首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
SMPlayer 17.11.0 - '.m3u' Buffer Overflow (PoC)
  日期:2017-11-07 14:12:36 点击:27 评论:0
#!/usr/bin/python # # Exploit Author: bzyo # Twitter: @bzyo_ # Exploit Title: SMPlayer 17.11.0 - '.m3u' Crash (PoC) # Date: 05-11-2017 # Vulnerable Software: SMPlayer v17.11.0 # Vendor Homepage: http://www.smplayer.info # Version: v17.11.0 # Softwar
Debut Embedded httpd 1.20 - Denial of Service
  日期:2017-11-07 14:11:22 点击:56 评论:0
# Exploit Title: Remote un-authenticated DoS in Debut embedded httpd server in Brother printers # Date: 11/02/2017 # Exploit Author: z00n (@0xz00n) # Vendor Homepage: http://www.brother-usa.com # Version: = 1.20 # CVE : CVE-2017-16249 # #Description
Ipswitch WS_FTP Professional < 12.6.0.3 - Local Buffer Overflow (SEH)
  日期:2017-11-07 14:07:38 点击:25 评论:0
#!/usr/bin/python #Title: Ipswitch WS_FTP Professional Local Buffer Overflow (SEH) #Author: Kevin McGuigan. Twitter: @_h3xagram #Author Website: https://www.7elements.co.uk #Vendor Website: https://www.ipswitch.com #Date: 03/11/2017 #Version: 12.6.03
Avaya IP Office (IPO) 10.1 Soft Console Remote Buffer Overflow
  日期:2017-11-06 15:13:10 点击:26 评论:0
[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt[+] ISR: apparitionSec Vendor:===========
Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow
  日期:2017-11-06 15:08:03 点击:144 评论:0
[+] Credits: John Page (aka hyp3rlinx)[+] Website: hyp3rlinx.altervista.org[+] Source: http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-VIEWERCTRL-ACTIVE-X-BUFFER-OVERFLOW-0DAY.txt[+] ISR: ApparitionSec Vendor:===========
WordPress WP Mobile Detector 3.5 Shell Upload
  日期:2017-11-06 15:06:38 点击:43 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HTTP::Wordpress i
tnftp - 'savefile' Arbitrary Command Execution (Metasploit)
  日期:2017-11-06 15:05:54 点击:29 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer inc
GraphicsMagick - Memory Disclosure / Heap Overflow
  日期:2017-11-06 15:04:05 点击:44 评论:0
'''Vulnerabilities summary The following advisory describes two (2) vulnerabilities found in GraphicsMagick. GraphicsMagick is The swiss army knife of image processing. Comprised of 267K physical lines (according to David A. Wheelers SLOCCount) of so
Oracle PeopleSoft Enterprise PeopleTools < 8.55 - Remote Code Execution Via Blin
  日期:2017-11-06 15:02:32 点击:35 评论:0
#!/usr/bin/python3 # Oracle PeopleSoft SYSTEM RCE # https://www.ambionics.io/blog/oracle-peoplesoft-xxe-to-rce # cf # 2017-05-17 import requests import urllib.parse import re import string import random import sys from requests.packages.urllib3.excep
Sera 1.2 Local Root / Password Disclosure
  日期:2017-11-03 14:39:26 点击:21 评论:0
Sera is a free app for mac and iOS that lets you unlock your mac automaticallywhen your iphone is within a configured proximity.Unfortunately to facilitate this it stores the users login password in theirhome directory at:~/Library/Preferences/no.ig
Vir.IT eXplorer Anti-Virus - Privilege Escalation
  日期:2017-11-03 14:35:31 点击:38 评论:0
/* Exploit Title - Vir.IT eXplorer Anti-Virus Arbitrary Write Privilege EscalationDate - 1st November 2017Discovered by - Parvez Anwar (@parvezghh)Vendor Homepage - http://www.tgsoft.itTested Version - 8.5.39Driver Version - 1.0.0.11 - VIAGLT64.SYST
WhatsApp 2.17.52 - Memory Corruption
  日期:2017-11-02 14:49:03 点击:49 评论:0
#!/usr/bin/env python # -*- coding: utf-8 -*- # Found this and more exploits on my open source security project: http://www.exploitpack.com # Exploit Author: Juan Sacco juan.sacco@kpn.com at KPN Red Team - http://www.kpn.com # Date and time of releas
Easy MPEG/AVI/DIVX/WMV/RM to DVD - 'Enter User Name' Buffer Overflow (SEH)
  日期:2017-11-02 14:47:46 点击:30 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Easy MPEG/AVI/DIVX/WMV/RM to DVD - 'Enter User Name' Field Buffer Overflow (SEH) # Date: 05-10-2017 # Exploit Author: Venkat Rajgor # V
Oracle Java SE - Web Start jnlp XML External Entity Processing Information Discl
  日期:2017-10-31 15:07:40 点击:72 评论:0
#!/usr/local/bin/python Oracle Java SE Web Start jnlp XML External Entity Processing Information Disclosure Vulnerability Affected: = v8u131 File: jre-8u131-windows-i586-iftw.exe SHA1: 85f0de19845deef89cc5a29edebe5bb33023062d Download: http://www.ora
Tizen Studio 1.3 Smart Development Bridge < 2.3.2 - Buffer Overflow (PoC)
  日期:2017-10-30 15:58:06 点击:43 评论:0
# Exploit Title: Smart Development Bridge =2.3.2 (part of Tizen Studio 1.3 Windows x86/x64) - Buffer Overflow PoC # Date: 22.10.17 # Exploit Author: Marcin Kopec # Vendor Homepage: https://developer.tizen.org/ # Software Link: https://developer.tizen
DameWare Remote Controller < 12.0.0.520 - Remote Code Execution
  日期:2017-10-30 15:57:15 点击:74 评论:0
# Exploit Title: Dameware Remote Controller RCE # Date: 3-04-2016 # Exploit Author: Securifera # Vendor Homepage: http://www.dameware.com/products/mini-remote-control/product-overview.aspx # Version: 12.0.0.520 # Website: https://www.securifera.com/b
Watchdog Development Anti-Malware / Online Security Pro - NULL Pointer Dereferen
  日期:2017-10-30 15:55:25 点击:45 评论:0
/* Exploit Title - Watchdog Development Anti-Malware/Online Security Pro Null Pointer Dereference Date - 26th October 2017 Discovered by - Parvez Anwar (@parvezghh) Vendor Homepage - https://www.watchdogdevelopment.com/ Tested Version - 2.74.186.150
PHPMailer 5.2.21 Local File Disclosure
  日期:2017-10-26 14:21:01 点击:53 评论:0
# Exploit Title: PHPMailer = 5.2.21 - Local File Disclosure (CVE-2017-5223)# Date: 2017-10-25# Exploit Author: Maciek Krupa# All credit only to Yongxiang Li of Asiasecurity# Software Link: https://github.com/PHPMailer/PHPMailer# Version: 5.2.21# Tes
Windows NTLM Auth Hash Disclosure / Denial Of Service
  日期:2017-10-26 14:19:27 点击:61 评论:0
Hello,I want to share some information with the people on the list.On May 24, I found a problem with NTLM auth on Windows.Under certain circumstances a shared folder on Windows can be abusedremotely to obtain the user credentials and to freeze the m
Netgear DGN1000 Setup.cgi Remote Command Execution
  日期:2017-10-25 15:21:04 点击:67 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient includ
共637页/12733条记录 首页 上一页 [55] [56] [57] 58 [59] [60] [61] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved