安裝中文字典英文字典辭典工具!
安裝中文字典英文字典辭典工具!
|
- Exploit Database - Exploits for Penetration Testers, Researchers, and . . .
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more
- Linux Kernel 5. 8 lt; 5. 16. 11 - Local Privilege Escalation (DirtyPipe)
* * This exploit requires Linux 5 8 or later; the code path was made * reachable by commit f6dd975583bd ("pipe: merge * anon_pipe_buf*_ops") The commit did not introduce the bug, it was * there before, it just provided an easy way to exploit it * * There are two major limitations of this exploit: the offset cannot
- About the Exploit Database
The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers
- Rejetto HTTP File Server (HFS) 2. 3. x - Exploit Database
Rejetto HTTP File Server (HFS) 2 3 x - Remote Command Execution (2) CVE-2014-6287CVE-111386 remote exploit for Windows platform
- Online Book Store 1. 0 - Unauthenticated Remote Code Execution
Online Book Store 1 0 - Unauthenticated Remote Code Execution webapps exploit for PHP platform
- Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers
- Linux Kernel 3. 13. 0 lt; 3. 19 (Ubuntu 12. 04 14. 04 14. 10 15. 04 . . .
Linux Kernel 3 13 0 < 3 19 (Ubuntu 12 04 14 04 14 10 15 04) - 'overlayfs' Local Privilege Escalation CVE-2015-1328 local exploit for Linux platform
- vsftpd 2. 3. 4 - Backdoor Command Execution - Unix remote Exploit
vsftpd 2 3 4 - Backdoor Command Execution CVE-2011-2523 remote exploit for Unix platform
|
|
|