首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
VX Search 10.6.18 - 'directory' Local Buffer Overflow
  日期:2018-04-19 17:59:51 点击:0 评论:0
#!/usr/bin/python # Title: VX Search 10.6.18 Local Buffer Overflow # Author: Kevin McGuigan # Twitter: @_h3xagram # Author Website: https://www.7elements.co.uk # Vendor Website: http://www.vxsearch.com # Version: 10.6.18 # Date: 18/04/2018 # Tested
Lutron Quantum 2.0 - 3.2.243 - Information Disclosure
  日期:2018-04-19 17:59:16 点击:0 评论:0
''' # Exploit Title: Login bypass and data leak - Lutron Quantum 2.0 - 3.2.243 firmware # Date: 20-03-2018 # Exploit Author: David Castro # Contact: https://twitter.com/SadFud75 # Vendor Homepage: http://www.lutron.com # Software Link: http://www.lu
Easy File Sharing Web Server 7.2 - Stack Buffer Overflow
  日期:2018-04-19 17:58:32 点击:0 评论:0
# Exploit Title: Easy File Sharing Web Server 7.2 stack buffer overflow # Date: 03/24/2018 # Exploit Author: rebeyond - http://www.rebeyond.net # Vendor Homepage: http://www.sharing-file.com/ # Software Link: http://www.sharing-file.com/efssetup.exe
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Meta
  日期:2018-04-19 17:57:37 点击:0 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient de
AMD Plays.tv 1.27.5.0 - 'plays_service.exe' Arbitrary File Execution
  日期:2018-04-19 17:56:03 点击:0 评论:0
######################################################################## # http://support.amd.com/en-us/download?cmpid=CCCOffline - # Click Automatically Detect - Download Now # Installation Automatically Installs Raptr, Inc Plays TV Service # # OR
Brave Browser < 0.13.0 - 'window.close(self)' Denial of Service
  日期:2018-04-19 17:48:01 点击:0 评论:0
# Exploit Title:Brave Browser 0.13.0 Denial of Service (resource consumption) via a window.close(self) js code. # Date: 2017-10-16 # Exploit Author: Sahil Tikoo # Vendor Homepage: https://brave.com # Software Link: https://github.com/brave/browser-l
Brave Browser < 0.13.0 - 'long alert() argument' Denial of Service
  日期:2018-04-19 17:46:12 点击:0 评论:0
# Exploit Title:Brave Browser 0.13.0 Denial of Service (resource consumption) via a long alert() argument. # Date: 2017-10-16 # Exploit Author: Sahil Tikoo # Vendor Homepage: https://brave.com # Software Link: https://github.com/brave/browser-laptop
Facebook Graph Groups Crosswalk User Metadata Mapping Weakness
  日期:2018-04-19 17:45:22 点击:0 评论:0
#!/usr/bin/perl## Facebook (facebug) 'Graph' Groups crosswalk user's # metadata mapping weakness (Demo PoC)### 2018 Todor Donev todor.donev at gmail.com# https://ethical-hacker.org/# https://facebook.com/ethicalhackerorg## Description:# Criminal hac
CloudMe Sync 1.11.0 Local Buffer Overflow
  日期:2018-04-19 17:44:28 点击:0 评论:0
######################################################## Exploit Title: Local Buffer Overflow on CloudMe Sync v1.11.0# Date: 08.03.2018# Vendor Homepage: https://www.cloudme.com/en# Software Link: https://www.cloudme.com/downloads/CloudMe_1110.exe#
Facebook Graph Phone Number Metadata Crosswalk Mapping Proof Of Concept
  日期:2018-04-19 17:43:05 点击:0 评论:0
#!/usr/bin/perl## Facebook 'Graph' Phone Number metadata crosswalk mapping (PoC)## 2018 Todor Donev todor.donev at gmail.com# https://ethical-hacker.org/# https://facebook.com/ethicalhackerorg## Description:# Criminal hacker (CRACKER) can take advan
Facebook Graph Metadata Crosswalk Mapping Proof Of Concept
  日期:2018-04-19 17:42:18 点击:0 评论:0
#!/usr/bin/perl## Facebook 'Graph' metadata crosswalk mapping (PoC)## 2018 Todor Donev todor.donev at gmail.com# https://ethical-hacker.org/# https://facebook.com/ethicalhackerorg## Description:# Criminal hacker (CRACKER) can take advantage of # thi
Zortam MP3 Media Studio 23.45 Buffer Overflow
  日期:2018-04-19 17:41:23 点击:0 评论:0
#!/usr/bin/python# Title: Zortam Mp3 Media Studio Local Buffer Overflow (SEH)# Author: Kevin McGuigan# Twitter: @_h3xagram# Author Website: https://www.7elements.co.uk# Vendor Website: http://www.zortam.com/# Version: 23.45# Tested on: Windows 7 32
Microsoft Window Manager (Windows 7 x86) - Menu Management Component UAF Privile
  日期:2018-04-19 17:40:19 点击:0 评论:0
#include Windows.h #include wingdi.h #include iostream #include Psapi.h #pragma comment(lib, psapi.lib) #define POCDEBUG 0 #if POCDEBUG == 1 #define POCDEBUG_BREAK() getchar() #elif POCDEBUG == 2 #define POCDEBUG_BREAK() DebugBreak() #else #define P
Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS17-017)
  日期:2018-04-19 17:39:26 点击:0 评论:0
#include Windows.h #include wingdi.h #include iostream #include Psapi.h #pragma comment(lib, psapi.lib) #define POCDEBUG 0 #if POCDEBUG == 1 #define POCDEBUG_BREAK() getchar() #elif POCDEBUG == 2 #define POCDEBUG_BREAK() DebugBreak() #else #define P
Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS16-039)
  日期:2018-04-19 17:37:25 点击:0 评论:0
#include Windows.h #include wingdi.h #include iostream #include Psapi.h #pragma comment(lib, psapi.lib) #define POCDEBUG 0 #if POCDEBUG == 1 #define POCDEBUG_BREAK() getchar() #elif POCDEBUG == 2 #define POCDEBUG_BREAK() DebugBreak() #else #define P
Barco ClickShare CSE-200 - Remote Denial of Service
  日期:2018-04-17 14:27:21 点击:4 评论:0
#!/usr/bin/python # Exploit Title: Barco ClickShare CSE-200 - Remote Denial of Service # Date: 11-04-2018 # Hardware Link: https://www.barco.com/de/product/clickshare-cse-200 # Exploit Author: Florian Hauser # Contact: florian DOT g DOT hauser AT gma
GNU Beep 1.3 - 'HoleyBeep' Local Privilege Escalation
  日期:2018-04-16 17:38:20 点击:2 评论:0
#!/usr/bin/env python3 # # E-DB Note ~ https://gist.github.com/Arignir/0b9d45c56551af39969368396e27abe8/ec853f14afd6e86fb3f2efce2086e28f33039ddc # E-DB Note ~ https://sigint.sh/#/holeybeep # # This is an exploit for HoleyBeep. # # To use it, place a
MikroTik 6.41.4 - FTP daemon Denial of Service PoC
  日期:2018-04-16 17:37:05 点击:2 评论:0
################ #Title: MikroTik 6.41.4 Denial of service FTP daemon crash #CVE: CVE-2018-10070 #CWE: CWE-400 #Exploit Author: Hosein Askari (FarazPajohan) #Vendor HomePage: https://mikrotik.com/ #Version : 6.41.4 (Released 2018-Apr-05) | All Versi
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execut
  日期:2018-04-16 17:35:09 点击:32 评论:0
# EDB-Note. Have the contents of shell on http://attacker/shell.php require 'net/http' # Hans Topo ruby port from Drupalggedon2 exploit. # Based on Vitalii Rudnykh exploit target = ARGV[0] command = ARGV[1] url = target + '/user/register?element_pare
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execut
  日期:2018-04-16 17:33:54 点击:6 评论:0
#!/usr/bin/env import sys import requests print ('################################################################') print ('# Proof-Of-Concept for CVE-2018-7600') print ('# by Vitalii Rudnykh') print ('# Thanks by AlbinoDrought, RicterZ, FindYanot,
共603页/12046条记录 首页 1 [2] [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Linux Kernel < 4.4.0-116 (Ub
·Drupal < 7.58 / < 8.3.9 / <
·Hikvision IP Camera versions
·Vtiger CRM 6.3.0 - Authentic
·SysGauge Pro 4.6.12 Local Bu
·Nginx 1.13.10 Accept-Encodin
·Adobe Flash 28.0.0.137 Remot
·Crashmail 1.6 Buffer Overflo
·F5 BIG-IP 11.6 SSL Virtual S
·Exodus Wallet (ElectronJS Fr
·DuckDuckGo 4.2.0 WebRTC Priv
·Cisco node-jos < 0.11.0 - Re
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved