المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 [19] 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62

  1. [shellcode] Linux/x86 - Stager Reads Second Stage From STDIN Shellcode (14 bytes)
  2. [dos] Microsoft Edge Chakra JIT - Out-of-Bounds Write
  3. [dos] Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes (2)
  4. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (28 bytes)
  5. [dos] Microsoft Edge Chakra - Incorrect Scope Handling
  6. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/zsh", [/bin/zsh, NULL]) + XOR En
  7. [dos] Microsoft Edge Chakra - 'JavascriptGeneratorFunction::GetPropertyBuiltIns' Type
  8. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/ksh", [/bin/ksh, NULL]) + XOR En
  9. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/csh", [/bin/csh, NULL]) + XOR En
  10. [dos] Microsoft Edge Chakra JIT - Incorrect Bounds Calculation
  11. [shellcode] Linux/x86 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shel
  12. [shellcode] Linux/x86 - setreuid() + /sbin/iptables -F + exit(0) Shellcode (76 bytes)
  13. [shellcode] Linux/x86 - mkdir(hacked) + exit() Shellcode (36 bytes)
  14. [shellcode] Linux/x86 - /etc/init.d/apparmor teardown Shellcode (53 bytes)
  15. [shellcode] Linux/x86 - execve(/bin/cat, /etc/shadow, NULL) Shellcode (42 bytes)
  16. [shellcode] Linux/x86 - execve(/bin/dash) Shellcode (49 bytes)
  17. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (5)
  18. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (3)
  19. [shellcode] Linux/x86 - /usr/bin/killall snort Shellcode (46 bytes)
  20. [shellcode] Linux/x86 - /sbin/iptables -POUTPUT DROP Shellcode (60 bytes)
  21. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell + Polymorphic Shellcode (125 bytes
  22. [shellcode] Linux/x86 - CDRom Ejecting + Polymorphic Shellcode (74 bytes)
  23. [shellcode] Linux/x86 - chmod(/etc/shadow, 0666) + ASCII Shellcode (443 bytes)
  24. [shellcode] Linux/x86 - Force unmount /media/disk Shellcode (33 bytes)
  25. [shellcode] Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (26 bytes)
  26. [remote] Master IP CAM 01 - Multiple Vulnerabilities
  27. [shellcode] Linux/x86 - sys_setdomainname("th1s s3rv3r h4s b33n h1j4ck3d !!") Shellco
  28. [shellcode] Linux/x86 - sys_rmdir("/tmp/willdeleted") Shellcode (41 bytes)
  29. [shellcode] Linux/x86 - sys_execve(/bin/sh, -c, ping localhost) Shellcode (55 bytes)
  30. [shellcode] Linux/x86 - sys_sync Shellcode (6 bytes)
  31. [shellcode] Linux/x86 - sys_exit(0) Shellcode (8 bytes)
  32. [shellcode] Linux/x86 - sys_sethostname(PwNeD !!, 8) Shellcode (32 bytes)
  33. [shellcode] Linux/x86 - CDRom Ejecting Shellcode (46 bytes)
  34. [shellcode] Linux/x86 - Remote File Download Shellcode (42 bytes)
  35. [shellcode] Linux/x86 - pwrite(/etc/shadow, (md5 hash of agix), 32, 8) Shellcode (89
  36. [webapps] SugarCRM 3.5.1 - Cross-Site Scripting
  37. [webapps] Belkin N600DB Wireless Router - Multiple Vulnerabilities
  38. [shellcode] Linux/x86 - setuid(0) + chmod(/etc/shadow, 0666) Shellcode (37 bytes)
  39. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh, 0, 0) Shellcode (27 bytes)
  40. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (29 bytes)
  41. [webapps] D-Link DSL-2640R - Unauthenticated DNS Change
  42. [shellcode] Linux/x86 - /sbin/iptables --flush Shellcode (69 bytes)
  43. [webapps] Reservo Image Hosting Script 1.5 - Cross-Site Scripting
  44. [shellcode] Linux/x86 - Bind TCP (45295/TCP) Shell (/bin/sh) + fork() Shellcode (131
  45. [shellcode] Linux/x86 - Reverse TCP (www.netric.org:45295/TCP) Shell (/bin/sh) Shellc
  46. [shellcode] Linux/x86 - setresuid(0,0,0) + execve(/bin/sh) + exit() Shellcode (41 byt
  47. [shellcode] Linux/x86 - socket-proxy Shellcode (372 bytes) (Generator)
  48. [shellcode] Linux/x86 - chmod(/bin/sh,04775) + set sh +s Shellcode (31 bytes)
  49. [shellcode] Linux/x86 - setuid() + execve() + exit() Shellcode (44 bytes)
  50. [shellcode] Linux/x86 - Add Root User To /etc/passwd + No Password + exit() Shellcode
  51. [shellcode] Linux/x86 - execve(/bin/ash) + exit Shellcode (34 bytes)
  52. [webapps] Zomato Clone Script - Arbitrary File Upload
  53. [shellcode] Linux/x86 - execve(/bin/sh /tmp/p00p) Shellcode (70 bytes)
  54. [remote] Transmission - RPC DNS Rebinding
  55. [shellcode] Linux/x86 - execve(/sbin/iptables -F) Shellcode (70 bytes)
  56. [shellcode] Linux/x86 - execve(/sbin/ipchains -F) Shellcode (70 bytes)
  57. [shellcode] Linux/x86 - Add Root User (w000t) + No Password Shellcode (177 bytes)
  58. [shellcode] Linux/x86 - fork() + setreuid(0, 0) + execve(cp /bin/sh /tmp/sh; chmod 47
  59. [remote] Seagate Personal Cloud - Multiple Vulnerabilities
  60. [shellcode] Linux/x86 - Audio (knock knock knock) via /dev/dsp + setreuid(0,0) + exec
  61. [shellcode] Linux/x86 - execve(/bin/sh,0,0) Shellcode (21 bytes)
  62. [shellcode] Linux/x86 - setuid(0) + execve("/bin/sh",0,0) Shellcode (28 bytes)
  63. [shellcode] Linux/x86 - Bind TCP (64713/TCP) Shell (/bin/sh) Shellcode (83 bytes)
  64. [shellcode] Linux/x86 - execve(/sbin/halt,/sbin/halt) Shellcode (27 bytes)
  65. [shellcode] Linux/x86 - execve(/sbin/reboot,/sbin/reboot) Shellcode (28 bytes)
  66. [shellcode] Linux/x86 - execve(/sbin/shutdown,/sbin/shutdown 0) Shellcode (36 bytes)
  67. [shellcode] Linux/x86 - setuid(0) + setgid(0) + execve(/bin/sh,[/bin/sh,NULL])) Shell
  68. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh,0) Shellcode (25 bytes)
  69. [shellcode] Linux/x86 - exit(0) / exit(1) Shellcode (3/4 bytes)
  70. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (27 bytes)
  71. [shellcode] Linux/x86 - Disable Shadowing Shellcode (42 bytes)
  72. [shellcode] Linux/x86 - Add Root User (w00w00) To /etc/passwd Shellcode (104 bytes)
  73. [shellcode] Linux/x86 - Bind TCP (3879/TCP) Shell (/bin/sh) Shellcode (113 bytes)
  74. [shellcode] BSD/x86 - execve(/bin/sh) Shellcode (28 bytes)
  75. [shellcode] BSD/x86 - execve(/bin/sh) + seteuid(0) Shellcode (31 bytes)
  76. [shellcode] Linux/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes
  77. [shellcode] BSD/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes)
  78. [shellcode] Linux/x86 - symlink /bin/sh sh Shellcode (36 bytes)
  79. [shellcode] BSD/x86 - symlink /bin/sh sh Shellcode (39 bytes)
  80. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (58 bytes)
  81. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) + exit() Shellcode (
  82. [shellcode] Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) + exit() Shellcode (
  83. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes)
  84. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
  85. [shellcode] OpenBSD/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (74 byt
  86. [shellcode] OpenBSD/x86 - Load Kernel Module (/tmp/o.o) Shellcode (66 bytes)
  87. [shellcode] BSD/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)
  88. [shellcode] Linux/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)
  89. [shellcode] Linux/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (67 bytes
  90. [shellcode] BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
  91. [shellcode] BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 byt
  92. [shellcode] BSD - setuid(0) + chroot() + execute /bin/sh Shellcode (57 bytes)
  93. [shellcode] Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 byt
  94. [shellcode] Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
  95. [shellcode] Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
  96. [shellcode] Solaris/SPARC - Bind TCP Shell Shellcode
  97. [shellcode] Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
  98. [shellcode] Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/s
  99. [shellcode] Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff)
  100. [shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traf
  101. [shellcode] OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
  102. [shellcode] OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
  103. [shellcode] OSX/PPC - execve(/bin/sh) Shellcode
  104. [shellcode] OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (30
  105. [shellcode] OSX/PPC - Stager Sock Reverse Shellcode
  106. [shellcode] OSX/PPC - Stager Sock Find Shellcode
  107. [shellcode] OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
  108. [shellcode] OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
  109. [shellcode] OSX/PPC - Remote findsock by recv() Key Shellcode
  110. [remote] Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condit
  111. [shellcode] OpenBSD/x86 - reboot() Shellcode (15 bytes)
  112. [shellcode] Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
  113. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR E
  114. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR E
  115. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR E
  116. [shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded S
  117. [shellcode] Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/
  118. [shellcode] Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shell
  119. [webapps] Flash Operator Panel 2.31.03 - Command Execution
  120. [webapps] Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
