首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
VMware vSphere Data Protection 5.x/6.x - Java Deserialization
  日期:2017-06-13 17:41:33 点击:83 评论:0
#!/usr/bin/env python import socket import sys import ssl def getHeader(): return 'x4ax52x4dx49x00x02x4b' def payload(): cmd = sys.argv[4] cmdlen = len(cmd) data2 = 'x00x09x31x32x37x2ex30x2ex31x2ex31x00x00x00x00x50xacxedx00
IPFire 2.19 - Remote Code Execution
  日期:2017-06-13 17:40:34 点击:46 评论:0
# # Title : IPFire 2.19 Firewall Post-Auth RCE # Date : 09/06/2017 # Author : 0x09AL ( https://twitter.com/0x09AL ) # Tested on: IPFire 2.19 (x86_64) - Core Update 110 # Vendor : http://www.ipfire.org/ # Software : http://downloads.ipfire.org/release
Apple macOS - Disk Arbitration Daemon Race Condition
  日期:2017-06-13 17:39:40 点击:19 评论:0
#!/bin/bash # Sources: # https://raw.githubusercontent.com/phoenhex/files/master/pocs/poc-mount.sh # https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc if ! security authorize system.volume.internal.mount /dev/null; then echo 21 Cannot a
Apple macOS 10.12.3 / iOS < 10.3.2 - Userspace Entitlement Checking Race Conditi
  日期:2017-06-13 17:38:12 点击:43 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1223 One way processes in userspace that offer mach services check whether they should perform an action on behalf of a client from which they have received a message is by checking
Mapscrn 2.03 - Local Buffer Overflow
  日期:2017-06-13 17:37:32 点击:26 评论:0
# Developed using Exploit Pack - http://exploitpack.com - jsacco@exploitpack.com # Tested on: GNU/Linux - Kali 2017.1 Release # # Description: Mapscrn ( Part of setfont ) 2.0.3 # The mapscrn command loads a user defined output character mapping table
VMware Workstation 12 Pro - Denial of Service
  日期:2017-06-09 15:55:17 点击:56 评论:0
/* * Title: NULL pointer dereference vulnerability in vstor2 driver (VMware Workstation Pro/Player) * CVE: 2017-4916 (VMSA-2017-0009) * Author: Borja Merino (@BorjaMerino) * Date: May 18, 2017 * Tested on: Windows 10 Pro and Windows 7 Pro (SP1) with
Windows UAC Protection Bypass (Via FodHelper Registry Key)
  日期:2017-06-08 14:46:36 点击:148 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core/exploit/exe'require 'msf/core/exploit/powershell'class MetasploitModule Msf::Exploit::Local Rank =
Mikrotik RouterOS 6.28 FTP Buffer Overflow
  日期:2017-06-08 14:44:28 点击:66 评论:0
import timeimport socketfrom ftplib import FTPimport struct# mikrotik RouterOS v6.28 FTp CWD command Buffer Overflow# sultan albalawi# win7from subprocess import *host='192.168.88.1'port=21u = #usernamep = #passworddef myB(): myB= 'x0dx0ax20x20
PuTTY < 0.68 - 'ssh_agent_channel_data' Integer Overflow Heap Corruption
  日期:2017-06-08 14:43:20 点击:28 评论:0
Source: https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html summary: Vulnerability: integer overflow permits memory overwrite by forwarded ssh-agent connections class: vulnerability: This is a security vulnerabili
Linux Kernel < 4.10.13 - 'keyctl_set_reqkey_keyring' Local Denial of Service
  日期:2017-06-08 14:42:10 点击:39 评论:0
/* Source: https://bugzilla.novell.com/show_bug.cgi?id=1034862 QA REPRODUCER: gcc -O2 -o CVE-2017-7472 CVE-2017-7472.c -lkeyutils ./CVE-2017-7472 (will run the kernel out of memory) */ #include sys/types.h #include keyutils.h int main() { for (;;) ke
Linux Kernel - 'ping' Local Denial of Service
  日期:2017-06-08 14:40:49 点击:29 评论:0
# Source: https://raw.githubusercontent.com/danieljiang0415/android_kernel_crash_poc/master/panic.c # #include stdio.h #include sys/socket.h #include arpa/inet.h #include stdlib.h static int sockfd = 0; static struct sockaddr_in addr = {0}; void fuzz
DC/OS Marathon UI - Docker Exploit (Metasploit)
  日期:2017-06-08 14:39:54 点击:40 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient incl
Cisco Catalyst 2960 IOS 12.2(55)SE1 - 'ROCEM' Remote Code Execution
  日期:2017-06-06 14:37:56 点击:80 评论:0
#!/usr/bin/python # Author: # Artem Kondratenko (@artkond) import socket import sys from time import sleep set_credless = True if len(sys.argv) 3: print sys.argv[0] + ' [host] --set/--unset' sys.exit() elif sys.argv[2] == '--unset': set_credless = Fa
BIND 9.10.5 - Unquoted Service Path Privilege Escalation
  日期:2017-06-06 14:36:09 点击:47 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/BIND9-PRIVILEGE-ESCALATION.txt [+] ISR: ApparitionSec Vendor: =========== www.isc.org Product: =========== BIND9 v9.10.5
Parallels Desktop - Virtual Machine Escape
  日期:2017-06-06 14:35:03 点击:24 评论:0
#[+] Title: Parallels Desktop - Virtual Machine Escape #[+] Product: Parallels #[+] Vendor: http://www.parallels.com/products/desktop/ #[+] Affected Versions: All Version # # # Author : Mohammad Reza Espargham # Linkedin : https://ir.linkedin.com/in/
DNSTracer 1.8.1 - Buffer Overflow
  日期:2017-06-06 14:33:58 点击:33 评论:0
################ #Exploit Title: DNSTracer Stack-based Buffer Overflow #CVE: CVE-2017-9430 #CWE: CWE-119 #Exploit Author: Hosein Askari (FarazPajohan) #Vendor HomePage: http://www.mavetju.org #Version : 1.8.1 #Tested on: Parrot OS #Date: 04-06-2017 #
EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - Remote Code Execution
  日期:2017-06-06 14:32:44 点击:186 评论:0
#!/usr/bin/env python # coding: utf8 # # # EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution # # # Vendor: EnGenius Technologies Inc. # Product web page: https://www.engeniustech.com # Affected version: ESR300 (1.4.9, 1.4.7
Disk Sorter 9.7.14 - 'Input Directory' Local Buffer Overflow
  日期:2017-06-06 14:31:36 点击:21 评论:0
#!/usr/bin/python ###################################### # Exploit Title: DiskSorter v9.7.14 - Input Directory Local Buffer Overflow - PoC # Date: 25 May 2017 # Exploit Author: n3ckD_ # Vendor Homepage: http://www.disksorter.com/ # Software Link: htt
Intel AMT Digest Authentication Bypass Scanner Exploit
  日期:2017-06-05 12:03:54 点击:50 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'rex/proto/http' class MetasploitModule Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include
ScadaBR Credentials Dumper Exploit
  日期:2017-06-05 12:01:47 点击:105 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Auxiliary include Msf::Auxiliary::Report include Msf::Exploit::Remote::HttpClient de
共637页/12733条记录 首页 上一页 [70] [71] [72] 73 [74] [75] [76] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved