首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
NTFS 3.1 - Master File Table Denial of Service
  日期:2017-06-27 15:47:56 点击:4 评论:0
!-- # Exploit Title: NTFS 3.1 Master File Table DoS Exploit # Date: 62317 # Exploit Author: EagleWire # Version: Windows XP/7/8/8.1 # Tested on: Windows XP/7/8/8.1 1. Description: This exploits a vulnerability in Windows XP to Windows 8.1. The mast
Easy File Sharing HTTP Server 7.2 POST Buffer Overflow
  日期:2017-06-26 17:57:08 点击:4 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcp #include Msf::Exp
Symantec Messaging Gateway Remote Code Execution
  日期:2017-06-26 17:56:13 点击:3 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def ini
Netgear DGN2200 dnslookup.cgi Command Injection
  日期:2017-06-26 17:55:07 点击:6 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'net/http'require base64class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exp
PHPMailer < 5.2.20 with Exim MTA - Remote Code Execution
  日期:2017-06-22 15:09:22 点击:5 评论:0
#!/usr/bin/python # # Exploit Title: [RCE for PHPMailer 5.2.20 with Exim MTA] # Date: [16/06/2017] # Exploit Author: [@phackt_ul] # Software Link: [https://github.com/PHPMailer/PHPMailer] # Version: [ 5.2.20] # Tested on: [Debian x86/x64] # CVE : [CV
Mikrotik RouterOS 6.28 Cookie Buffer Overflow
  日期:2017-06-20 14:03:09 点击:7 评论:0
# mikrotik RouterOS v6.28 Cookie HTTP request header Buffer Overflow# sultan albalawiimport socketimport sysfrom time import sleepdef myB(): print x27x27x27x0dx0ax20x20x20x20x20 x20x20x5cx20x20x20x2dx20x20x2dx20 x20x2dx20
Mikrotik RouterOS 6.39.2 FTP CWD Buffer Overflow
  日期:2017-06-20 14:01:58 点击:11 评论:0
import time,sysimport socketfrom ftplib import FTP# mikrotik RouterOS v6.39.2 FTp buffer cwd command# sultan albalawiif len(sys.argv) 4: print 'ie: python ' + sys.argv[0] + ' host port username passowrd' print 'Example: 192.168.1.1 21 admin admin' s
D-Link ADSL DSL-2640B SEA_1.01 Unauthenticated Remote DNS Changer
  日期:2017-06-20 14:01:18 点击:3 评论:0
#!/bin/bash## D-Link ADSL DSL-2640B SEA_1.01# Unauthenticated Remote DNS Change Exploit## Copyright 2017 (c) Todor Donev todor.donev at gmail.com# https://www.ethical-hacker.org/# https://www.facebook.com/ethicalhackerorg## Description: # The vulner
D-Link DSL-2640B - Unauthenticated Remote DNS Change
  日期:2017-06-20 13:59:58 点击:8 评论:0
#!/bin/bash # # D-Link ADSL DSL-2640B GE_1.07 # Unauthenticated Remote DNS Change Exploit # # Copyright 2017 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The
D-Link DSL-2640U - Unauthenticated DNS Change
  日期:2017-06-20 13:59:22 点击:8 评论:0
#!/bin/bash # # D-Link ADSL DSL-2640U IM_1.00 # Unauthenticated Remote DNS Change Exploit # # Copyright 2017 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The
Beetel BCM96338 Router - Unauthenticated DNS Change
  日期:2017-06-20 13:58:11 点击:5 评论:0
#!/bin/bash # # Beetel BCM96338 ADSL Router # Unauthenticated Remote DNS Change Exploit # # Copyright 2017 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The v
UTstarcom WA3002G4 - Unauthenticated DNS Change
  日期:2017-06-20 13:57:34 点击:2 评论:0
#!/bin/bash # # UTstarcom WA3002G4 # Unauthenticated Remote DNS Change Exploit # # Copyright 2017 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The vulnerabil
iBall Baton iB-WRA150N - Unauthenticated DNS Change
  日期:2017-06-20 13:56:39 点击:4 评论:0
#!/bin/bash # # iBall Baton iB-WRA150N # Unauthenticated Remote DNS Change Exploit # # Copyright 2016 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The vulner
Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass)
  日期:2017-06-19 14:20:03 点击:6 评论:0
#!/usr/bin/python # Exploit Title: Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass with ROP) # Exploit Author: bl4ck h4ck3r # Software Link: http://www.sharing-file.com/efssetup.exe # Version: Easy File Sharing Web Server v7.2 #
Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass)
  日期:2017-06-19 14:19:40 点击:1 评论:0
Sudo - 'get_process_ttyname()' Privilege Escalation
  日期:2017-06-16 14:13:47 点击:10 评论:0
/* * E-DB Note: http://www.openwall.com/lists/oss-security/2017/05/30/16 * E-DB Note: http://seclists.org/oss-sec/2017/q2/470 * * Linux_sudo_CVE-2017-1000367.c * Copyright (C) 2017 Qualys, Inc. * * This program is free software: you can redistribute
Avast aswSnx.sys Kernel Driver 11.1.2253 - Memory Corruption Privilege Escalatio
  日期:2017-06-16 14:12:56 点击:6 评论:0
/** * Author: bee13oy * BSoD on Windows 7 x86 / Windows 10 x86 + Avast Premier / Avast Free Antivirus (11.1.2253) * Source: https://github.com/bee13oy/AV_Kernel_Vulns/tree/master/Avast/aswSnx_BSoD2(ZDI-16-681 ) * * There is a Memory Corruption Vulner
VX Search Enterprise 9.7.18 - Local Buffer Overflow
  日期:2017-06-16 14:12:14 点击:1 评论:0
import os import struct author = ''' ############################################## # Created: ScrR1pTK1dd13 # # Name: Greg Priest # # Mail: ScR1pTK1dd13.slammer@gmail.com # ############################################## # Exploit Title: VX Search En
Aerohive HiveOS 5.1r5 < 6.1r5 - Remote Code Execution
  日期:2017-06-16 14:10:50 点击:4 评论:0
#!/usr/bin/python3 # TARGET: AeroHive AP340 HiveOS 6.1r5 # Confirmed working on AP340 HiveOS 6.1r2 # This program uses a local file inclusion vulnerability # 1. Poison the log file in /var/log/messages by injecting PHP code into the # username field
HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrar
  日期:2017-06-15 13:05:32 点击:4 评论:0
## # Create a bind shell on an unpatched OfficeJet 8210 # Write a script to profile.d and reboot the device. When it comes # back online then nc to port 1270. # # easysnmp instructions: # sudo apt-get install libsnmp-dev # pip install easysnmp ## imp
共572页/11424条记录 首页 上一页 [1] [2] [3] [4] [5] 6 [7] 下一页 末页
  本月热点文章
·Microsoft Internet Explorer
·Microsoft Edge Chakra Incorr
·SMBLoris Denial Of Service
·ManageEngine Desktop Central
·Microsoft Windows - LNK Shor
·VICIdial 2.9 RC 1 to 2.13 RC
·Microsoft Windows - LNK Shor
·Microsoft Windows LNK Shortc
·Nitro Pro PDF Reader 11.0.3.
·Synology Photo Station 6.7.3
·Metasploit RPC Console Comma
·Jenkins < 1.650 - Java Deser
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2017 VFocuS.Net All Rights Reserved