  121. [shellcode] Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118
  122. [shellcode] Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
  123. [shellcode] Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
  124. [dos] OBS studio 20.1.3 - Local Buffer Overflow
  125. [webapps] ILIAS < 5.2.4 - Cross-Site Scripting
  126. [webapps] Oracle PeopleSoft 8.5x - Remote Code Execution
  127. [webapps] Adminer 4.3.1 - Server-Side Request Forgery
  128. [webapps] RISE 1.9 - 'search' SQL Injection
  129. [webapps] PerfexCRM 1.9.7 - Arbitrary File Upload
  130. [remote] Disk Pulse Enterprise 10.1.18 - Buffer Overflow
  131. [remote] SysGauge Server 3.6.18 - Buffer Overflow
  132. [shellcode] Linux/x86-64 - Bind TCP Password (doomedra) Shell (/bin/sh) (4444/TCP) Sh
  133. [webapps] Domains & Hostings Manager PRO 3.0 - Authentication Bypass
  134. [shellcode] Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1
  135. [webapps] ImgHosting 1.5 - Cross-Site Scripting
  136. [shellcode] Linux/x86-64 - Bind TCP Password (Password) /bin/sh Shell (4444/TCP) Shel
  137. [shellcode] Linux/x86-64 - Read /etc/passwd Shellcode (82 bytes)
  138. [shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using echo cmd Shellcode (273 byte
  139. [shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (
  140. [shellcode] Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 byte
  141. [shellcode] Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (2
  142. [webapps] pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
  143. [shellcode] Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcod
  144. [shellcode] Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/
  145. [shellcode] Linux/x86-64 - Read /etc/passwd + Write To /tmp/outfile Shellcode (105 by
  146. [shellcode] Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
  147. [shellcode] Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
  148. [shellcode] Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
  149. [shellcode] Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) S
  150. [shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96
  151. [shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110
  152. [shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
  153. [shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
  154. [dos] PyroBatchFTP < 3.19 - Buffer Overflow
  155. [dos] Kentico CMS 11.0 - Buffer Overflow
  156. [shellcode] Linux/SPARC - setreuid(0,0) + standard execve() Shellcode (72 bytes)
  157. [shellcode] Linux/SPARC - setreuid(0,0) + execve(/bin/sh) Shellcode (64 bytes)
  158. [webapps] Taxi Booking Script 1.0 - Cross-site Scripting
  159. [shellcode] Linux/SuperH (sh4) - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (132 by
  160. [shellcode] Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)
  161. [shellcode] Linux/StrongARM - Bind TCP /bin/sh Shell Shellcode (203 bytes)
  162. [shellcode] Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
  163. [shellcode] Linux/StrongARM - setuid() Shellcode (20 bytes)
  164. [shellcode] Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shel
  165. [webapps] Xnami 1.0 - Cross-Site Scripting
  166. [shellcode] Linux/ARM - execve("/bin/sh",NULL,0) Shellcode (31 bytes)
  167. [shellcode] Linux/ARM - execve("/bin/sh", [], [0 vars]) Shellcode (35 bytes)
  168. [shellcode] Linux/ARM - creat("/root/pwned", 0777) Shellcode (39 bytes)
  169. [remote] ALLMediaServer 0.95 - Buffer Overflow
  170. [dos] Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
  171. [dos] macOS - 'process_policy' Stack Leak Through Uninitialized Field
  172. [shellcode] Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
  173. [remote] phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
  174. [remote] LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
  175. [dos] Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Esca
  176. [dos] Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalati
  177. [dos] Android - Hardware Service Manager Arbitrary Service Replacement due to getpidc
  178. [dos] Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
  179. [shellcode] IRIX - stdin-read Shellcode (40 bytes)
  180. [shellcode] IRIX - execve(/bin/sh) Shellcode (68 bytes)
  181. [shellcode] IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
  182. [shellcode] IRIX - execve(/bin/sh) Shellcode (43 bytes)
  183. [shellcode] IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
  184. [shellcode] FreeBSD - reboot() Shellcode (15 Bytes)
  185. [shellcode] FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
  186. [shellcode] FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
  187. [shellcode] FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
  188. [shellcode] FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (12
  189. [shellcode] FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
  190. [dos] MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
  191. [local] Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
  192. [local] Parity Browser < 1.6.10 - Bypass Same Origin Policy
  193. [local] Jungo WinDriver 12.5.1 - Local Privilege Escalation
  194. [shellcode] Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null
  195. [webapps] D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execut
  196. [webapps] SAP NetWeaver J2EE Engine 7.40 - SQL Injection
  197. [local] Jungo Windriver 12.5.1 - Privilege Escalation
  198. [remote] HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasplo
  199. [remote] HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metas
  200. [dos] Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integ
  201. [dos] Multiple CPUs - Information Leak Using Speculative Execution
  202. [shellcode] Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
  203. [webapps] Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
  204. [webapps] WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request For
  205. [webapps] WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forge
  206. [webapps] WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Priv
  207. [webapps] WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request F
  208. [shellcode] BSD/x86 - setreuid(geteuid(), geteuid()) + execve("/bin/sh") Shellcode (3
  209. [shellcode] Alpha - setuid() Shellcode (156 bytes)
  210. [shellcode] Alpha - execve() Shellcode (112 bytes)
  211. [shellcode] Alpha - /bin/sh Shellcode (80 bytes)
  212. [webapps] WordPress Plugin Events Calendar - 'event_id' SQL Injection
  213. [webapps] Muviko 1.1 - SQL Injection
  214. [remote] DiskBoss Enterprise 8.8.16 - Buffer Overflow
  215. [webapps] Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
  216. [shellcode] Linux/x86 - execve /bin/dash Shellcode (30 bytes)
  217. [webapps] Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
  218. [remote] Commvault Communications Service (cvd) - Command Injection (Metasploit)
  219. [dos] Microsoft Windows - 'nt!NtQuerySystemInformation (information class 138, QueryM
  220. [dos] Microsoft Edge Chakra JIT - Op_MaxInAnArray and Op_MinInAnArray can Explicitly
  221. [dos] Microsoft Edge Chakra JIT - BackwardPass::RemoveEmptyLoopAfterMemOp Does not In
  222. [dos] Microsoft Edge Chakra - 'asm.js' Out-of-Bounds Read
  223. [dos] Microsoft Edge Chakra JIT - Escape Analysis Bug
  224. [dos] Microsoft Windows - 'nt!NtQueryInformationProcess (information class 76, QueryP
  225. [dos] Android - Inter-Process munmap due to Race Condition in ashmem
  226. [local] Microsoft Windows - Local XPS Print Spooler Sandbox Escape
  227. [shellcode] Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
  228. [webapps] Vanilla < 2.1.5 - Cross-Site Request Forgery
  229. [webapps] WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload
  230. [webapps] FiberHome LM53Q1 - Multiple Vulnerabilities
  231. [webapps] SonicWall NSA 6600/5600/4600/3600/2600/250M - Multiple Vulnerabilities
  232. [remote] Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Comma
  233. [webapps] Photos in Wifi 1.0.1 - Path Traversal
  234. [dos] BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow
  235. [webapps] Synology DiskStation Manager (DSM) < 6.1.3-15152 - 'forget_passwd.cgi' User
  236. [dos] DiskBoss Enterprise 8.5.12 - Denial of Service
  237. [dos] Sync Breeze Enterprise 10.1.16 - Denial of Service
  238. [dos] Disk Pulse Enterprise 10.1.18 - Denial of Service
  239. [dos] VX Search Enterprise 10.1.12 - Denial of Service
  240. [remote] Cisco IOS - Remote Code Execution
  241. [local] VMware Workstation - ALSA Config File Local Privilege Escalation (Metasploit)
  242. [remote] Ayukov NFTP FTP Client 2.0 - Buffer Overflow (Metasploit)
  243. [webapps] Gespage 7.4.8 - SQL Injection
  244. [dos] Microsoft Windows win32k - Using SetClassLong to Switch Between CS_CLASSDC and
  245. [webapps] Snitz Forums 2000 < 3.4.0.3 - Multiple Vulnerabilities
  246. [webapps] Max Web Portal < 1.30 - Multiple Vulnerabilities
  247. [webapps] MegaBrowser < 0.71b - Multiple Vulnerabilities
  248. [webapps] FTP Service < 1.2 - Multiple Vulnerabilities
  249. [webapps] WinMX < 2.6 - Design Error
  250. [webapps] P-Synch < 6.2.5 - Multiple Vulnerabilities