首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
Siemens SCALANCE S613 - Remote Denial of Service
  日期:2018-05-28 16:06:20 点击:2 评论:0
# Exploit Title: Siemens SCALANCE S613 - Remote Denial of Service # Date: 2018-05-23 # Exploit Author: t4rkd3vilz # Vendor Homepage: https://www.siemens.com/ # Version: SCALANCE S613 (MLFB: 6GK5613-0BA00-2AA3): All versions. # Tested on: Kali Linux
FTPShell Server 6.80 - Denial of Service
  日期:2018-05-28 15:27:35 点击:9 评论:0
# Exploit Title: FTPShell Server 6.80 - Local Denial of Service # Exploit Author: Hashim Jawad # Date: 2018-05-23 # Vendor Homepage: http://www.ftpshell.com/ # Vulnerable Software: http://www.ftpshell.com/downloadserver.htm # Tested on: Windows 7 Ent
FTPShell Server 6.80 - Buffer Overflow (SEH)
  日期:2018-05-28 15:26:34 点击:20 评论:0
#!/usr/bin/python #----------------------------------------------------------------------------------------------------------# # Exploit Title : FTPShell Server v6.80 - Local Buffer Overflow (SafeSEH Bypass) # # Exploit Author : Hashim Jawad - @ihac
Linux 4.4.0 < 4.4.0-53 - AF_PACKET chocobo_root Privilege Escalation (Metasploit
  日期:2018-05-23 18:10:06 点击:26 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Post::Linux::
AMD / ARM / Intel - Speculative Execution Variant 4 Speculative Store Bypass
  日期:2018-05-23 18:07:50 点击:6 评论:0
/* ======== Intro / Overview ======== After Michael Schwarz made some interesting observations, we started looking into variants other than the three already-known ones. I noticed that Intel's Optimization Manual says in section 2.4.4.5 (Memory Disam
Microsoft Edge Chakra JIT - Magic Value Type Confusion
  日期:2018-05-23 18:07:06 点击:5 评论:0
/* BOOL JavascriptNativeFloatArray::SetItem(uint32 index, double dValue) { if (*(uint64*)dValue == *(uint64*)JavascriptNativeFloatArray::MissingItem) { JavascriptArray *varArr = JavascriptNativeFloatArray::ToVarArray(this); varArr-DirectSetItemAt(ind
Siemens SIMATIC S7-1500 CPU - Remote Denial of Service
  日期:2018-05-23 18:06:19 点击:6 评论:0
# Exploit Title: Siemens SIMATIC S7-1500 CPU - Remote Denial of Service # Google Dork: inurl:/Portal/Portal.mwsl # Date: 2018-05-22 # Exploit Author: t4rkd3vilz, Jameel Nabbo # Vendor Homepage: https://www.siemens.com/ # Version: SIMATIC S7-1500 CPU
Adobe Experience Manager (AEM) Remote Code Execution
  日期:2018-05-22 15:34:23 点击:6 评论:0
# Exploit Title: Adobe Experience Manager (AEM) 6.3 default credentials leads to RCE# Date: 5/19/18# Exploit Author: StaticFlow# Vendor Homepage: https://www.adobe.com/in/marketing-cloud/experience-manager.html# Version: 6.3import requestsimport sys
R 3.4.4 - Local Buffer Overflow (DEP Bypass)
  日期:2018-05-22 15:33:21 点击:29 评论:0
# Exploit Title: R v3.4.4 - Local Buffer Overflow (DEP Bypass) # Exploit Author: Hashim Jawad # Exploit Date: 2018-05-21 # Vendor Homepage: https://www.r-project.org/ # Vulnerable Software: https://www.exploit-db.com/apps/a642a3de7b5c2602180e73f4c04b
Linux 2.6.30 < 2.6.36-rc8 - Reliable Datagram Sockets (RDS) Privilege Escalation
  日期:2018-05-22 15:32:25 点击:20 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Local Rank = GreatRanking include Msf::Post::File include Msf::Post::Linux:
GitBucket 4.23.1 - Remote Code Execution
  日期:2018-05-22 15:31:37 点击:8 评论:0
# Exploit Title: GitBucket 4.23.1 Unauthenticated RCE # Date: 21-05-2018 # Software Link: https://github.com/gitbucket/gitbucket # Exploit Author: Kacper Szurek # Contact: https://twitter.com/KacperSzurek # Website: https://security.szurek.pl/ # Cate
Easy MPEG to DVD Burner 1.7.11 - Local Buffer Overflow (SEH) (DEP Bypass)
  日期:2018-05-22 15:29:59 点击:13 评论:0
#!/usr/bin/python #------------------------------------------------------------------------------------------------------------------------------------# # Exploit: Easy MPEG to DVD Burner 1.7.11 SEH + DEP Bypass Local Buffer Overflow # # Date: 2018-0
Microsoft Edge Chakra JIT - Bound Check Elimination Bug
  日期:2018-05-22 15:29:03 点击:1 评论:0
/* Chakra uses the InvariantBlockBackwardIterator class to backpropagate the information about the hoisted bound checks. But the class follows the linked list instaed of the control flow. This may lead to incorrectly remove the bound checks. In the f
DynoRoot DHCP - Client Command Injection
  日期:2018-05-22 15:28:04 点击:27 评论:0
# Exploit Title: DynoRoot DHCP - Client Command Injection # Date: 2018-05-18 # Exploit Author: Kevin Kirsche # Exploit Repository: https://github.com/kkirsche/CVE-2018-1111 # Exploit Discoverer: Felix Wilhelm # Vendor Homepage: https://www.redhat.com
Prime95 29.4b8 - Stack Buffer Overflow (SEH)
  日期:2018-05-22 15:27:20 点击:16 评论:0
# Exploit Title: Prime95 Local Buffer Overflow (SEH) # Date: 13-4-2018 # Exploit Author: crash_manucoot # Contact: twitter.com/crash_manucoot # Vendor Homepage: https://www.mersenne.org/ # Software Link: https://www.mersenne.org/download/#download #
HPE iMC 7.3 - Remote Code Execution (Metasploit)
  日期:2018-05-22 15:26:05 点击:30 评论:0
# Exploit Title: HPE iMC EL Injection Unauthenticated RCE # Date: 6 February, 2018 # Exploit Author: TrendyTofu # Vendor Homepage: https://www.hpe.com/us/en/home.html # Software Link: http://h10145.www1.hpe.com/Downloads/SoftwareReleases.aspx?Product
AF_PACKET packet_set_ring Privilege Escalation
  日期:2018-05-18 13:30:35 点击:8 评论:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Post::Linux::Pri
Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
  日期:2018-05-18 13:29:08 点击:21 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient de
Jenkins CLI - HTTP Java Deserialization (Metasploit)
  日期:2018-05-18 13:28:15 点击:11 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking STAGE1 = aced00057372002b6f72672e61706163686
Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in c
  日期:2018-05-18 13:27:42 点击:10 评论:0
/* Commit 3a4d44b61625 (ntp: Move adjtimex related compat syscalls to native counterparts) removed the memset() in compat_get_timex(). Since then, the compat adjtimex syscall can invoke do_adjtimex() with an uninitialized -tai. If do_adjtimex() doesn
共612页/12228条记录 首页 上一页 [1] [2] [3] [4] [5] 6 [7] 下一页 末页
  本月热点文章
·Nagios XI 5.2.6-5.4.12 - Cha
·Enhanced Mitigation Experien
·HomeMatic Zentrale CCU2 Unau
·D-Link DIR601 2.02 - Credent
·DHCP Client - Command Inject
·HP VAN SDN Controller Root C
·VMware NSX SD-WAN Edge < 3.1
·Microsoft Windows .library-m
·FTPShell Client 6.70 (Enterp
·Oracle WebLogic 12.1.2.0 - R
·Microsoft Windows POP/MOV SS
·CMS Made Simple 2.2.5 Authen
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved