首頁 | 安全文章 | 安全工具 | Exploits | 本站原創 | 關于我們 | 網站地圖 | 安全論壇
熱門關鍵字: shell  88888  art  vitter  linux
  當前位置:主頁>安全文章>文章資料>Exploits>列表
NetShareWatcher 1.5.8 Denial Of Service
  日期:2018-12-28 17:07:30 點擊:20 評論:0
# Exploit Title: NetShareWatcher 1.5.8 - Denial of Service (PoC)# Date: 2018-12-25# Exploit Author: T3jv1l# Vendor Homepage: :http://www.nsauditor.com# Software: http://netsharewatcher.nsauditor.com/downloads/NetShareWatcher_setup.exe# Contact: http
ShareAlarmPro 2.1.4 Denial Of Service
  日期:2018-12-28 17:06:58 點擊:17 評論:0
# Exploit Title:ShareAlarmPro 2.1.4 - Denial of Service (PoC)# Date: 2018-12-25# Exploit Author: T3jv1l# Vendor Homepage: :http://www.nsauditor.com# Software: http://sharealarm.nsauditor.com/downloads/sharealarmpro_setup.exe# Contact: https://twitte
Product Key Explorer 4.0.9 Denial Of Service
  日期:2018-12-28 17:05:32 點擊:27 評論:0
# Exploit Title: Product Key Explorer 4.0.9 - Denial of Service (PoC)# Date: 2018-12-25# Exploit Author: T3jv1l# Vendor Homepage: :http://www.nsauditor.com# Software: http://www.nsauditor.com/downloads/productkeyexplorer_setup.exe# Contact: https://
Kubernetes - (Authenticated) Arbitrary Requests
  日期:2018-12-25 14:15:12 點擊:23 評論:0
#!/usr/bin/env python3 import argparse from ssl import wrap_socket from socket import create_connection from secrets import base64, token_bytes def request_stage_1(namespace, pod, method, target, token): stage_1 = with open('stage_1', 'r') as stage_
Kubernetes - (Unauthenticated) Arbitrary Requests
  日期:2018-12-25 14:14:17 點擊:26 評論:0
#!/usr/bin/env python3 import argparse from ssl import wrap_socket from json import loads, dumps from socket import create_connection def request_stage_1(base, version, target): stage_1 = with open('ustage_1', 'r') as stage_1_fd: stage_1 = stage_1_f
Netatalk - Bypass Authentication
  日期:2018-12-25 14:13:25 點擊:35 評論:0
import socket import struct import sys if len(sys.argv) != 3: sys.exit(0) ip = sys.argv[1] port = int(sys.argv[2]) sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) print [+] Attempting connection to + ip + : + sys.argv[2] sock.connect((ip, po
Keybase keybase-redirector - '$PATH' Local Privilege Escalation
  日期:2018-12-25 14:12:18 點擊:36 評論:0
keybase-redirector is a setuid root binary. keybase-redirector calls the fusermount binary using a relative path and the application trusts the value of $PATH. This allows a local, unprivileged user to trick the application to executing a custom fus
Google Chrome 70 - SQLite Magellan Crash (PoC)
  日期:2018-12-25 14:11:10 點擊:69 評論:0
!--- title: Crash Chrome 70 with the SQLite Magellan bug categories: chrome permalink: /sqlitebug/ layout: post ---! pThis proof-of-concept crashes the Chrome renderer process using a href= https://blade.tencent.com/magellan/index_en.htmlTencent Bla
phpMyAdmin 4.8.4 - 'AllowArbitraryServer' Arbitrary File Read
  日期:2018-12-25 14:08:38 點擊:88 評論:0
#!/usr/bin/env python #coding: utf8 import socket import asyncore import asynchat import struct import random import logging import logging.handlers PORT = 3306 log = logging.getLogger(__name__) log.setLevel(logging.DEBUG) tmp_format = logging.handl
ATool 1.0.0.22 Buffer Overflow
  日期:2018-12-24 14:53:35 點擊:32 評論:0
# Exploit Title: Kernel Pool Buffer Overflow ATool - 1.0.0.22 (0day)# CVE: CVE-2018-20331# Date: 21-12-2018# Software Link: http://www.antiy.net/ http://www.antiy.net/ # Exploit Author: Aloyce J. Makalanga# Contact: https://twitter.com/aloycemjr htt
SQLScan 1.0 Denial Of Service
  日期:2018-12-24 14:51:28 點擊:32 評論:0
# Exploit Title: McAfee Foundstone SQLScan - Denial of Service (PoC) and EIP record overwrite# Discovery by: Rafael Pedrero# Discovery Date: 2018-12-20# Vendor Homepage: http://www.mcafee.com/us/downloads/free-tools/sqlscan.aspx# Software Link : htt
Microsoft Edge 42.17134.1.0 Denial Of Service
  日期:2018-12-24 14:50:27 點擊:338 評論:0
# Exploit Title: Microsoft Edge edgehtml.dll!Tree::ANode::DocumentLayout. Denial of Service (PoC)# Google Dork: N/A# Date: 2018-11-11# Exploit Author: Bogdan Kurinnoy ([email protected])# Vendor Homepage: https://www.microsoft.com/# Version: Micr
AnyBurn 4.3 Local Buffer Overflow
  日期:2018-12-24 14:49:39 點擊:31 評論:0
#!/usr/bin/env python# Exploit Title: AnyBurn 4.3 - Local Buffer Overflow (SEH Unicode)# Date: 20-12-2018# Exploit Author: Matteo Malvica# Vendor Homepage: http://www.anyburn.com/# Software Link : http://www.anyburn.com/anyburn_setup.exe# Tested Ver
Angry IP Scanner 3.5.3 Denial Of Service
  日期:2018-12-24 14:47:50 點擊:26 評論:0
# Exploit Title: Angry IP Scanner - Denial of Service (PoC)# Discovery by: Mr Winst0n# Discovery Date: 2018-12-22# Vendor Homepage: https://angryip.org/# Software Link : https://angryip.org/download/# Tested Version: 3.5.3 (latest version)# Tested o
GIGABYTE Driver Privilege Escalation
  日期:2018-12-24 14:46:43 點擊:21 評論:0
SecureAuth - SecureAuth Labs Advisoryhttp://www.secureauth.com/GIGABYTE Drivers Elevation of Privilege Vulnerabilities*1. *Advisory Information**Title: GIGABYTE Drivers Elevation of Privilege VulnerabilitiesAdvisory ID: CORE-2018-0007Advisory URL:ht
ASUS Driver Privilege Escalation
  日期:2018-12-24 14:45:19 點擊:80 評論:0
SecureAuth - SecureAuth Labs Advisoryhttp://www.secureauth.com/ASUS Drivers Elevation of Privilege Vulnerabilities*1. *Advisory Information**Title: ASUS Drivers Elevation of Privilege VulnerabilitiesAdvisory ID: CORE-2017-0012Advisory URL:http://www
Netatalk Authentication Bypass
  日期:2018-12-24 14:43:39 點擊:57 評論:0
### Exploit Title: Netatalk Authentication Bypass# Date: 12/20/2018# Exploit Author: Jacob Baines# Vendor Homepage: http://netatalk.sourceforge.net/# Software Link: https://sourceforge.net/projects/netatalk/files/# Version: Before 3.1.12# Tested on:
XMPlay 3.8.3 Local Stack Overflow
  日期:2018-12-21 16:30:33 點擊:31 評論:0
#!/usr/bin/env python# -*- coding: utf-8 -*-# Exploit Title: XMPlay 3.8.3 - '.m3u' Code Execution (PoC)# Date: 2018-12-19# Exploit Author: s7acktrac3# Vendor Homepage: https://www.xmplay.com/# Software Link: https://support.xmplay.com/files_view.php
Base64 Decoder 1.1.2 SEH Local Buffer Overflow
  日期:2018-12-21 16:29:56 點擊:27 評論:0
#!/usr/bin/env python# Exploit Author: bzyo# Twitter: @bzyo_# Exploit Title: Base64 Decoder 1.1.2 - Local Buffer Overflow (SEH)# Date: 12-20-18# Vulnerable Software: Base64 Decoder 1.1.2# Vendor Homepage: http://4mhz.de/b64dec.html# Version: 1.1.2#
LanSpy 2.0.1.159 Buffer Overflow
  日期:2018-12-21 16:29:05 點擊:84 評論:0
# Exploit Title: LanSpy 2.0.1.159 - Local Buffer Overflow (SEH) (Egghunter)# Exploit Author: bzyo# Date: 12-19-18# Twitter: @bzyo_# Vulnerable Software: LanSpy 2.0.1.159# Vendor Homepage: https://lizardsystems.com# Version: 2.0.1.159 # Software Link
共636頁/12701條記錄 首頁 上一頁 [1] 2 [3] [4] [5] [6] [7] 下一頁 末頁
  本月熱點文章
·Microsoft Windows - 'SMBGhos
·vCloud Director 9.7.0.154982
·vCloud Director 9.7.0.154982
  本月推薦文章
 
  相關分類
  漏洞檢測
  漏洞資料
  入侵實例
  系統安全
  網絡安全
  網絡基礎
  病毒分析
Exploits
CopyRight © 2002-2020 VFocuS.Net All Rights Reserved
35选7杀号技巧