首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
iTechscripts Freelancer Script 5.11 - 'sk' Parameter SQL Injection
  日期:2017-01-13 15:41:11 点击:35 评论:0
#!/usr/bin/perl -w # iTechscripts Freelancer Script v5.11 (sk) SQL Injection Vulnerability # Author : v3n0m # Contact : v3n0m[at]outlook[dot]com # Date : January, 11-2017 GMT +7:00 Jakarta, Indonesia # Software : Freelancer Script # Version : 5.11 Lo
Cisco Firepower Management Console 6.0 Post Authentication UserAdd
  日期:2017-01-12 18:14:39 点击:56 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::
Firejail - Privilege Escalation
  日期:2017-01-12 18:13:29 点击:41 评论:0
# firejail advisory for TOCTOU in --get and --put (local root) Releasing a brief advisory/writeup about a local root privesc found in firejail that we reported back in Nov, 2016. This is in response to a recent [thread]( http://seclists.org/oss-sec/2
Cemu 1.6.4b - Information Leak + Buffer Overflow (Emulator Breakout)
  日期:2017-01-12 18:12:45 点击:75 评论:0
For those who only care about one thing: [the PoC is here.]( https://rol.im/kpwned.zip ) Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/41021.zip ## Overview Cemu is a closed-source Wii U emulator develo
Microsoft Windows 8.1 (x64) - RGNOBJ Integer Overflow (MS16-098)
  日期:2017-01-12 18:11:59 点击:36 评论:0
// Source: https://github.com/sensepost/ms16-098/tree/b85b8dfdd20a50fc7bc6c40337b8de99d6c4db80 // Binary: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/41020.exe #include Windows.h #include wingdi.h #include st
Microsoft Windows Kernel - 'win32k.sys' 'NtSetWindowLongPtr' Privilege Escalatio
  日期:2017-01-12 18:10:23 点击:49 评论:0
/* Source: https://ricklarabee.blogspot.com/2017/01/virtual-memory-page-tables-and-one-bit.html Binary: https://github.com/rlarabee/exploits/raw/8b9eb646516d7f022a010f28018209f331c28975/cve-2016-7255/compiled/cve-2016-7255.exe Mirror: https://github.
DiskBoss Enterprise 7.5.12 - 'POST' Buffer Overflow (SEH)
  日期:2017-01-11 17:05:14 点击:29 评论:0
#!/usr/bin/python # Exploit Title: DiskBoss Enterprise 7.5.12 SEH + Egghunter Buffer Overflow # Date: 10-01-2017 # Exploit Author: Wyndell Bibera # Software Link: http://www.diskboss.com/setups/diskbossent_setup_v7.5.12.exe # Version: 7.5.12 # Teste
Enigma Fileless UAC Bypass
  日期:2017-01-10 15:42:18 点击:42 评论:0
a### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/framework/
Brave Browser 1.2.16/1.9.56 - Address Bar URL Spoofing
  日期:2017-01-09 14:46:13 点击:20 评论:0
Brave Browser Suffers from Address Bar Spoofing Vulnerability. Address Bar spoofing is a critical vulnerability in which any attacker can spoof the address bar to a legit looking website but the content of the web-page remains different from the Addr
Kaspersky 17.0.0 - Local CA root is Incorrectly Protected
  日期:2017-01-05 15:14:32 点击:43 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=989 When Kaspersky generate a private key for the local root, they store the private key in %ProgramData%. Obviously this file cannot be shared, because it's the private key for a t
Zyxel/Eir D1000 DSL Modem NewNTPServer Command Injection Over TR-064
  日期:2017-01-05 15:13:11 点击:52 评论:0
require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::CmdStager def initialize(info = {}) super(update_info(info, 'Name' = 'Zyxel/Eir D1000 DSL Modem New
PHPMailer Sendmail Argument Injection
  日期:2017-01-04 15:13:19 点击:48 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::FileDropper
PHPMailer < 5.2.20 / SwiftMailer < 5.4.5-DEV / Zend Framework / zend-mail < 2.4.
  日期:2017-01-03 17:57:49 点击:60 评论:0
#!/usr/bin/pythonintro = 33[94m __ __ __ __ __ / / ___ ____ _____ _/ / / / / /___ ______/ /_____ __________ / / / _ / __ `/ __ `/ / / /_/ / __ `/ ___/ //_/ _ / ___/ ___/ / /___/ __/ /_/ / /_/ / / / __ / /_/ / /__/ , / __/ / (__ ) /_____/___/__
Internet Download Accelerator 6.10.1.1527 - FTP Buffer Overflow (SEH)
  日期:2017-01-03 17:55:34 点击:19 评论:0
#!/usr/bin/python## Exploit Title: IDA 6.10.1.1527 FTP SEH Universal exploit.# Exploit Author: Fady Mohamed Osman (@fady_osman)# Exploit-db : http://www.exploit-db.com/author/?a=2986# Youtube : https://www.youtube.com/user/cutehack3r# Date: Jan 2, 2
Xfinity Gateway (Technicolor DPC3941T) - Cross-Site Request Forgery
  日期:2017-01-03 17:54:00 点击:80 评论:0
# Exploit Title: CSRF XFINITY Gateway product Technicolor(previously Cisco) DPC3941T# Date: 09/08/2016# Exploit Author: Ayushman Dutta# Version: dpc3941-P20-18-v303r20421733-160413a-CMCST# CVE : CVE-2016-7454The Device DPC3941T is vulnerable to CSRF
Zend Framework / zend-mail < 2.4.11 - Remote Code Execution
  日期:2017-01-03 17:52:16 点击:29 评论:0
?php /* Zend Framework 2.4.11 Remote Code Execution (CVE-2016-10034)zend-mail 2.4.11 zend-mail 2.7.2 Discovered/Coded by: Dawid Golunskihttps://legalhackers.com Full Advisory URL:https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Rem
PHPMailer < 5.2.18 - Remote Code Execution (Python)
  日期:2016-12-30 14:13:07 点击:65 评论:0
# Exploit Title: PHPMailer Exploit v1.0 # Date: 29/12/2016 # Exploit Author: Daniel aka anarc0der # Version: PHPMailer 5.2.18 # Tested on: Arch Linux # CVE : CVE 2016-10033 Description: Exploiting PHPMail with back connection (reverse shell) from th
SwiftMailer < 5.4.5-DEV - Remote Code Execution
  日期:2016-12-29 15:00:01 点击:18 评论:0
?php /* SwiftMailer = 5.4.5-DEV Remote Code Execution (CVE-2016-10074) Discovered/Coded by: Dawid Golunski https://legalhackers.com Full Advisory URL: https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html E
PHPMailer < 5.2.18 - Remote Code Execution (PHP)
  日期:2016-12-29 14:59:13 点击:32 评论:0
?php /* PHPMailer 5.2.18 Remote Code Execution (CVE-2016-10033) Discovered/Coded by: Dawid Golunski (@dawid_golunski) https://legalhackers.com Full Advisory URL: https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vu
PHPMailer < 5.2.20 - Remote Code Execution
  日期:2016-12-29 14:58:13 点击:45 评论:0
#!/usr/bin/python intro = PHPMailer RCE PoC Exploits PHPMailer 5.2.18 Remote Code Execution PoC Exploit (CVE-2016-10033) + PHPMailer 5.2.20 Remote Code Execution PoC Exploit (CVE-2016-10045) (the bypass of the first patch for CVE-2016-10033) Discover
共637页/12733条记录 首页 上一页 [90] [91] [92] 93 [94] [95] [96] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved