首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
Google Chrome - V8 Private Property Arbitrary Code Execution
  日期:2017-06-15 13:03:55 点击:6 评论:0
html // Source: https://github.com/secmob/pwnfest2016/ script function exploit(){ function to_hex(num){ return (num0).toString(16); } function intarray_to_double(int_arr){ var uBuf = new Uint32Array(2); var dBuf = new Float64Array(uBuf.buffer); uBuf[
Easy MOV Converter 1.4.24 - 'Enter User Name' Buffer Overflow (SEH)
  日期:2017-06-14 15:38:16 点击:5 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Easy MOV Converter 1.4.24 - 'Enter User Name' Field Buffer Overflow (SEH) # Date: 13-06-2017 # Exploit Author: @abatchy17 -- www.abatch
Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow
  日期:2017-06-14 15:37:26 点击:4 评论:0
#!/usr/bin/python # Title : EFS Web Server 7.2 POST HTTP Request Buffer Overflow # Author : Touhid M.Shaikh # Date : 12 June, 2017 # Contact: touhidshaikh22@gmail.com # Version: 7.2 # category: Remote Exploit # Tested on: Windows XP SP3 EN [Version 5
Disk Pulse 9.7.26 - 'Add Directory' Local Buffer Overflow
  日期:2017-06-14 15:36:44 点击:3 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Disk Pulse v9.7.26 - Add Directory Local Buffer Overflow # Date: 12-06-2017 # Exploit Author: abatchy17 -- @abatchy17 # Vulnerable Soft
Sync Breeze 9.7.26 - 'Add Exclude Directory' Local Buffer Overflow
  日期:2017-06-13 17:48:47 点击:3 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Sync Breeze v9.7.26 - Local Buffer Overflow # Date: 11-06-2017 # Exploit Author: @abatchy17 -- www.abatchy.com # Vulnerable Software: S
DiskBoss 8.0.16 - 'Input Directory' Local Buffer Overflow
  日期:2017-06-13 17:48:00 点击:5 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: DiskBoss v8.0.16 - Local Buffer Overflow # Date: 11-06-2017 # Exploit Author: @abatchy17 -- www.abatchy.com # Vulnerable Software: Disk
Logpoint < 5.6.4 - Unauthenticated Root Remote Code Execution
  日期:2017-06-13 17:47:06 点击:6 评论:0
# Exploit Title: Unauthenticated remote root code execution on logpoint 5.6.4 # Date: 11/06/17 # Exploit Author: agix # Vendor Homepage: https://www.logpoint.com # Version: logpoint 5.6.4 # Tested on: 5.6.2 # Vendor contact 19/04 # Exploit details se
Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
  日期:2017-06-13 17:46:10 点击:3 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: DiskSorter v9.7.14 - Local Buffer Overflow # Date: 10-06-2017 # Exploit Author: abatchy17 -- @abatchy17 # Vulnerable Software: DiskSort
EFS Easy Chat Server 3.1 - Buffer Overflow (SEH)
  日期:2017-06-13 17:45:15 点击:2 评论:0
# Exploit Title: Easy Chat Server User Registeration Buffer Overflow (SEH) # Date: 09/10/2017 # Software Link: http://echatserver.com/ecssetup.exe # Exploit Author: Aitezaz Mohsin # Vulnerable Version: v2.0 to v3.1 # Vulnerability Type: Buffer Overfl
EFS Easy Chat Server 3.1 - Password Reset
  日期:2017-06-13 17:43:50 点击:2 评论:0
# Exploit Title: Easy Chat Server Remote Password Reset # Date: 09/10/2017 # Software Link: http://echatserver.com/ecssetup.exe # Exploit Author: Aitezaz Mohsin # Vulnerable Version: v2.0 to v3.1 # Vulnerability Type: Pre-Auth Remote Password Reset #
EFS Easy Chat Server 3.1 - Password Disclosure
  日期:2017-06-13 17:42:49 点击:3 评论:0
# Exploit Title: Easy Chat Server Remote Password Disclosure # Date: 09/10/2017 # Software Link: http://echatserver.com/ecssetup.exe # Exploit Author: Aitezaz Mohsin # Vulnerable Version: v2.0 to v3.1 # Vulnerability Type: Pre-Auth Remote Password Di
VMware vSphere Data Protection 5.x/6.x - Java Deserialization
  日期:2017-06-13 17:41:33 点击:17 评论:0
#!/usr/bin/env python import socket import sys import ssl def getHeader(): return 'x4ax52x4dx49x00x02x4b' def payload(): cmd = sys.argv[4] cmdlen = len(cmd) data2 = 'x00x09x31x32x37x2ex30x2ex31x2ex31x00x00x00x00x50xacxedx00
IPFire 2.19 - Remote Code Execution
  日期:2017-06-13 17:40:34 点击:11 评论:0
# # Title : IPFire 2.19 Firewall Post-Auth RCE # Date : 09/06/2017 # Author : 0x09AL ( https://twitter.com/0x09AL ) # Tested on: IPFire 2.19 (x86_64) - Core Update 110 # Vendor : http://www.ipfire.org/ # Software : http://downloads.ipfire.org/release
Apple macOS - Disk Arbitration Daemon Race Condition
  日期:2017-06-13 17:39:40 点击:1 评论:0
#!/bin/bash # Sources: # https://raw.githubusercontent.com/phoenhex/files/master/pocs/poc-mount.sh # https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc if ! security authorize system.volume.internal.mount /dev/null; then echo 21 Cannot a
Apple macOS 10.12.3 / iOS < 10.3.2 - Userspace Entitlement Checking Race Conditi
  日期:2017-06-13 17:38:12 点击:1 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1223 One way processes in userspace that offer mach services check whether they should perform an action on behalf of a client from which they have received a message is by checking
Mapscrn 2.03 - Local Buffer Overflow
  日期:2017-06-13 17:37:32 点击:0 评论:0
# Developed using Exploit Pack - http://exploitpack.com - jsacco@exploitpack.com # Tested on: GNU/Linux - Kali 2017.1 Release # # Description: Mapscrn ( Part of setfont ) 2.0.3 # The mapscrn command loads a user defined output character mapping table
VMware Workstation 12 Pro - Denial of Service
  日期:2017-06-09 15:55:17 点击:9 评论:0
/* * Title: NULL pointer dereference vulnerability in vstor2 driver (VMware Workstation Pro/Player) * CVE: 2017-4916 (VMSA-2017-0009) * Author: Borja Merino (@BorjaMerino) * Date: May 18, 2017 * Tested on: Windows 10 Pro and Windows 7 Pro (SP1) with
Windows UAC Protection Bypass (Via FodHelper Registry Key)
  日期:2017-06-08 14:46:36 点击:17 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/exploit/exe'require 'msf/core/exploit/powershell'class MetasploitModule Msf::Exploit::Local Rank =
Mikrotik RouterOS 6.28 FTP Buffer Overflow
  日期:2017-06-08 14:44:28 点击:14 评论:0
import timeimport socketfrom ftplib import FTPimport struct# mikrotik RouterOS v6.28 FTp CWD command Buffer Overflow# sultan albalawi# win7from subprocess import *host='192.168.88.1'port=21u = #usernamep = #passworddef myB(): myB= 'x0dx0ax20x20
PuTTY < 0.68 - 'ssh_agent_channel_data' Integer Overflow Heap Corruption
  日期:2017-06-08 14:43:20 点击:4 评论:0
Source: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html summary: Vulnerability: integer overflow permits memory overwrite by forwarded ssh-agent connections class: vulnerability: This is a security vulnerabili
共572页/11424条记录 首页 上一页 [4] [5] [6] 7 [8] [9] [10] 下一页 末页
  本月热点文章
·Microsoft Internet Explorer
·Microsoft Edge Chakra Incorr
·SMBLoris Denial Of Service
·ManageEngine Desktop Central
·Microsoft Windows - LNK Shor
·VICIdial 2.9 RC 1 to 2.13 RC
·Microsoft Windows - LNK Shor
·Microsoft Windows LNK Shortc
·Nitro Pro PDF Reader 11.0.3.
·Synology Photo Station 6.7.3
·Metasploit RPC Console Comma
·Jenkins < 1.650 - Java Deser
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2017 VFocuS.Net All Rights Reserved