首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Apache CouchDB 2.0.0 - Local Privilege Escalation
  日期:2016-12-06 16:30:56 点击:74 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/APACHE-COUCHDB-LOCAL-PRIVILEGE-ESCALATION.txt [+] ISR: ApparitionSec Vendor: ================== couchdb.apache.org Produ
Microsoft MSINFO32.EXE 6.1.7601 - '.NFO' XML External Entity Injection
  日期:2016-12-06 16:30:20 点击:33 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-MSINFO32-XXE-FILE-EXFILTRATION.txt [+] ISR: ApparitionSec Vendor: ================= www.microsoft.com Product:
Microsoft Event Viewer 1.0 - XML External Entity Injection
  日期:2016-12-06 16:27:59 点击:26 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-EVENT-VIEWER-XXE-FILE-EXFILTRATION.txt [+] ISR: ApparitionSec Vendor: ================= www.microsoft.com Prod
Alcatel Lucent Omnivista 8770 - Remote Code Execution
  日期:2016-12-05 14:54:08 点击:125 评论:0
import socket import time import sys import os # ref https://blog.malerisch.net/ # Omnivista Alcatel-Lucent running on Windows Server if len(sys.argv) 2: print Usage: %s target command % sys.argv[0] print eg: %s 192.168.1.246 powershell.exe -nop -w
Microsoft Windows Media Center 6.1.7600 - 'ehshell.exe' XML External Entity Inje
  日期:2016-12-05 14:53:21 点击:27 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-MEDIA-CENTER-XXE-FILE-DISCLOSURE.txt [+] ISR: ApparitionSec Vendor: ================== www.microsoft.
Microsoft Excel Starter 2010 - XML External Entity Injection
  日期:2016-12-05 14:52:44 点击:60 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-EXCEL-STARTER-XXE-REMOTE-FILE-DISCLOSURE.txt [+] ISR: ApparitionSec Vendor: ================= www.microsoft.c
Microsoft Authorization Manager 6.1.7601 - 'azman' XML External Entity Injection
  日期:2016-12-05 14:52:06 点击:19 评论:0
[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-AZMAN-XXE-FILE-EXFILTRATION.txt [+] ISR: ApparitionSec Vendor: ================== www.microsoft.com Product:
BlackStratus LOGStorm 4.5.1.35/4.5.1.96 - Remote Code Execution
  日期:2016-12-05 14:50:53 点击:116 评论:0
#!/usr/bin/python # logstorm-root.py # # BlackStratus LOGStorm Remote Root Exploit # # Jeremy Brown [jbrown3264/gmail] # Dec 2016 # # -Synopsis- # # Better Security and Compliance for Any Size Business # # BlackStratus LOGStorm has multiple vulnerab
Apache ActiveMQ 5.11.1/5.13.2 - Directory Traversal / Command Execution
  日期:2016-12-05 14:48:10 点击:38 评论:0
I have recently been playing with Apache ActiveMQ, and came across a simple but interesting directory traversal flaw in the fileserver upload/download functionality. I have only been able to reproduce this on Windows, i.e. where is a path delimite
Windows Escalate UAC Protection Bypass
  日期:2016-12-02 14:09:56 点击:114 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'msf/core/exploit/exe'require 'msf/core/exploit/powershell'class MetasploitModule Msf::Exp
Opera foreignObject textNode::removeChild Use-After-Free
  日期:2016-12-02 14:08:54 点击:19 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is thetwenty-second entry in that series. Unfortunately I won't be able topublish everything within one month at the curren
MS Edge CMarkup::EnsureDeleteCFState Use-After-Free
  日期:2016-12-02 14:08:03 点击:28 评论:0
As I am sure you are by now well aware, in November I decided to startreleasing details on all vulnerabilities I found in web-browsers that Ihad not released before. As I was unable to publish all of them within asingle month, I will try to continue
Disk Savvy Enterprise 9.1.14 - 'GET' Buffer Overflow
  日期:2016-12-02 14:06:54 点击:14 评论:0
#!/usr/bin/python import socket,os,time #SEH Stack Overflow in GET request #Disk Savvy Enterprise 9.1.14 #Tested on Windows XP SP3 Windows 7 Professional host = 192.168.1.20 port = 80 #badchars x00x09x0ax0dx20 #msfvenom -a x86 --platform window
PDF Shaper Buffer Overflow
  日期:2016-12-02 14:05:58 点击:57 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class MetasploitModule Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT
ntpd 4.2.8 Stack Overflow Proof Of Concept
  日期:2016-12-02 14:03:24 点击:17 评论:0
/* Remote ntpd 4.2.8 Stack Over Flow Proof Of Concept Exploit by N_A , N_A[at]tutanota.com Please use this code to test your own servers. Do not break the law. Do not misuse. I am not responsible for any misuse of this code N_A[at]tutanota.com */ #i
Xitami Web Server 5.0a0 - Denial of Service
  日期:2016-12-01 15:44:05 点击:57 评论:0
#!/usr/bin/env python # # # X5 Webserver 5.0 Remote Denial Of Service Exploit # # # Vendor: iMatrix # Product web page: http://www.xitami.com # Affected version: 5.0a0 # # Summary: X5 is the latest generation web server from iMatix Corporation. # The
Google Chrome Accessibility blink::Node Corruption
  日期:2016-11-30 14:24:39 点击:24 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is thetwenty-first entry in that series. Unfortunately I won't be able topublish everything within one month at the current
WinPower 4.9.0.4 - Privilege Escalation
  日期:2016-11-30 14:23:48 点击:144 评论:0
# Exploit Title: WinPower V4.9.0.4 Privilege Escalation # Date: 29-11-2016 # Software Link: http://www.ups-software-download.com/ # Exploit Author: Kacper Szurek # Contact: http://twitter.com/KacperSzurek # Website: http://security.szurek.pl/ # Categ
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition Privilege
  日期:2016-11-30 14:21:14 点击:135 评论:0
// EDB-Note: Compile: g++ -Wall -pedantic -O2 -std=c++11 -pthread -o dcow 40847.cpp -lutil // EDB-Note: Recommended way to run: ./dcow -s (Will automatically do echo 0 /proc/sys/vm/dirty_writeback_centisecs) // // ------------------------------------
Eagle Speed USB Modem Software Privilege Escalation
  日期:2016-11-29 17:04:59 点击:22 评论:0
#!/usr/bin/python -w # Title : Eagle Speed USB MODEM SOFTWARE Privilege Escalation # Date : 28/11/2016 # Author : R-73eN # Tested on : Windows 7 ( Latest version of the software) # Software : N/A ( Comes with the USB Modem) # Vulnerability Descripti
共637页/12733条记录 首页 上一页 [94] [95] [96] 97 [98] [99] [100] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved