المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 [12] 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57

  1. [webapps] Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection
  2. [webapps] Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection
  3. [webapps] Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection
  4. [local] MalwareFox AntiMalware 2.74.0.150 - Privilege Escalation
  5. [dos] Claymore Dual GPU Miner 10.5 - Format String
  6. [local] Apport / ABRT - chroot Privilege Escalation (Metasploit)
  7. [remote] Windows - MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote
  8. [dos] WordPress Core - 'load-scripts.php' Denial of Service
  9. [webapps] Online Voting System - Authentication Bypass
  10. [webapps] NixCMS 1.0 - 'category_id' SQL Injection
  11. [webapps] Matrimonial Website Script 2.1.6 - 'uid' SQL Injection
  12. [webapps] Wonder CMS 2.3.1 - 'Host' Header Injection
  13. [webapps] Wonder CMS 2.3.1 - Unrestricted File Upload
  14. [local] Microsoft Windows Subsystem for Linux - Privilege Escalation
  15. [webapps] FiberHome AN5506 - Unauthenticated Remote DNS Change
  16. [webapps] Oracle Hospitality Simphony (MICROS) 2.7 < 2.9 - Directory Traversal
  17. [webapps] Joomla! Component JMS Music 1.1.1 - SQL Injection
  18. [webapps] Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload
  19. [webapps] Joomla! Component JEXTN Classified 1.0.0 - 'sid' SQL Injection
  20. [shellcode] Linux/x64 - Twofish Encoded + DNS (CNAME) Password + execve(/bin/sh) Shel
  21. [shellcode] Linux/x64 - Custom Encoded XOR + Polymorphic + execve(/bin/sh) Shellcode
  22. [shellcode] Linux/x64 - Custom Encoded XOR + execve(/bin/sh) Shellcode
  23. [shellcode] Linux/x64 - Egghunter (0xbeefbeef) Shellcode (34 bytes)
  24. [shellcode] Linux/x64 - Reverse TCP (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (
  25. [shellcode] Linux/x64 - Bind TCP (4444/TCP) Shell (/bin/sh) + Password (1234567) Shel
  26. [webapps] Joomla! Component JEXTN Reverse Auction 3.1.0 - SQL Injection
  27. [webapps] Event Manager 1.0 - SQL Injection
  28. [webapps] Joomla! Component JE PayperVideo 3.0.0 - 'usr_plan' SQL Injection
  29. [webapps] IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting
  30. [papers] Web Application Firewall (WAF) Evasion Techniques
  31. [papers] Jailbreaking iOS 11.1.2: An adventure into the XNU kernel
  32. [papers] [Hebrew] Digital Whisper Security Magazine #91
  33. [webapps] Advance Loan Management System - 'id' SQL Injection
  34. [webapps] Real Estate Custom Script - 'route' SQL Injection
  35. [webapps] Fancy Clone Script - 'search_browse_product' SQL Injection
  36. [webapps] Joomla! Component JEXTN Membership 3.1.0 - 'usr_plan' SQL Injection
  37. [remote] BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit)
  38. [dos] WebKit - 'WebCore::FrameView::clientToLayoutViewportPoint' Use-After-Free
  39. [dos] WebKit - 'detachWrapper' Use-After-Free
  40. [remote] Sync Breeze Enterprise 10.4.18 - Remote Buffer Overflow (SEH)
  41. [local] systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege
  42. [webapps] BMC BladeLogic RSCD Agent 8.3.00.64 - Windows Users Disclosure
  43. [webapps] Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection
  44. [webapps] Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection
  45. [webapps] Joomla! Component Picture Calendar for Joomla 3.1.4 - Directory Traversal
  46. [dos] LabF nfsAxe 3.7 TFTP Client - Local Buffer Overflow
  47. [local] System Shield 5.0.0.136 - Privilege Escalation
  48. [webapps] Advantech WebAccess < 8.3 - SQL Injection
  49. [remote] HPE iMC 7.3 - RMI Java Deserialization
  50. [local] Arq 5.10 - Local root Privilege Escalation (2)
  51. [local] Arq 5.10 - Local root Privilege Escalation
  52. [remote] Oracle WebLogic - wls-wsat Component Deserialization Remote Code Execution (
  53. [dos] macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding
  54. [webapps] KeystoneJS < 4.0.0-beta.7 - Cross-Site Request Forgery
  55. [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) Null Free
  56. [remote] Trend Micro Threat Discovery Appliance 2.6.1062r1 - 'dlp_policy_upload.cgi'
  57. [webapps] Netis WF2419 Router - Cross-Site Request Forgery
  58. [webapps] Buddy Zone 2.9.9 - SQL Injection
  59. [webapps] Multilanguage Real Estate MLM Script 3.0 - 'srch' SQL Injection
  60. [webapps] Hot Scripts Clone - 'subctid' SQL Injection
  61. [webapps] TSiteBuilder 1.0 - SQL Injection
  62. [webapps] Task Rabbit Clone 1.0 - 'id' SQL Injection
  63. [webapps] Joomla! Component Jtag Members Directory 5.3.7 - Arbitrary File Download
  64. [webapps] Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery
  65. [webapps] Nexpose < 6.4.66 - Cross-Site Request Forgery
  66. [shellcode] Linux/x86 - Egghunter Shellcode (12 Bytes)
  67. [webapps] Gnew 2018.1 - Cross-Site Request Forgery
  68. [webapps] PACSOne Server 6.6.2 DICOM Web Viewer - SQL Injection
  69. [webapps] PACSOne Server 6.6.2 DICOM Web Viewer - Directory Trasversal
  70. [papers] ARM Exploitation for IoT
  71. [dos] Artifex MuJS 1.0.2 - Integer Overflow
  72. [dos] Artifex MuJS 1.0.2 - Denial of Service
  73. [remote] BMC BladeLogic 8.3.00.64 - Remote Command Execution
  74. [webapps] WordPress Plugin Learning Management System - 'course_id' SQL Injection
  75. [webapps] ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password
  76. [remote] Exodus Wallet (ElectronJS Framework) - Remote Code Execution
  77. [webapps] Dodocool DC38 N300 - Cross-site Request Forgery
  78. [shellcode] Linux/x86 - Disable ASLR Security Obfuscated Shellcode (23 bytes)
  79. [webapps] ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities
  80. [webapps] ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download
  81. [webapps] ManageEngine OpManager / Applications Manager / IT360 - 'FailOverServlet' M
  82. [webapps] ManageEngine EventLog Analyzer - Multiple Vulnerabilities (2)
  83. [webapps] ManageEngine Desktop Central / Desktop Central MSP - Create Administrator
  84. [dos] Lorex LH300 Series - ActiveX Buffer Overflow (PoC)
  85. [shellcode] Linux/x86 - execve(/bin/sh) + ROT-N + Shift-N + XOR-N Encoded Shellcode (
  86. [webapps] CMS Made Simple 1.11.9 - Multiple Vulnerabilities
  87. [webapps] GetSimple CMS 3.3.1 - Cross-Site Scripting
  88. [local] ICU library 52 < 54 - Multiple Vulnerabilities
  89. [webapps] Pimcore CMS 1.4.9
  90. [webapps] SysAid Help Desk 14.4 - Multiple Vulnerabilities
  91. [webapps] Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities
  92. [webapps] BMC Track-It! 11.4 - Multiple Vulnerabilities
  93. [webapps] Kaseya Virtual System Administrator (VSA) 7.0 < 9.1 - Authenticated Arbitra
  94. [remote] AsusWRT Router < 3.0.0.4.380.7743 - Unauthenticated LAN Remote Code Executio
  95. [papers] HackSysTeam Windows Kernel Vulnerable Driver: Type Confusion Vulnerability E
  96. [local] Blizzard Update Agent - JSON RPC DNS Rebinding
  97. [local] Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape
  98. [remote] GoAhead Web Server - LD_PRELOAD Arbitrary Module Load (Metasploit)
  99. [remote] Kaltura - Remote PHP Code Execution over Cookie (Metasploit)
  100. [local] Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow (Metasploit)
  101. [webapps] WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclo
  102. [remote] RAVPower 2.000.056 - Root Remote Code Execution
  103. [webapps] Professional Local Directory Script 1.0 - SQL Injection
  104. [papers] Hardcore SAP Penetration Testing
  105. [webapps] Flexible Poll 1.2 - SQL Injection
  106. [webapps] Quickad 4.0 - SQL Injection
  107. [webapps] Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin)
  108. [webapps] Tumder 2.1 - SQL Injection
  109. [webapps] Zechat 1.5 - SQL Injection
  110. [webapps] Wchat 1.5 - SQL Injection
  111. [webapps] Easy Car Script 2014 - SQL Injection
  112. [webapps] RSVP Invitation Online 1.0 - Cross-Site Request Forgery (Update Admin)
  113. [webapps] Affiligator 2.1.0 - SQL Injection
  114. [webapps] LiveCRM SaaS Cloud 1.0 - SQL Injection
  115. [local] HP Connected Backup 8.6/8.8.6 - Local Privilege Escalation
  116. [webapps] NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download
  117. [papers] Hardcore SAP Penetration Testing
  118. [webapps] CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection
  119. [dos] RAVPower 2.000.056 - Memory Disclosure
  120. [dos] MixPad 5.00 - Buffer Overflow
  121. [papers] Metasploit Pivoting
  122. [webapps] OTRS 5.0.x/6.0.x - Remote Command Execution
  123. [webapps] PHPFreeChat 1.7 - Denial of Service
  124. [papers] Metasploit Pivoting
  125. [webapps] CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities
  126. [webapps] Shopware 5.2.5/5.3 - Cross-Site Scripting
  127. [webapps] Oracle JDeveloper 11.1.x/12.x - Directory Traversal
  128. [webapps] DarkComet (C2 Server) - File Upload
  129. [webapps] D-Link DNS-325 ShareCenter < 1.05B03 - Multiple Vulnerabilities
  130. [webapps] D-Link DNS-343 ShareCenter < 1.05 - Command Injection
  131. [webapps] Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
  132. [webapps] Mambo < 4.5.4 - SQL Injection
  133. [webapps] X-Cart < 4.1.3 - Arbitrary Variable Overwrite
  134. [webapps] Claroline < 1.7.7 - Arbitrary File Inclusion
  135. [webapps] CubeCart < 3.0.12 - Multiple Vulnerabilities
  136. [webapps] SquirrelMail < 1.4.7 - Arbitrary Variable Overwrite
  137. [webapps] PHPLib < 7.4 - SQL Injection
  138. [webapps] Gallery 2 < 2.0.2 - Multiple Vulnerabilities
  139. [webapps] phpRPC < 0.7 - Remote Code Execution
  140. [webapps] Mambo < 4.5.3h - Multiple Vulnerabilities
  141. [webapps] PEAR LiveUser < 0.16.8 - Arbitrary File Access
  142. [webapps] Geeklog < 1.4.0 - Multiple Vulnerabilities
  143. [webapps] ADOdb < 4.71 - Cross Site Scripting
  144. [webapps] XPCOM - Race Condition
  145. [webapps] SquirrelMail < 1.4.5-RC1 - Arbitrary Variable Overwrite
  146. [webapps] PHPXMLRPC < 1.1 - Remote Code Execution
  147. [webapps] PEAR XML_RPC < 1.3.0 - Remote Code Execution
  148. [webapps] XOOPS < 2.0.11 - Multiple Vulnerabilities
  149. [dos] Peercast < 0.1211 - Format String
  150. [webapps] Burning Board < 2.3.1 - SQL Injection
  151. [webapps] Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities
  152. [webapps] AZBB < 1.0.07d - Multiple Vulnerabilities
  153. [webapps] PhotoPost < 4.85 - Multiple Vulnerabilities
  154. [webapps] TikiWiki < 1.8.1 - Multiple Vulnerabilities
  155. [webapps] PhotoPost < 4.6 - Multiple Vulnerabilities
  156. [webapps] Invision Gallery < 1.0.1 - SQL Injection
  157. [webapps] Invision Power Top Site List < 1.1 RC 2 - SQL Injection
  158. [webapps] phpBB < 2.0.7a - Multiple Vulnerabilities
  159. [webapps] Mambo < 4.5 - Multiple Vulnerabilities
  160. [webapps] vBulletin < 3.0.0 RC4 - Cross Site Scripting
  161. [webapps] Phorum < 5.0.3 Beta - Cross Site Scripting
  162. [webapps] phpBB < 2.0.6d - Cross Site Scripting
  163. [webapps] Invision Power Board (IP.Board) < 1.3 - SQL Injection
  164. [local] Trillian Pro < 2.01 - Design Error
  165. [webapps] phpShop < 0.6.1-b - Multiple Vulnerabilities
  166. [webapps] phpGedView < 2.65 beta 5 - Multiple Vulnerabilities
  167. [webapps] MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities
  168. [webapps] PostNuke < 0.726 Phoenix - Multiple Vulnerabilities
  169. [webapps] osCommerce < 2.2-MS2 - Multiple Vulnerabilities
  170. [webapps] ASPapp Multiple Products - Multiple Vulnerabilities
  171. [webapps] AutoRank PHP < 2.0.4 - SQL Injection (PoC)
  172. [webapps] Aardvark Topsites < 4.1.0 - Multiple Vulnerabilities
  173. [webapps] Invision Power Board (IP.Board) < 2.0 Alpha 3 - SQL Injection (PoC)
  174. [webapps] Invision Power Top Site List < 2.0 Alpha 3 - SQL Injection (PoC)
  175. [webapps] DUWare Multiple Products - Multiple Vulnerabilities
  176. [papers] [Kernel Exploitation] 6: NULL pointer dereference
  177. [papers] [Kernel Exploitation] 5: Integer Overflow
  178. [papers] [Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
  179. [papers] [Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
  180. [papers] [Kernel Exploitation] 2: Payloads
  181. [papers] [Kernel Exploitation] 1: Setting up the environment
  182. [dos] macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking
  183. [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password
  184. [webapps] GitStack 2.3.10 - Unauthenticated Remote Code Execution
  185. [dos] Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
  186. [local] glibc - 'getcwd()' Local Privilege Escalation
  187. [shellcode] Windows/x86 (XP SP3) - MessageBox Shellcode (11 bytes)
  188. [shellcode] Windows/x86 (XP SP3) (English) - calc Shellcode (16 bytes)
  189. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (42 bytes)
  190. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (52 bytes)
  191. [shellcode] Windows/x86 (XP SP3) (Turkish) - calc.exe Shellcode (53 bytes)
  192. [shellcode] Windows/x86 (XP SP3) (Turkish) - MessageBoxA Shellcode (109 bytes)
  193. [shellcode] Windows/x86 - Message Box + Null-Free Shellcode (140 bytes)
  194. [shellcode] Windows/x86 - calc.exe + Null-Free Shellcode (100 bytes)
  195. [shellcode] Windows/x86 - Download File (http://skypher.com/dll) + LoadLibrary + Null
  196. [shellcode] Windows/x86 (XP Professional SP3) (French) - calc.exe Shellcode (31 bytes
  197. [shellcode] Windows/x86 (XP Professional SP2) - calc Shellcode (57 bytes)
  198. [shellcode] Windows/x86 (XP Professional SP2) (English) - Wordpad Shellcode (15 bytes
  199. [shellcode] Windows/x86 (XP SP3) (French) - Sleep 90 Seconds Shellcode (14 bytes)
  200. [shellcode] Windows/x86 - Create Admin User (X) Shellcode (304 bytes)
  201. [shellcode] Windows/x86 (2000) - Reverse TCP (192.168.0.247:8721/TCP) Connect + Vampi
  202. [shellcode] Windows/x86 (NT/XP/2000/2003) - Bind TCP (8721/TCP) Shell Shellcode (356
  203. [shellcode] Linux/x86 - ROT-7 Encodor + Decoder execve Shellcode (74 bytes)
  204. [shellcode] Linux/x86 - setreuid() + execve(/usr/bin/python) Shellcode (54 bytes)
  205. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:1337/TCP) Shell Shellcode (74 bytes)
  206. [shellcode] Linux/x86 - Bind TCP (1337/TCP) Shell Shellcode (89 bytes)
  207. [shellcode] Linux/x86 - shutdown -h now Shellcode (56 bytes)
  208. [shellcode] Linux/x86 - chmod 0777 /etc/shadow + Obfuscated Shellcode (51 bytes)
  209. [shellcode] Linux/x86 - JMP-FSTENV execve Shellcode (67 bytes)
  210. [shellcode] Linux/x86 - shift-bit execve Encoder Shellcode (114 bytes)
  211. [shellcode] Linux/x86 - Copy /etc/passwd to /tmp/outfile Shellcode (97 bytes)
  212. [shellcode] Linux/x86 - execve(/bin/sh) Using jump/call/pop Shellcode (52 bytes)
  213. [shellcode] Linux/x86 - Download (http://192.168.2.222/x) + chmod() + execute Shellco
  214. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:12345/TCP) cat /etc/passwd Shellcode (
  215. [shellcode] Linux/x86 - Bind TCP Shell Shellcode (112 bytes)
  216. [shellcode] Linux/x86 - execve(/bin/sh) + Obfuscated Shellcode (30 bytes)
  217. [shellcode] Linux/x86 - Egghunter (0x5090) Shellcode (38 bytes)
  218. [shellcode] Linux/x86 - /proc/sys/net/ipv4/ip_forward 0 + exit() Shellcode (83 bytes)
  219. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell Shellcode (108 bytes)
  220. [shellcode] Linux/x86 - Uzumaki Encryptor Shellcode (Generator)
  221. [shellcode] Linux/x86 - execve(/bin/shUzumaki) + Uzumaki Encoded + Null-Free Shellcod
  222. [shellcode] Linux/x86 - execve wget + Mutated + Null-Free Shellcode (96 bytes)
  223. [shellcode] Linux/x86 - Fork Bomb + Mutated + Null-Free Shellcode (15 bytes)
  224. [shellcode] Linux/x86 - Reboot + Mutated + Null-Free Shellcode (55 bytes)
  225. [shellcode] Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
  226. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (6)
  227. [shellcode] Linux/x86 - Insertion Decoder Shellcode (33+ bytes)
  228. [webapps] Primefaces 5.x - Remote Code Execution (Metasploit)
  229. [shellcode] Linux/x86 - Egg Hunter Shellcode (38 bytes)
  230. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
  231. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell Shellcode (73 bytes)
  232. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell + GetPC/Call/Ret Method Shellcode (
  233. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (65 bytes)
  234. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:55555/TCP) Shell Shellcode (72 bytes)
  235. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell + SO_REUSEADDR Set (Avoiding SIGSEG
  236. [shellcode] Linux/x86 - Force Reboot Shellcode (36 bytes)
  237. [shellcode] Linux/x86 - execve(chmod 0777 /etc/shadow) Shellcode (57 bytes)
  238. [dos] Microsoft Edge Chakra JIT - Stack-to-Heap Copy
  239. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (23 bytes) (2)
  240. [shellcode] Linux/x86 - iptables --flush Shellcode (43 bytes)
  241. [dos] Microsoft Edge Chakra - 'AsmJSByteCodeGenerator::EmitCall' Out-of-Bounds Read
  242. [shellcode] Linux/x86 - Stager Reads Second Stage From STDIN Shellcode (14 bytes)
  243. [dos] Microsoft Edge Chakra JIT - Out-of-Bounds Write
  244. [dos] Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes (2)
  245. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (28 bytes)
  246. [dos] Microsoft Edge Chakra - Incorrect Scope Handling
  247. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/zsh", [/bin/zsh, NULL]) + XOR En
  248. [dos] Microsoft Edge Chakra - 'JavascriptGeneratorFunction::GetPropertyBuiltIns' Type
  249. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/ksh", [/bin/ksh, NULL]) + XOR En
  250. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/csh", [/bin/csh, NULL]) + XOR En