首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Sudo get_process_ttyname() Race Condition
  日期:2017-06-05 12:00:36 点击:61 评论:0
Qualys Security AdvisoryCVE-2017-1000367 in Sudo's get_process_ttyname() for Linux========================================================================Contents========================================================================AnalysisExploit
Samba is_known_pipename() Code Execution
  日期:2017-06-05 11:56:23 点击:113 评论:0
#!/usr/bin/perl -w#Remote Samba is_known_pipename() ( 3.5.0 to 4.4.14, 4.5.10, and 4.6.4.) Exploit By N_A , N_A[at]tutanota.com#The orginal bug was discovered by steelo knownsteelo[at]gmail.com#CVE-2017-7494#https://www.samba.org/samba/security/CVE-
reiserfstune 3.6.25 - Local Buffer Overflow
  日期:2017-06-05 11:55:09 点击:97 评论:0
[+] Title: reiserfstune 3.6.25 Local Buffer Overflow [+] Credits / Discovery: Nassim Asrir [+] Author Contact: wassline@gmail.com || https://www.linkedin.com/in/nassim-asrir-b73a57122/ [+] Author Company: Henceforth [+] CVE: N/A - Download - http://w
Riverbed SteelHead VCX 9.6.0a - Arbitrary File Read
  日期:2017-06-02 14:07:31 点击:29 评论:0
# Exploit title : Arbitry file reading by authenticated users on Riverbed SteelHead VCX # Vendor: Riverbed # Author: Gregory DRAPERI gregory.draper_at_gmail.com # Date: 03/2017 # Software Link: https://www.riverbed.com/gb/products/steelhead/Free-90-d
WebKit CachedFrameBase::restore Universal Cross Site Scripting
  日期:2017-06-01 14:09:18 点击:22 评论:0
WebKit: UXSS via CachedFrameBase::restore This is similar to the case a href=https://bugs.chromium.org/p/project-zero/issues/detail?id=1151 title= class= rel=nofollowhttps://bugs.chromium.org/p/project-zero/issues/detail?id=1151/a.But this time, jav
WebKit Element::setAttributeNodeNS Use-After-Free
  日期:2017-06-01 14:08:45 点击:46 评论:0
WebKit: Element::setAttributeNodeNS UAF Here's a snippet of Element::setAttributeNodeNS.ExceptionOrRefPtrAttr Element::setAttributeNodeNS(Attr attrNode){... setAttributeInternal(index, attrNode.qualifiedName(), attrNode.value(), NotInSynchronization
WebKit CachedFrame Universal Cross Site Scripting
  日期:2017-06-01 14:07:58 点击:25 评论:0
WebKit: UXSS: CachedFrame doesn#39;t detach openers CVE-2017-2528When a document loads about:blank or about:srcdoc, it tries to inherit the security origin from its parent frame, or its opener frame if the parent frame doesn't exist. Normally, it do
WebKit JSC emitPutDerivedConstructorToArrowFunctionContextScope Incorrect Check
  日期:2017-06-01 14:07:13 点击:21 评论:0
WebKit: JSC: incorrect check in emitPutDerivedConstructorToArrowFunctionContextScope CVE-2017-2531When a super expression is used in an arrow function, the following code, which generates bytecode, is called.if (needsToUpdateArrowFunctionContext() !
WebKit JSC JSObject::ensureLength Failure Check
  日期:2017-06-01 14:05:45 点击:19 评论:0
WebKit: JSC: JSObject::ensureLength doesn#39;t check if ensureLengthSlow failed. CVE-2017-2521Here's a snippet of JSObject::ensureLength.bool WARN_UNUSED_RETURN ensureLength(VM vm, unsigned length){ ASSERT(length MAX_ARRAY_INDEX); ASSERT(hasContiguo
WebKit Document::prepareForDestruction / CachedFrame Universal XSS
  日期:2017-06-01 14:04:46 点击:17 评论:0
WebKit: UXSS via Document::prepareForDestruction and CachedFrame Here's a snippet of Document::prepareForDestructionvoid Document::prepareForDestruction(){ if (m_hasPreparedForDestruction) return; ... detachFromFrame(); m_hasPreparedForDestruction =
ModX CMS Proof Of Concept Shell Upload
  日期:2017-06-01 14:00:45 点击:31 评论:0
c@kali:~/src/Napalm2.2/libs$ cat shell-modxcms.py#!/usr/bin/env python# shell-modxcms.py - upload shell for modx 2.5.6-pl# # !! we need rwx in modx-webdir to go ;Z## 30.05.217 @ code610 blogspot com# import requestsimport retarget=raw_input(Hostname
IBM Informix Dynamic Server / Informix Open Admin Tool - DLL Injection / Remote
  日期:2017-05-31 17:54:39 点击:38 评论:0
Vulnerabilities Summary The following advisory describes six (6) vulnerabilities found in Informix Dynamic Server and Informix Open Admin Tool. IBM Informix Dynamic Server Exceptional, low maintenance online transaction processing (OLTP) data server
TerraMaster F2-420 NAS TOS 3.0.30 - Unauthenticated Remote Code Execution as Roo
  日期:2017-05-31 17:54:39 点击:29 评论:0
TerraMaster F2-420 NAS TOS 3.0.30 - Unauthenticated Remote Code Execution as Root
KEMP LoadMaster 7.135.0.13245 - Persistent Cross-Site Scripting / Remote Code Ex
  日期:2017-05-31 17:53:01 点击:77 评论:0
Vulnerability Summary KEMPs main product, the LoadMaster, is a load balancer built on its own proprietary software platform called LMOS, that enables it to run on almost any platform: As a KEMP LoadMaster appliance, a Virtual LoadMaster (VLM) deploye
Microsoft MsMpEng - Remotely Exploitable Use-After-Free due to Design Issue in G
  日期:2017-05-31 17:52:01 点击:43 评论:0
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1258 MsMpEng's JS engine uses garbage collection to manage the lifetime of Javascript objects. During mark and sweep the GC roots the vectors representing the JS stack as well as a few
TiEmu 2.08 - Local Buffer Overflow
  日期:2017-05-31 17:50:53 点击:54 评论:0
#!/usr/bin/python # Exploit Author: Juan Sacco juan.sacco@kpn.com at KPN Red Team - http://www.kpn.com # Developed using Exploit Pack - http://exploitpack.com - jsacco@exploitpack.com # Tested on: Windows 7 32 bits # # Description: TiEmu ( Texas Inst
uc-http Daemon - Local File Inclusion / Directory Traversal
  日期:2017-05-31 17:49:45 点击:64 评论:0
''' ______ ______ _____ ___ _____ _____ _____ | ___ | ___ | _ | |_ | | ___| / __ |_ _| | |_/ / | |_/ / | | | | | | | |__ | / / | | | __/ | / | | | | | | | __| | | | | | | | | _/ / /__/ / | |___ | __/ | | _| _| _| ___/ ____/ ____
Octopus Deploy - Authenticated Code Execution (Metasploit)
  日期:2017-05-31 17:48:23 点击:71 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' require 'json' class MetasploitModule Msf::Exploit::Remote Rank = Excellent
CERIO DT-100G-N/DT-300N/CW-300N - Multiple Vulnerabilities
  日期:2017-05-31 17:46:00 点击:94 评论:0
CERIO 11nbg 2.4Ghz High Power Wireless Router (pekcmd) Rootshell Backdoors Vendor: CERIO Corporation Product web page: http://www.cerio.com.tw Affected version: DT-100G-N (fw: Cen-WR-G2H5 v1.0.6) DT-300N (fw: Cen-CPE-N2H10A v1.0.14) DT-300N (fw: Cen-
Google Chrome 60.0.3080.5 V8 JavaScript Engine - Out-of-Bounds Write
  日期:2017-05-31 17:44:59 点击:71 评论:0
// Source: https://halbecaf.com/2017/05/24/exploiting-a-v8-oob-write/ // // v8 exploit for https://crbug.com/716044 var oob_rw = null; var leak = null; var arb_rw = null; var code = function() { return 1; } code(); class BuggyArray extends Array { co
共637页/12733条记录 首页 上一页 [71] [72] [73] 74 [75] [76] [77] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved