Результаты поиска

  1. Exploiter

    Exploit WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check

    WebKit JavaScriptCore - Out-Of-Bounds Access in FTL JIT due to LICM Moving Array Access Before the Bounds Check /* While fuzzing JavaScriptCore, I encountered the following JavaScript program which crashes jsc in current HEAD and release...
  2. Exploiter

    Exploit Fortinet FortiClient 5.2.3 (Windows 10 x86) - Local Privilege Escalation

    Fortinet FortiClient 5.2.3 (Windows 10 x86) - Local Privilege Escalation /* Check these out: - https://www.coresecurity.com/system/files/publications/2016/05/Windows%20SMEP%20bypass%20U%3DS.pdf - https://labs.mwrinfosecurity.com/blog/a-tale-of-bitmaps/ Tested on: - Windows 10 Pro x86 1703/1709...
  3. Exploiter

    Exploit CADA 3S CoDeSys Gateway Server - Directory Traversal (Metasploit)

    CADA 3S CoDeSys Gateway Server - Directory Traversal (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework # http://metasploit.com ## require 'msf/core' class MetasploitModule <...
  4. Exploiter

    Exploit WebKit JavaScriptCore - 'createRegExpMatchesArray' Type Confusion

    WebKit JavaScriptCore - 'createRegExpMatchesArray' Type Confusion /* Prerequisites ------------- In JavaScriptCore, JSObjects have an associated Structure: an object describing various aspects of the JSObject such as its type, its properties, and the type of elements being stored (e.g...
  5. Exploiter

    Exploit Malwarebytes Anti-Malware < 2.0.3 / Anti-Exploit < 1.03.1.1220 - Update Code Execution (Metasploit)

    Malwarebytes Anti-Malware < 2.0.3 / Anti-Exploit < 1.03.1.1220 - Update Code Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule <...
  6. Exploiter

    Exploit Microsoft Silverlight - ScriptObject Unsafe Memory Access (MS13-022/MS13-087) (Metasploit)

    Microsoft Silverlight - ScriptObject Unsafe Memory Access (MS13-022/MS13-087) (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote...
  7. Exploiter

    Exploit EMC Replication Manager < 5.3 - Command Execution (Metasploit)

    EMC Replication Manager < 5.3 - Command Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = GreatRanking...
  8. Exploiter

    Exploit WordPress Theme Holding Pattern - Arbitrary File Upload (Metasploit)

    WordPress Theme Holding Pattern - Arbitrary File Upload (Metasploit) ## # This module requires Metasploit: http://www.metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'socket' class MetasploitModule < Msf::Exploit::Remote...
  9. Exploiter

    Exploit Sun Java Web Start Plugin - Command Line Argument Injection (Metasploit)

    Sun Java Web Start Plugin - Command Line Argument Injection (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank =...
  10. Exploiter

    Exploit SSH - User Code Execution (Metasploit)

    SSH - User Code Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'net/ssh' class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking include...
  11. Exploiter

    Exploit Redmine SCM Repository - Arbitrary Command Execution (Metasploit)

    Redmine SCM Repository - Arbitrary Command Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank =...
  12. Exploiter

    Exploit SixApart MovableType < 5.2.12 - Storable Perl Code Execution (Metasploit)

    SixApart MovableType < 5.2.12 - Storable Perl Code Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank =...
  13. Exploiter

    Exploit Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit)

    Oracle Weblogic Server Deserialization RCE - Raw Object (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core/exploit/powershell' class MetasploitModule < Msf::Exploit::Remote...
  14. Exploiter

    Exploit SysAid Help Desk Administrator Portal < 14.4 - Arbitrary File Upload (Metasploit)

    SysAid Help Desk Administrator Portal < 14.4 - Arbitrary File Upload (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank =...
  15. Exploiter

    Exploit WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit)

    WordPress Plugin Ninja Forms 2.9.36 < 2.9.42 - File Upload (Metasploit) ## # This module requires Metasploit: http://www.metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank =...
  16. Exploiter

    Exploit gnutls 3.6.6 - 'verify_crt()' Use-After-Free

    gnutls 3.6.6 - 'verify_crt()' Use-After-Free ## Description of problem: This is a critical memory corruption vulnerability in any API backed by `verify_crt()`, including `gnutls_x509_trust_list_verify_crt()` and related routines. I suspect any client or server that verifies X.509 certificates...
  17. Exploiter

    Exploit Apache Struts < 1.3.10 / < 2.3.16.2 - ClassLoader Manipulation Remote Code Execution (Metasploit)

    Apache Struts < 1.3.10 / < 2.3.16.2 - ClassLoader Manipulation Remote Code Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule <...
  18. Exploiter

    Exploit CMS Made Simple (CMSMS) Showtime2 - File Upload Remote Code Execution (Metasploit)

    CMS Made Simple (CMSMS) Showtime2 - File Upload Remote Code Execution (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking...
  19. Exploiter

    Exploit OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'welcome' Remote Command Execution (Metasploit)

    OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'welcome' Remote Command Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank...
  20. Exploiter

    Exploit PHPMailer < 5.2.19 - Sendmail Argument Injection (Metasploit)

    PHPMailer < 5.2.19 - Sendmail Argument Injection (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking...
  21. Exploiter

    Exploit Ruby on Rails 4.0.x/4.1.x/4.2.x (Web Console v2) - Whitelist Bypass Code Execution (Metasploit)

    Ruby on Rails 4.0.x/4.1.x/4.2.x (Web Console v2) - Whitelist Bypass Code Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule <...
  22. Exploiter

    Exploit GIT 1.8.5.6/1.9.5/2.0.5/2.1.4/2.2.1 & Mercurial < 3.2.3 - Multiple Vulnerabilities (Metasploit)

    GIT 1.8.5.6/1.9.5/2.0.5/2.1.4/2.2.1 & Mercurial < 3.2.3 - Multiple Vulnerabilities (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule <...
  23. Exploiter

    Exploit Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (1)

    Mantis Bug Tracker 1.2.0a3 < 1.2.17 XmlImportExport Plugin - PHP Code Injection (Metasploit) (1) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule <...
  24. Exploiter

    Exploit OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'license.php' Remote Command Execution (Metasploit)

    OP5 5.3.5/5.4.0/5.4.2/5.5.0/5.5.1 - 'license.php' Remote Command Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote...
  25. Exploiter

    Exploit ExaGrid - Known SSH Key and Default Password (Metasploit)

    ExaGrid - Known SSH Key and Default Password (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'net/ssh' class MetasploitModule < Msf::Exploit::Remote Rank =...