首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Linux Kernel 2.6.x pipe.c Privilege Escalation
  日期:2016-11-24 14:05:53 点击:88 评论:0
/* exp_moosecox.c Watch a video of the exploit here: http://www.youtube.com/watch?v=jt81NvaOj5Y developed entirely by Ingo Molnar (exploit writer extraordinaire!) , thanks to Fotis Loukos for pointing the bug out to me -- neat bug! :) dedicated to t
Linux Kernel 2.6.32-rc1 x86_64 Register Leak
  日期:2016-11-24 14:05:11 点击:22 评论:0
/* written by Ingo Molnar -- it's true because this comment says the exploit was written by him!*/ #include stdio.h#include sys/syscall.h unsigned int _r81;unsigned int _r82;unsigned int _r91;unsigned int _r92;unsigned int _r101;unsigned int _r102;u
Linux Kernel 2.6.18 move_pages() Information Leak
  日期:2016-11-24 14:03:45 点击:27 评论:0
/* sieve (because the Linux kernel leaks like one, get it?) Bug NOT discovered by Marcus Meissner of SuSE security This bug was discovered by Ramon de Carvalho Valle in September of 2009 The bug was found via fuzzing, and on Sept 24th I was sent a P
Chrome Blink SpeechRecognitionController Use-After-Free
  日期:2016-11-24 14:03:07 点击:18 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is theseventeenth entry in that series. Unfortunately I won't be able topublish everything within one month at the current
Linux Kernel 2.6.32-642 / 3.16.0-4 - 'inode' Integer Overflow
  日期:2016-11-24 14:02:05 点击:127 评论:0
/* Linux Kernel 2.6.32-642 / 3.16.0-4 'inode' Integer Overflow PoC The inode is a data structure in a Unix-style file system which describes a filesystem object such as a file or a directory. Each inode stores the attributes and disk block locations
Microsoft Internet Explorer 8 8 MSHTML SRunPointer::SpanQualifier/RunType Out-Of
  日期:2016-11-23 14:46:22 点击:16 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is thesixteenth entry in that series. Unfortunately I won't be able topublish everything within one month at the current ra
Microsoft Internet Explorer 8 MSHTML - 'Ptls5::LsFindSpanVisual­Boundaries'
  日期:2016-11-23 14:45:43 点击:25 评论:0
!-- Source: http://blog.skylined.nl/20161121001.html Synopsis A specially crafted web-page can cause an unknown type of memory corruption in Microsoft Internet Explorer 8. This vulnerability can cause the Ptls5::Ls method (or other methods called by
TP-LINK TDDP - Multiple Vulnerabilities
  日期:2016-11-23 14:44:40 点击:63 评论:0
1. Advisory Information Title: TP-LINK TDDP Multiple Vulnerabilities Advisory ID: CORE-2016-0007 Advisory URL: http://www.coresecurity.com/advisories/tp-link-tddp-multiple-vulnerabilities Date published: 2016-11-21 Date of last update: 2016-11-18 Ven
NTP 4.2.8p8 - Denial of Service
  日期:2016-11-23 14:43:52 点击:241 评论:0
#!/usr/bin/env python # Exploit Title: ntpd remote pre-auth Denial of Service # Date: 2016-11-21 # Exploit Author: Magnus Klaaborg Stubman (@magnusstubman) # Website: http://dumpco.re/cve-2016-7434/ # Vendor Homepage: http://www.ntp.org/ # Software L
ntpd 4.2.7.p22 / 4.3.0 Denial Of Service
  日期:2016-11-23 14:41:30 点击:67 评论:0
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512CVE-2016-7434 ntpd remote pre-auth Denial of Service+----------------------------------------------------------------------------------------------+Affected: ntp-4.2.7p22, up to but not including ntp-4.2
Dlink DIR Routers Unauthenticated HNAP Login Stack Buffer Overflow
  日期:2016-11-22 14:55:47 点击:30 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'# Payload working status:# MIPS:# - all valid payloads working (the ones that we are able to send
Putty 0.67 Cleartext Password Storage
  日期:2016-11-22 14:55:06 点击:41 评论:0
[+] Credits: John Page aka hyp3rlinx[+] Website: hyp3rlinx.altervista.org[+] Source:http://hyp3rlinx.altervista.org/advisories/PUTTY.EXE-INSECURE-PASSWORD-STORAGE.txt[+] ISR: ApparitionSecVendor:==========================www.chiark.greenend.org.ukPr
Microsoft Edge Scripting Engine - Memory Corruption (MS16-129)
  日期:2016-11-22 14:53:13 点击:37 评论:0
!-- Source: http://www.security-assessment.com/files/documents/advisory/edge_chakra_mem_corruption.pdf Name: Microsoft Edge Scripting Engine Memory Corruption Vulnerability (MS16-129) CVE: CVE-2016-7202 Vendor Website: http://www.microsoft.com/ Date
Microsoft Edge CTextExtractor::GetBlockText Out-Of-Bounds Read
  日期:2016-11-21 14:14:03 点击:19 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is thefourteenth entry in that series. Unfortunately I won't be able topublish everything within one month at the current r
Microsoft Internet Explorer 11 iertutil LCIEGetTypedComponentFromThread Use-Afte
  日期:2016-11-21 14:04:18 点击:20 评论:0
Throughout November, I plan to release details on vulnerabilities Ifound in web-browsers which I've not released before. This is thethirteenth entry in that series. Unfortunately I won't be able topublish everything within one month at the current r
Microsoft Edge - 'Array.splice' Heap Overflow
  日期:2016-11-21 14:03:34 点击:176 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=934 There is a heap overflow in Array.splice in Chakra. When an array is spliced, and overflow check is performed, but ArraySpeciesCreate, which can execute code and alter the arra
Microsoft Edge - 'Array.reverse' Overflow
  日期:2016-11-21 14:01:33 点击:22 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=925 There is an overflow when reversing arrays in Chakra. On line 5112 of JavascriptArray::EntryReverse, the length of the array is fetched and stored. It is then passed as a param
Microsoft Edge - 'Array.filter' Info Leak
  日期:2016-11-21 14:00:54 点击:19 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=922 There is an info leak in Array.filter. In Chakra, the destination array that arrays are filtered into is initialized using ArraySpeciesCreate, which can create both native and
Microsoft Edge - 'FillFromPrototypes' Type Confusion
  日期:2016-11-21 13:59:33 点击:18 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=945 JavascriptArray::FillFromPrototypes is a method that is used by several Javascript functions available in the browser to set the native elements of an array to the values provi
Moxa SoftCMS 1.5 - Denial of Service (PoC)
  日期:2016-11-21 13:57:31 点击:22 评论:0
''' # Title: Moxa SoftCMS 1.5 AspWebServer Denial of Service Vulnerability # Author: Zhou Yu # Email: 504137480@qq.com # Vendor: http://www.moxa.com/ # Versions affected: 1.5 or prior versions # Test on: Moxa SoftCMS 1.5 on Windows 7 SP1 x32 # CVE: C
共637页/12733条记录 首页 上一页 [96] [97] [98] 99 [100] [101] [102] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved