首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  vsserver
  当前位置:主页>安全文章>文章资料>Exploits>列表
WebKitGTK+ < 2.21.3 - 'WebKitFaviconDatabase' DoS
  日期:2018-06-12 15:43:43 点击:0 评论:0
## # Title: WebKitGTK+ 2.21.3 - 'WebKitFaviconDatabase' DoS # Author: Dhiraj Mishra # Date: 2018-06-11 # CVE: 2018-11646 # # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-frame
Gnome Web (Epiphany) Denial Of Service
  日期:2018-06-11 17:57:20 点击:3 评论:0
# Title: Gnome Web/Epiphany Browser 3.28.2.1 - DoS App Crash (PoC)# Exploit Author: https://github.com/ldpreload# Date: 2018-06-06# Link: https://wiki.gnome.org/Apps/Web# Version: 3.28.2.1 ! libephymain.so in GNOME WEB/Epiphany 3.28.2.1 allows a rem
Chrome V8 PromiseAllResolveElementClosure Element Confusion
  日期:2018-06-11 17:56:33 点击:3 评论:0
Chrome: V8: PromiseAllResolveElementClosure can cause elements kind confusion The Promise.all method internally uses PromiseAllResolveElementClosure (a href=https://cs.chromium.org/chromium/src/v8/src/builtins/builtins-promise-gen.cc?rcl=dc2d3bb9711
Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues
  日期:2018-06-11 17:39:13 点击:6 评论:0
# Title: Windows 10 'scrrun.dll' Multiple vulnerabilities# Author: Nassim Asrir# Contact: wassline@gmail.com / https://www.linkedin.com/in/nassim-asrir-b73a57122/# Vendor: https://www.microsoft.com/Test ENV:========Browser : IE 11 OS: Windows 10 - x
XiongMai uc-httpd 1.0.0 - Buffer Overflow
  日期:2018-06-11 17:38:03 点击:0 评论:0
# Exploit Title: XiongMai uc-httpd 1.0.0 - Buffer Overflow # Date: 2018-06-08 # Exploit Author: Andrew Watson # Software Version: XiongMai uc-httpd 1.0.0 # Vendor Homepage: http://www.xiongmaitech.com/en/ # Tested on: KKMoon DVR running XiongMai uc-
WebKit - Use-After-Free when Resuming Generator
  日期:2018-06-11 17:36:23 点击:0 评论:0
!-- In WebKit, resuming a generator is implemented in JavaScript. An internal object property, @generatorState is used to prevent recursion within generators. In GeneratorPrototype.js, the state is checked by calling: var state = this.@generatorStat
Google Chrome - Integer Overflow when Processing WebAssembly Locals
  日期:2018-06-11 17:35:30 点击:0 评论:0
/* When v8 decodes the locals of a function, it performs a check: if ((count + type_list-size()) kV8MaxWasmFunctionLocals) { decoder-error(decoder-pc() - 1, local count too large); return false; } On a 32-bit platform, this check can be bypassed due
WebKit - WebAssembly Compilation Info Leak
  日期:2018-06-11 17:34:36 点击:1 评论:0
!-- There is an out-of-bounds read when compiling WebAssembly source buffers in WebKit. When a source buffer is compiled, it is first copied into a read-only buffer by the functuion getWasmBufferFromValue. This function returns the code buffer as fol
TrendMicro OfficeScan XG 11.0 - Change Prevention Bypass
  日期:2018-06-11 17:33:17 点击:2 评论:0
[+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/TRENDMICRO-OFFICESCAN-XG-v11.0-UNAUTHORIZED-CHANGE-PREVENTION-SERVICE-BYPASS.txt [+] ISR: Apparition Security ***Greet
Apple macOS/iOS Kernel - Heap Overflow Due to Lack of Lower Size Check in getvol
  日期:2018-06-11 17:31:52 点击:2 评论:0
/* getvolattrlist takes a user controlled bufferSize argument via the fgetattrlist syscall. When allocating a kernel buffer to serialize the attr list to there's the following comment: /* * Allocate a target buffer for attribute results. * Note that
Apple macOS Kernel - Use-After-Free Due to Lack of Locking in nvidia GeForce Dri
  日期:2018-06-11 17:31:13 点击:2 评论:0
/* nvDevice::SetAppSupportBits is external method 0x107 of the nvAccelerator IOService. It calls task_deallocate without locking. Two threads can race calling this external method to drop two task references when only one is held. Note that the repro
PHP 7.2.2 - 'php_stream_url_wrap_http_ex' Buffer Overflow
  日期:2018-06-11 17:25:54 点击:6 评论:0
Description: ------------ The latest PHP distributions contain a memory corruption bug while parsing malformed HTTP response packets. Vulnerable code at: php_stream_url_wrap_http_ex /home/weilei/php-7.2.2/ext/standard/http_fopen_wrapper.c:723 if (tmp
WebKitGTK+ < 2.21.3 - Crash (PoC)
  日期:2018-06-11 17:24:30 点击:0 评论:0
# Title: WebKitGTK+ 2.21.3 - Crash (PoC) # Author: Dhiraj Mishra # Date: 2018-06-05 # Software: https://webkitgtk.org/ # CVE: CVE-2018-11646 # Summary: # webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in # UIProc
10-Strike Network Scanner 3.0 - Local Buffer Overflow (SEH)
  日期:2018-06-11 17:23:48 点击:1 评论:0
# Exploit Title: 10-Strike Network Scanner 3.0 - Local Buffer Overflow (SEH) # Exploit Author: Hashim Jawad - ihack4falafel # Date: 2018-06-05 # Vendor Homepage: https://www.10-strike.com/ # Vulnerable Software: https://www.10-strike.com/network-scan
10-Strike Network Inventory Explorer 8.54 - 'Registration Key' Buffer Overflow (
  日期:2018-06-11 17:23:02 点击:1 评论:0
# Exploit Title: 10-Strike Network Inventory Explorer 8.54 - 'Registration Key' Buffer Overflow (SEH) # Exploit Author: Hashim Jawad - ihack4falafelx # Date: 2018-06-05 # Vendor Homepage: https://www.10-strike.com/ # Vulnerable Software: https://www.
10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH)
  日期:2018-06-11 17:21:23 点击:3 评论:0
# Exploit Title : 10-Strike Network Inventory Explorer 8.54 - Local Buffer Overflow (SEH) # Exploit Author : Hashim Jawad - ihack4falafel # Vendor Homepage : https://www.10-strike.com/ # Vulnerable Software: https://www.10-strike.com/networkinventory
WebKit - not_number defineProperties UAF (Metasploit)
  日期:2018-06-11 17:20:30 点击:4 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::HttpServer::HTML
Clone2GO Video converter 2.8.2 - Buffer Overflow
  日期:2018-06-11 17:19:10 点击:1 评论:0
#!/usr/bin/python #----------------------------------------------------------------------------------------------------------------------# # Exploit Title : Clone 2 GO Video converter 2.8.2 Unicode Buffer Overflow (Remote Code Execution) # # Exploit
Linux Kernel < 4.16.11 - 'ext4_read_inline_data()' Memory Corruption
  日期:2018-06-11 17:18:23 点击:1 评论:0
ext4 can store data for small regular files as inline data, meaning that the data is stored inside the corresponding inode instead of in separate blocks. Inline data is stored in two places: The first 60 bytes go in the i_block field in the inode (wh
Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasp
  日期:2018-06-11 17:15:32 点击:4 评论:0
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/exe' require 'msf/core/exploit/powershell' class MetasploitModule Msf::Exploit::Local
共609页/12166条记录 首页 1 [2] [3] [4] [5] [6] [7] 下一页 末页
  本月热点文章
·Microsoft Internet Explorer
·HPE iMC 7.3 - Remote Code Ex
·Linux 4.4.0 < 4.4.0-53 - AF_
·R 3.4.4 - Local Buffer Overf
·FTPShell Server 6.80 - Buffe
·Linux 2.6.30 < 2.6.36-rc8 -
·DynoRoot DHCP - Client Comma
·Prime95 29.4b8 - Stack Buffe
·D-Link DSL-2750B - OS Comman
·Nanopool Claymore Dual Miner
·GNU glibc < 2.27 - Local Buf
·Procps-ng - Multiple Vulnera
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2018 VFocuS.Net All Rights Reserved