.h /* for rdtscp and clflush */ #pragma optimize(gt,on) #else #include x86intrin.h /* for rdtscp and clflush */ #endif /**********************************************
Kingsoft Antivirus/Internet Security 9+ - Privilege Escalation
  日期:2018-01-05 15:50:36 点击:27 评论:0
Kingsoft Antivirus/Internet Security 9+ Kernel Stack Buffer Overflow Privilege Escalation Vulnerability Anti-Virus: http://www.kingsoft.co/downloads/kav/KAV100720_ENU_DOWN_331020_10.rar Internet Security: http://www.kingsoft.co/downloads/kis/kis.rar
Linksys WVBR0-25 User-Agent Command Execution
  日期:2018-01-04 16:01:00 点击:37 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def ini
Xplico Remote Code Execution
  日期:2018-01-04 15:59:44 点击:44 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def in
Samsung Internet Browser 6.2.01.12 SOP Bypass / UXSS Vulnerabilities
  日期:2018-01-04 15:58:21 点击:41 评论:0
From: https://poctestblog.blogspot.co.uk/2017/12/samsung-internet-browser-sop-bypassuxss.html Samsung Internet Browser SOP Bypass/UXSS There is a Same Origin Policy bypass / Universal Cross Site Scripting issue in Samsung Internet Browser (tested on
Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Esca
  日期:2018-01-03 16:28:27 点击:26 评论:0
// A proof-of-concept local root exploit for CVE-2017-1000112. // Includes KASLR and SMEP bypasses. No SMAP bypass. // Tested on Ubuntu trusty 4.4.0-* and Ubuntu xenial 4-8-0-* kernels. // // Usage: // user@ubuntu:~$ uname -a // Linux ubuntu 4.8.0-58
Huawei Router HG532 - Arbitrary Command Execution
  日期:2018-01-02 15:49:11 点击:66 评论:0
import threading, sys, time, random, socket, re, os, struct, array, requests from requests.auth import HTTPDigestAuth ips = open(sys.argv[1], r).readlines() cmd = # Your MIPS (SSHD) rm = ?xml version=1.0 ?n s:Envelope xmlns:s= http://schemas.xmls
Cambium ePMP1000 - 'get_chart' Shell via Command Injection
  日期:2018-01-02 15:48:20 点击:49 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def
Cambium ePMP1000 - 'ping' Shell via Command Injection (Metasploit)
  日期:2018-01-02 15:47:29 点击:59 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def
HP Mercury LoadRunner Agent magentproc.exe - Remote Command Execution (Metasploi
  日期:2018-01-02 15:46:41 点击:70 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp include Ms
D3DGear 5.00 Build 2175 - Buffer Overflow
  日期:2018-01-02 15:45:40 点击:28 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: D3DGear 5.00 Build 2175 - Buffer Overflow # Date: 07-11-2017 # Vulnerable Software: D3DGear 5.00 Build 2175 # Vendor Homepage: http://www.d3dgear.com/ # Version: 5.00 Build
共637页/12733条记录 首页 上一页 [47] [48] [49] 50 [51] [52] [53] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved