首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Android get_user/put_user Exploit
  日期:2016-12-28 14:45:28 点击:39 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rex'class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post:
PHPMailer 5.2.17 - Remote Code Execution
  日期:2016-12-27 15:20:55 点击:46 评论:0
#!/bin/bash # CVE-2016-10033 exploit by opsxcq # https://github.com/opsxcq/exploit-CVE-2016-10033 echo '[+] CVE-2016-10033 exploit by opsxcq' if [ -z $1 ] then echo '[-] Please inform an host as parameter' exit -1 fi host=$1 echo '[+] Exploiting '$ho
FTPShell Server 6.36 - '.csv' Local Denial of Service
  日期:2016-12-27 15:19:57 点击:29 评论:0
#Exploit FTPShell server 6.36 '.csv' Crash(PoC) #Author: albalawi_sultan #Tested on:win7 #st :http://www.ftpshell.com/download.htm #1-open FTPShell Server Administrator #2-manage Ftp accounts #3-import from csv ban= 'x0dx0ax20x20x20x20x20x20
XAMPP Control Panel - Denial Of Service
  日期:2016-12-26 16:15:44 点击:45 评论:0
''' [+] Credits: John Page (hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/XAMPP-CONTROL-PANEL-MEMORY-CORRUPTION-DOS.txt [+] ISR: ApparitionSec Vendor: ===================== www.apachefriends.o
Apache mod_session_crypto - Padding Oracle
  日期:2016-12-26 16:14:42 点击:86 评论:0
''' Advisory: Padding Oracle in Apache mod_session_crypto During a penetration test, RedTeam Pentesting discovered a Padding Oracle vulnerability in mod_session_crypto of the Apache web server. This vulnerability can be exploited to decrypt the sessi
macOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement
  日期:2016-12-23 15:35:16 点击:39 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=977 syslogd (running as root) hosts the com.apple.system.logger mach service. It's part of the system.sb sandbox profile and so reachable from a lot of sandboxed contexts. Here's a
macOS 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement
  日期:2016-12-23 15:34:27 点击:53 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=976 powerd (running as root) hosts the com.apple.PowerManagement.control mach service. It checks in with launchd to get a server port and then wraps that in a CFPort: pmServerMachPo
macOS < 10.12.2 / iOS < 10.2 - Broken Kernel Mach Port Name uref Handling Privil
  日期:2016-12-23 15:32:31 点击:27 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=959 Proofs of Concept: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40957.zip When sending and receiving mach messages from userspace there
macOS < 10.12.2 / iOS < 10.2 Kernel - _kernelrpc_mach_port_insert_right_trap Ref
  日期:2016-12-23 15:31:35 点击:23 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=941 Proofs of Concept: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40956.zip The previous ref count overflow bugs were all kinda slow becau
macOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
  日期:2016-12-23 15:30:36 点击:65 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=954 Proofs of Concept: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40954.zip Userspace MIG services often use mach_msg_server or mach_msg_s
Vesta Control Panel 0.9.8-16 - Local Privilege Escalation
  日期:2016-12-23 15:28:52 点击:17 评论:0
#!/bin/bash # # Exploit Title: Vesta Control Panel 0.9.7 = 0.9.8-16 Local Privilege Escalation Exploit # Google Dork: vesta control panel inurl:8083 # Exploit Author: Luka Pusic @lukapusic, Jaka Hudoklin @offlinehacker # Vendor Homepage: http://vesta
macOS 10.12.1 Kernel - Writable Privileged IOKit Registry Properties Code Execut
  日期:2016-12-23 15:27:50 点击:455 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=974 There are two ways for IOServices to define their IOUserClient classes: they can override IOService::newUserClient and allocate the correct type themselves or they can set the I
IBM AIX 6.1/7.1/7.2 - 'Bellmail' Privilege Escalation
  日期:2016-12-23 15:26:34 点击:113 评论:0
#!/usr/bin/sh # # CVE-2016-8972/bellmailroot.sh: IBM AIX Bellmail local root # # Affected versions: # AIX 6.1, 7.1, 7.2 # VIOS 2.2.x # # Fileset Lower Level Upper Level KEY # --------------------------------------------------------- # bos.net.tcp.cli
at(1) Persistence Module
  日期:2016-12-23 15:11:53 点击:32 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include Msf::Exploit::Fil
NETGEAR WNR2000v5 - Remote Code Execution
  日期:2016-12-22 14:56:47 点击:37 评论:0
# # Source: https://raw.githubusercontent.com/pedrib/PoC/master/exploits/netgearPwn.rb # # Remote code execution in NETGEAR WNR2000v5 # - by Pedro Ribeiro ( pedrib@gmail.com ) / Agile Information Security # Released on 20/12/2016 # # NOTE: this explo
Microsoft Edge - Internationalization Initialization Type Confusion (MS16-144)
  日期:2016-12-22 14:56:01 点击:33 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=972 In Chakra, Internationlization is initialized the first time the Intl object is used, by executing the script in Intl.js ( https://github.com/Microsoft/ChakraCore/blob/master/l
Microsoft Edge - SIMD.toLocaleString Uninitialized Memory (MS16-145)
  日期:2016-12-22 14:55:29 点击:17 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=961 The following code occurs in JavascriptSIMDObject::ToLocaleString in JavascriptSimdObject.cpp: Var* newArgs = HeapNewArray(Var, numArgs); switch (numArgs) { case 1: break; case
Microsoft Internet Explorer 11 MSHTML - CSpliceTree­Engine::RemoveSplice Use
  日期:2016-12-21 14:28:37 点击:16 评论:0
!-- Source: http://blog.skylined.nl/20161220001.html Synopsis A specially crafted web-page can trigger a use-after-free vulnerability in Microsoft Internet Explorer 11. There is sufficient time between the free and reuse for an attacker to control th
Google Chrome < 31.0.1650.48 - HTTP 1xx base::StringTokenizer­T<...>::QuickG
  日期:2016-12-20 14:19:53 点击:19 评论:0
''' Source: http://blog.skylined.nl/20161219001.html Synopsis A specially crafted HTTP response can allow a malicious web-page to trigger a out-of-bounds read vulnerability in Google Chrome. The data is read from the main process' memory. Known affec
ntop-ng 2.5.160805 - Username Enumeration
  日期:2016-12-20 14:19:13 点击:13 评论:0
# Exploit title: ntopng user enumeration # Author: Dolev Farhi # Contact: dolevf at protonmail.com # Date: 04-08-2016 # Vendor homepage: ntop.org # Software version: v.2.5.160805 #!/usr/env/python import os import sys import urllib import urllib2 imp
共637页/12733条记录 首页 上一页 [91] [92] [93] 94 [95] [96] [97] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved