首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
UTstarcom WA3002G4 - Unauthenticated DNS Change
  日期:2017-06-20 13:57:34 点击:25 评论:0
#!/bin/bash # # UTstarcom WA3002G4 # Unauthenticated Remote DNS Change Exploit # # Copyright 2017 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The vulnerabil
iBall Baton iB-WRA150N - Unauthenticated DNS Change
  日期:2017-06-20 13:56:39 点击:26 评论:0
#!/bin/bash # # iBall Baton iB-WRA150N # Unauthenticated Remote DNS Change Exploit # # Copyright 2016 (c) Todor Donev todor.donev at gmail.com # https://www.ethical-hacker.org/ # https://www.facebook.com/ethicalhackerorg # # Description: # The vulner
Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass)
  日期:2017-06-19 14:20:03 点击:57 评论:0
#!/usr/bin/python # Exploit Title: Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass with ROP) # Exploit Author: bl4ck h4ck3r # Software Link: http://www.sharing-file.com/efssetup.exe # Version: Easy File Sharing Web Server v7.2 #
Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow (DEP Bypass)
  日期:2017-06-19 14:19:40 点击:16 评论:0
Sudo - 'get_process_ttyname()' Privilege Escalation
  日期:2017-06-16 14:13:47 点击:39 评论:0
/* * E-DB Note: http://www.openwall.com/lists/oss-security/2017/05/30/16 * E-DB Note: http://seclists.org/oss-sec/2017/q2/470 * * Linux_sudo_CVE-2017-1000367.c * Copyright (C) 2017 Qualys, Inc. * * This program is free software: you can redistribute
Avast aswSnx.sys Kernel Driver 11.1.2253 - Memory Corruption Privilege Escalatio
  日期:2017-06-16 14:12:56 点击:28 评论:0
/** * Author: bee13oy * BSoD on Windows 7 x86 / Windows 10 x86 + Avast Premier / Avast Free Antivirus (11.1.2253) * Source: https://github.com/bee13oy/AV_Kernel_Vulns/tree/master/Avast/aswSnx_BSoD2(ZDI-16-681 ) * * There is a Memory Corruption Vulner
VX Search Enterprise 9.7.18 - Local Buffer Overflow
  日期:2017-06-16 14:12:14 点击:22 评论:0
import os import struct author = ''' ############################################## # Created: ScrR1pTK1dd13 # # Name: Greg Priest # # Mail: ScR1pTK1dd13.slammer@gmail.com # ############################################## # Exploit Title: VX Search En
Aerohive HiveOS 5.1r5 < 6.1r5 - Remote Code Execution
  日期:2017-06-16 14:10:50 点击:344 评论:0
#!/usr/bin/python3 # TARGET: AeroHive AP340 HiveOS 6.1r5 # Confirmed working on AP340 HiveOS 6.1r2 # This program uses a local file inclusion vulnerability # 1. Poison the log file in /var/log/messages by injecting PHP code into the # username field
HP PageWide Printers / HP OfficeJet Pro Printers (OfficeJet Pro 8210) - Arbitrar
  日期:2017-06-15 13:05:32 点击:28 评论:0
## # Create a bind shell on an unpatched OfficeJet 8210 # Write a script to profile.d and reboot the device. When it comes # back online then nc to port 1270. # # easysnmp instructions: # sudo apt-get install libsnmp-dev # pip install easysnmp ## imp
Google Chrome - V8 Private Property Arbitrary Code Execution
  日期:2017-06-15 13:03:55 点击:58 评论:0
html // Source: https://github.com/secmob/pwnfest2016/ script function exploit(){ function to_hex(num){ return (num0).toString(16); } function intarray_to_double(int_arr){ var uBuf = new Uint32Array(2); var dBuf = new Float64Array(uBuf.buffer); uBuf[
Easy MOV Converter 1.4.24 - 'Enter User Name' Buffer Overflow (SEH)
  日期:2017-06-14 15:38:16 点击:24 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Easy MOV Converter 1.4.24 - 'Enter User Name' Field Buffer Overflow (SEH) # Date: 13-06-2017 # Exploit Author: @abatchy17 -- www.abatch
Easy File Sharing Web Server 7.2 - 'POST' Buffer Overflow
  日期:2017-06-14 15:37:26 点击:30 评论:0
#!/usr/bin/python # Title : EFS Web Server 7.2 POST HTTP Request Buffer Overflow # Author : Touhid M.Shaikh # Date : 12 June, 2017 # Contact: touhidshaikh22@gmail.com # Version: 7.2 # category: Remote Exploit # Tested on: Windows XP SP3 EN [Version 5
Disk Pulse 9.7.26 - 'Add Directory' Local Buffer Overflow
  日期:2017-06-14 15:36:44 点击:20 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Disk Pulse v9.7.26 - Add Directory Local Buffer Overflow # Date: 12-06-2017 # Exploit Author: abatchy17 -- @abatchy17 # Vulnerable Soft
Sync Breeze 9.7.26 - 'Add Exclude Directory' Local Buffer Overflow
  日期:2017-06-13 17:48:47 点击:20 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: Sync Breeze v9.7.26 - Local Buffer Overflow # Date: 11-06-2017 # Exploit Author: @abatchy17 -- www.abatchy.com # Vulnerable Software: S
DiskBoss 8.0.16 - 'Input Directory' Local Buffer Overflow
  日期:2017-06-13 17:48:00 点击:20 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: DiskBoss v8.0.16 - Local Buffer Overflow # Date: 11-06-2017 # Exploit Author: @abatchy17 -- www.abatchy.com # Vulnerable Software: Disk
Logpoint < 5.6.4 - Unauthenticated Root Remote Code Execution
  日期:2017-06-13 17:47:06 点击:22 评论:0
# Exploit Title: Unauthenticated remote root code execution on logpoint 5.6.4 # Date: 11/06/17 # Exploit Author: agix # Vendor Homepage: https://www.logpoint.com # Version: logpoint 5.6.4 # Tested on: 5.6.2 # Vendor contact 19/04 # Exploit details se
Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
  日期:2017-06-13 17:46:10 点击:25 评论:0
#!/usr/bin/python ############################################################################### # Exploit Title: DiskSorter v9.7.14 - Local Buffer Overflow # Date: 10-06-2017 # Exploit Author: abatchy17 -- @abatchy17 # Vulnerable Software: DiskSort
EFS Easy Chat Server 3.1 - Buffer Overflow (SEH)
  日期:2017-06-13 17:45:15 点击:32 评论:0
# Exploit Title: Easy Chat Server User Registeration Buffer Overflow (SEH) # Date: 09/10/2017 # Software Link: http://echatserver.com/ecssetup.exe # Exploit Author: Aitezaz Mohsin # Vulnerable Version: v2.0 to v3.1 # Vulnerability Type: Buffer Overfl
EFS Easy Chat Server 3.1 - Password Reset
  日期:2017-06-13 17:43:50 点击:102 评论:0
# Exploit Title: Easy Chat Server Remote Password Reset # Date: 09/10/2017 # Software Link: http://echatserver.com/ecssetup.exe # Exploit Author: Aitezaz Mohsin # Vulnerable Version: v2.0 to v3.1 # Vulnerability Type: Pre-Auth Remote Password Reset #
EFS Easy Chat Server 3.1 - Password Disclosure
  日期:2017-06-13 17:42:49 点击:23 评论:0
# Exploit Title: Easy Chat Server Remote Password Disclosure # Date: 09/10/2017 # Software Link: http://echatserver.com/ecssetup.exe # Exploit Author: Aitezaz Mohsin # Vulnerable Version: v2.0 to v3.1 # Vulnerability Type: Pre-Auth Remote Password Di
共637页/12733条记录 首页 上一页 [69] [70] [71] 72 [73] [74] [75] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved