首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
D-Link DIR-850L Credential Disclosure
  日期:2017-11-27 16:18:59 点击:40 评论:0
#!/bin/bash## Derped together by Raphael de la Vienne A.K.A. Hackdwerg# Original exploit https://www.rapid7.com/db/modules/exploit/linux/http/dlink_dir850l_unauth_exec# Just in case if you dont have metasploit, or are to lazy to install it. here is
WebKit - 'WebCore::FormSubmission::create' Use-After-Free
  日期:2017-11-23 14:40:23 点击:33 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1355 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =============================================
WebKit - 'WebCore::RenderObject::previousSibling' Use-After-Free
  日期:2017-11-23 14:39:31 点击:14 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1354 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =============================================
WebKit - 'WebCore::DocumentLoader::frameLoader' Use-After-Free
  日期:2017-11-23 14:38:40 点击:16 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1353 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =============================================
WebKit - 'WebCore::Style::TreeResolver::styleForElement' Use-After-Free
  日期:2017-11-23 14:37:58 点击:24 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1351 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =============================================
WebKit - 'WebCore::SVGPatternElement::collectPatternAttributes' Out-of-Bounds Re
  日期:2017-11-23 14:37:06 点击:18 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1350 There is an out-of-bounds read security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =========================================
WebKit - 'WebCore::SimpleLineLayout::RunResolver::runForPoint' Out-of-Bounds Rea
  日期:2017-11-23 14:36:12 点击:27 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1349 There is an out-of-bounds read security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =========================================
WebKit - 'WebCore::RenderText::localCaretRect' Out-of-Bounds Read
  日期:2017-11-23 14:35:18 点击:53 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1348 There is an out-of-bounds read security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: =========================================
WebKit - 'WebCore::AXObjectCache::performDeferredCacheUpdate' Use-After-Free
  日期:2017-11-23 14:34:30 点击:27 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1347 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. Note that accessibility features need to be enabled
WebKit - 'WebCore::PositionIterator::decrement' Use-After-Free
  日期:2017-11-23 14:33:20 点击:50 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1346 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: ==============================================
WebKit - 'WebCore::InputType::element' Use-After-Free
  日期:2017-11-23 14:30:58 点击:20 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1345 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: ==============================================
WebKit - 'WebCore::TreeScope::documentScope' Use-After-Free
  日期:2017-11-23 14:28:25 点击:82 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1344 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on ASan build of WebKit nightly. PoC: ==============================================
Vonage VDV-23 - Denial of Service
  日期:2017-11-23 14:27:23 点击:124 评论:0
Overview During an evaluation of the Vonage home phone router, it was identified that the loginUsername and loginPassword parameters were vulnerable to a buffer overflow. This overflow caused the router to crash and reboot. Further analysis will be p
Microsoft Windows 10 - 'nt!NtQueryDirectoryFile (luafv!LuafvCopyDirectoryEntry)'
  日期:2017-11-22 15:38:44 点击:26 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1361 We have discovered that the nt!NtQueryDirectoryFile system call discloses portions of uninitialized pool memory to user-mode clients on Windows 10, due to uninitialized fields
iOS < 11.1 / tvOS < 11.1 / watchOS < 4.1 - Denial of Service
  日期:2017-11-21 14:56:14 点击:42 评论:0
# Exploit Title: TpwnT - iOS Denail of Service POC # Date: 10-31-2017 # Exploit Author: Russian Otter (Ro) # Vendor Homepage: https://support.apple.com/en-us/HT208222 # Version: 2.1 # Tested on: iOS 10.3.2 - 11.1 # CVE: CVE-2017-13849 ---------------
VX Search 10.2.14 - 'Proxy' Buffer Overflow (SEH)
  日期:2017-11-20 14:09:09 点击:26 评论:0
#!/usr/bin/env python # # Exploit Title : VXSearch v10.2.14 Local SEH Overflow # Date : 11/16/2017 # Exploit Author : wetw0rk # Vendor Homepage : http://www.flexense.com/ # Software link : http://www.vxsearch.com/setups/vxsearchent_setup_v10.2.14.exe
phpMyFAQ 2.9.9 Code Injection
  日期:2017-11-20 14:08:10 点击:49 评论:0
# Exploit Title: [PHPMYFAQ 2.9.9 Code Injection]# Google Dork: [NA]# Date: [Nov 6 2017]# Exploit Author: [tomplixsee]# Author blog : [cupuzone.wordpress.com]# Vendor Homepage: [ http://www.phpmyfaq.de]# Software Link: [http://download.phpmyfaq.de/ph
Microsoft Edge Chakra JIT Bailout Generation
  日期:2017-11-16 16:20:47 点击:29 评论:0
Microsoft Edge: Chakra: JIT: Bailouts must be generated for OP_Memset CVE-2017-11873function opt(a, b, v) { if (b.length 1) return; for (let i = 0; i a.length; i++) a[i] = v; b[0] = 2.3023e-320;}The above JavaScript code is JITed as follows:... CHEC
Microsoft Edge Charka JIT Incorrect Check
  日期:2017-11-16 16:20:09 点击:28 评论:0
Microsoft Edge: Chakra: JIT: Incorrect integer overflow check in Lowerer::LowerBoundCheck CVE-2017-11861Here's a snippet of the method.void Lowerer::LowerBoundCheck(IR::Instr *const instr){ ... if(rightOpnd-IsIntConstOpnd()) { IntConstType newOffset
Microsoft Edge Chakra JIT Type Confusion
  日期:2017-11-16 16:18:52 点击:30 评论:0
Microsoft Edge: Chakra: JIT: Type confusion with switch statements CVE-2017-11811Let's start with a switch statement and its IR code for JIT.JS:for (let i = 0; i 100; i++) { switch (i) { case 2: case 4: case 6: case 8: case 10: case 12: case 14: cas
共637页/12733条记录 首页 上一页 [53] [54] [55] 56 [57] [58] [59] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved