首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
NetTransport 2.96L - Buffer Overflow (DEP Bypass)
  日期:2018-01-02 15:44:35 点击:51 评论:0
# Exploit Title: Buffer overflow in NetTransport Download Manager - Version 2.96L (DEP Bypass) # CVE: CVE-2017-17968 # Date: 28-12-2017 # Software Link: http://xi-soft.com/downloads/NXSetup_x86.zip # Exploit Author: Author: Aloyce J. Makalanga # Cont
ALLMediaServer 0.95 - Buffer Overflow
  日期:2018-01-02 15:43:35 点击:25 评论:0
require 'msf/core' class Metasploit4 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' = 'ALLMediaServer 0.95 Buffer Overflow', 'Description'
pfSense 2.1.3-RELEASE (amd64) Remote Command Execution Exploit
  日期:2018-01-02 15:42:21 点击:60 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient de
HP Insight Control For VMware vCenter Server 7.3 Insecure Permissions Vulnerabil
  日期:2018-01-02 15:40:12 点击:39 评论:0
/* Exploit Title: HP Insight Control for VMware vCenter Server Multiple Vulnerabilities Author: Glafkos Charalambous Version: 7.3 Vendor: HP Vendor URL: http://www.hpe.com HP Case: SSRT101619 Product Description: HP Insight Control for VMware vCente
Kingsoft Antivirus/Internet Security 9+ Privilege Escalation Exploit
  日期:2017-12-28 18:13:56 点击:62 评论:0
Vulnerability Summary The following advisory describes a kernel stack buffer overflow that leads to privilege escalation found in Kingsoft Antivirus / Internet Security 9 + . Kingsoft Antivirus provides effective and efficient protection solution at
ALLMediaServer 0.95 - Buffer Overflow
  日期:2017-12-28 18:12:37 点击:74 评论:0
# Exploit Title: Buffer overflow in ALLPlayer ALLMediaServer 0.95 and earlier # CVE: CVE-2017-17932 # Date: 27-12-2017 # Exploit Author: Aloyce J. Makalanga # Contact: https://twitter.com/aloycemjr # Vendor Homepage: http://www.allmediaserver.org/ #
DotNetNuke DreamSlider 01.01.02 - Arbitrary File Download
  日期:2017-12-28 18:11:01 点击:38 评论:0
# Exploit Title: DotNetNuke DreamSlider Arbitrary File Download # Date: 23/01/2014 # Author: Glafkos Charalambous # Version: 01.01.02 # Vendor: DreamSlider # Vendor URL: http://www.dreamslider.com/ # Google Dork: inurl:/DesktopModules/DreamSlider/ #
SysGauge Server 3.6.18 - Denial of Service
  日期:2017-12-28 18:09:54 点击:58 评论:0
# Exploit Title: SysGauge Server 3.6.18 - DOS # Date: 2017-10-20 # Exploit Author: Ahmad Mahfouz # Software Link: hhttp://www.sysgauge.com/setups/sysgaugesrv_setup_v3.6.18.exe # Version: v3.6.18 # Category; Windows Remote DOS # CVE: CVE-2017-15667 #
Telesquare SKT LTE Router SDT-CS3B1 - Denial of Service
  日期:2017-12-28 17:56:31 点击:47 评论:0
#!/usr/bin/env python # # # Telesquare SKT LTE Router SDT-CS3B1 Remote Reboot Denial Of Service # # # Vendor: Telesquare Co., Ltd. # Product web page: http://www.telesquare.co.kr # Affected version: FwVer: SDT-CS3B1, sw version 1.2.0 # LteVer: ML300S
Sendroid < 6.5.0 - SQL Injection
  日期:2017-12-27 17:56:34 点击:49 评论:0
# Exploit Title: Sendroid - Bulk SMS Portal, Marketing Script( 5.0.0 - 6.5.0 ) - SQL Injection # Google Dork: welcome to * SMS portal # Date: 22/12/2017 # Exploit Author: Onwuka Gideon dongiodmed[@]gmail[.]com Contact: http://twitter.com/@gideon_onwu
COMTREND ADSL Router CT-5367 - Remote Code Execution
  日期:2017-12-27 17:55:48 点击:26 评论:0
# Exploit Title: Globalnet COMTREND ADSL Router CT-5367 Remote Code Execute # Date: 11-12-2017 # Exploit Author: TnMch # Software Link : null # Type : HardWare # Risk of use : High # Type to use : Remote 1. Description Any user can edit all users pas
GetGo Download Manager 5.3.0.2712 Buffer Overflow
  日期:2017-12-25 17:22:11 点击:35 评论:0
# Exploit Title: Buffer overflow vulnerability in GetGo Download Manager 5.3.0.2712# CVE: CVE-2017-17849# Date: 22-12-2017# Tested on Windows 10 32 bits# Exploit Author: Aloyce J. Makalanga# Contact: https://twitter.com/aloycemjr https://twitter.com
Oracle MySQL UDF Payload Execution
  日期:2017-12-25 17:21:22 点击:44 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::MYSQL include Msf
Trend Micro Smart Protection Server 3.2 XSS / Access Control / Disclosure
  日期:2017-12-25 17:19:42 点击:130 评论:0
1. *Advisory Information*Title: Trend Micro Smart Protection Server Multiple VulnerabilitiesAdvisory ID: CORE-2017-0008Advisory URL:http://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilitiesDate published: 20
Xbox 360 Aurora 0.6b Default Credentials / FTP BruteForce Exploit
  日期:2017-12-25 17:17:46 点击:43 评论:0
# Exploit Title: XBOX 360 Aurora 0.6b Default Credentials / FTP BruteForce # Date: 20/12/2017 # Exploit Author: Daniel Godoy # Vendor Homepage: http://phoenix.xboxunity.net/ #/news # Tested on: XBOX 360 # GREETZ: Iker Legorreta, #RemoteExecution Tea
Netcore / Netis Routers - UDP Backdoor
  日期:2017-12-22 18:06:57 点击:96 评论:0
#!/usr/bin/python # -*- coding: utf8 -*- # NETCORE / NETDIS UDP 53413 BACKDOOR # https://netisscan.shadowserver.org/ # http://blog.trendmicro.com/trendlabs-security-intelligence/netis-routers-leave-wide-open-backdoor/ # https://www.seebug.org/vuldb/s
Fortinet FortiGate 4.x < 5.0.7 - SSH Backdoor
  日期:2017-12-22 18:06:20 点击:72 评论:0
#!/usr/bin/env python # SSH Backdoor for FortiGate OS Version 4.x up to 5.0.7 # Usage: ./fgt_ssh_backdoor.py target-ip import socket import select import sys import paramiko from paramiko.py3compat import u import base64 import hashlib import termios
Technicolor DPC3928SL - SNMP Authentication Bypass
  日期:2017-12-22 18:05:36 点击:135 评论:0
#!/usr/bin/python # -*- coding: utf-8 -*- # StringBleed - CVE-2017-5135 __author__ = [Nixawk] __funcs__ = [ 'generate_snmp_communitystr', 'generate_snmp_proto_payload', 'send_snmp_request', 'read_snmp_communitystr', 'read_snmp_varbindstr', 'snmp_logi
Cisco IOS 12.2 < 12.4 / 15.0 < 15.6 - Security Association Negotiation Request D
  日期:2017-12-22 18:04:09 点击:84 评论:0
#!/usr/bin/python # -*- coding: utf8 -*- import socket from scapy.all import * # --------------------------- # Requirements: # $ sudo pip install scapy # --------------------------- conf.verb = 0 RCVSIZE = 2548 TIMEOUT = 6 payload = '5xc7x07)xdfx
Ruby < 2.2.8 / < 2.3.5 / < 2.4.2 / < 2.5.0-preview1 - 'NET::Ftp' Command Injecti
  日期:2017-12-22 18:03:01 点击:65 评论:0
While using NET::Ftp I realised you could get command execution through malicious file names. The problem lies in the `gettextfile(remotefile, localfile = File.basename(remotefile))` method. When looking at the source code, you'll note: ``` def gette
共637页/12733条记录 首页 上一页 [48] [49] [50] 51 [52] [53] [54] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved