首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Microsoft Edge 38.14393.1066.0 - 'COptionsCollectionCacheItem::GetAt' Out-of-Bou
  日期:2017-09-20 15:22:30 点击:59 评论:0
Microsoft Edge 38.14393.1066.0 - 'COptionsCollectionCacheItem::GetAt' Out-of-Bounds Read
HPE < 7.2 - Java Deserialization
  日期:2017-09-20 15:19:27 点击:23 评论:0
#!/usr/bin/env python######################################################################################################### # HPE/H3C IMC - Java Deserialization Exploit## Version 0.1# Tested on Windows Server 2008 R2# NameHPE/H3C IMC (Intelligent
Apache - HTTP OPTIONS Memory Leak
  日期:2017-09-19 16:15:09 点击:49 评论:0
#!/usr/bin/env python3 # Optionsbleed proof of concept test# by Hanno Bck import argparseimport urllib3import re def test_bleed(url, args): r = pool.request('OPTIONS', url) try: allow = str(r.headers["Allow"]) except KeyError: return False if allow i
Microsoft Windows Kernel - 'win32k!NtQueryCompositionSurfaceBinding' Stack Memor
  日期:2017-09-19 16:14:22 点击:31 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1307 We have discovered that the win32k!NtQueryCompositionSurfaceBinding system call discloses portions of uninitialized kernel stack memory to user-mode clients, as tested on Window
Microsoft Windows Kernel - 'win32k!NtGdiDoBanding' Stack Memory Disclosure
  日期:2017-09-19 16:13:22 点击:52 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1304 We have discovered that the win32k!NtGdiDoBanding system call discloses portions of uninitialized kernel stack memory to user-mode clients. More specifically, exactly 8 bytes of
Microsoft Windows Kernel - 'win32k!NtGdiEngCreatePalette' Stack Memory Disclos
  日期:2017-09-19 16:12:37 点击:25 评论:0
Microsoft Windows Kernel - 'win32k!NtGdiEngCreatePalette' Stack Memory Disclos
Microsoft Windows Kernel - 'win32k!NtGdiGetFontResourceInfoInternalW' Stack Memo
  日期:2017-09-19 16:11:59 点击:48 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1275 We have discovered that the nt!NtGdiGetFontResourceInfoInternalW system call discloses portions of uninitialized kernel stack memory to user-mode clients. This is caused by the
Microsoft Windows Kernel - 'nt!NtSetIoCompletion / nt!NtRemoveIoCompletion' Pool
  日期:2017-09-19 16:10:56 点击:62 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1269 We have discovered that the nt!NtRemoveIoCompletion system call handler discloses 4 bytes of uninitialized pool memory to user-mode clients on 64-bit platforms. The bug manifest
Microsoft Windows Kernel - 'win32k!NtGdiGetPhysicalMonitorDescription' Stack Mem
  日期:2017-09-19 16:06:10 点击:101 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1268 We have discovered that the nt!NtGdiGetPhysicalMonitorDescription system call discloses portions of uninitialized kernel stack memory to user-mode clients, on Windows 7 to Windo
Microsoft Windows Kernel - 'win32k!NtGdiGetGlyphOutline' Pool Memory Disclosure
  日期:2017-09-19 16:05:28 点击:27 评论:0
/*Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1267 CODE XREF: NtGdiGetGlyphOutline(x,x,x,x,x,x,x,x)+5D.text:0018DD88 push ebx ; size_t.text:0018DD89 push 0 ; int.text:0018DD8B push esi ; void *.text:0018DD8C call _memset--- cut
DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin)
  日期:2017-09-19 16:04:16 点击:28 评论:0
#!/usr/local/bin/python# # # # # # Exploit Title: DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin)# Dork: N/A# Date: 18.09.2017# Vendor Homepage: http://www.digiappz.com/# Software Link: http://www.digiappz.com/digiaffiliate.asp?id=7# De
Digileave 1.2 - Cross-Site Request Forgery (Update Admin)
  日期:2017-09-19 16:03:21 点击:23 评论:0
#!/usr/local/bin/python# # # # # # Exploit Title: Digileave 1.2 - Cross-Site Request Forgery (Update User & Admin)# Dork: N/A# Date: 18.09.2017# Vendor Homepage: http://www.digiappz.com/# Software Link: http://www.digiappz.com/digileave.asp?id=1# Dem
Digirez 3.4 - Cross-Site Request Forgery (Update Admin)
  日期:2017-09-19 16:02:07 点击:21 评论:0
#!/usr/local/bin/python# # # # # # Exploit Title: Digirez 3.4 - Cross-Site Request Forgery (Update User & Admin)# Dork: N/A# Date: 18.09.2017# Vendor Homepage: http://www.digiappz.com/# Software Link: http://www.digiappz.com/index.asp# Demo: http://w
Netdecision 5.8.2 - Local Privilege Escalation
  日期:2017-09-18 14:59:44 点击:38 评论:0
/*# Exploit Title: Netdecision 5.8.2 - Local Privilege Escalation - Winring0x32.sys# Date: 2017.09.17# Exploit Author: Peter Baris# Vendor Homepage: www.netmechanica.com# Software Link: http://www.netmechanica.com/downloads/ //registration required#
D-Link DIR8xx Routers - Local Firmware Upload
  日期:2017-09-18 14:59:05 点击:234 评论:0
#!/bin/bash # If you have access to an ethernet port you can upload custom firmware to a device because system recovery service is started and available for a few seconds after restart.# E-DB Note: https://embedi.com/blog/enlarge-your-botnet-top-d-li
D-Link DIR8xx Routers - Root Remote Code Execution
  日期:2017-09-18 14:58:38 点击:38 评论:0
# Due to error in hnap protocol implementation we can overflow stack and execute any sh commands under root priviliges.# E-DB Note: https://embedi.com/blog/enlarge-your-botnet-top-d-link-routers-dir8xx-d-link-routers-cruisin-bruisin# E-DB Note: https
D-Link DIR8xx Routers - Leak Credentials
  日期:2017-09-18 14:57:47 点击:79 评论:0
# phpcgi is responsible for processing requests to .php, .asp and .txt pages. Also, it checks whether a user is authorized or not. Nevertheless, if a request is crafted in a proper way, an attacker can easily bypass authorization and execute a script
Astaro Security Gateway 7 - Remote Code Execution
  日期:2017-09-18 14:55:46 点击:47 评论:0
#!/usr/bin/python # Astaro Security Gateway v7 - Unauthenticated Remote Code Execution# Exploit Authors: Jakub Palaczynski and Maciej Grabiec# Tested on versions: 7.500 and 7.506# Date: 13.12.2016# Vendor Homepage: https://www.sophos.com/# CVE: CVE-2
Jungo DriverWizard WinDriver 12.4.0 Overflow
  日期:2017-09-14 17:44:18 点击:364 评论:0
Jungo DriverWizard WinDriver 12.4.0 Overflow
WebKit JSC BytecodeGenerator::emitGetByVal Incorrect Optimization
  日期:2017-09-12 14:07:53 点击:33 评论:0
WebKit JSC BytecodeGenerator::emitGetByVal Incorrect Optimiz
共637页/12733条记录 首页 上一页 [60] [61] [62] 63 [64] [65] [66] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved