المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 [21] 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

  1. [remote] Herospeed - 'TelnetSwitch' Remote Stack Overflow / Overwrite Password / Enab
  2. [dos] Android - 'getpidcon' Permission Bypass in KeyStore Service
  3. [webapps] Entrepreneur Dating Script 2.0.2 - Authentication Bypass
  4. [webapps] Online Test Script 2.0.7 - 'cid' SQL Injection
  5. [remote] Adobe Coldfusion 11.0.03.292866 - BlazeDS Java Object Deserialization Remote
  6. [dos] Asterisk 13.17.2 - 'chan_skinny' Remote Memory Corruption
  7. [webapps] Hot Scripts Clone Script Classified - Persistent Cross-Site Scripting
  8. [webapps] Naukri Clone Script - Persistent Cross-Site Scripting
  9. [webapps] Multilanguage Real Estate MLM Script - Persistent Cross-Site Scripting
  10. [webapps] Doctor Search Script 1.0.2 - Persistent Cross-Site Scripting
  11. [local] MalwareFox AntiMalware 2.74.0.150 - Privilege Escalation
  12. [dos] Cisco ASA - Crash PoC
  13. [remote] Axis Communications MPQT/PACS - Heap Overflow / Information Leakage
  14. [remote] Axis SSI - Remote Command Execution / Read Files
  15. [remote] Geovision Inc. IP Camera & Video - Remote Command Execution
  16. [remote] Geovision Inc. IP Camera/Video/Access Control - Multiple Remote Command Exec
  17. [webapps] Netis WF2419 Router - Cross-Site Scripting
  18. [webapps] Student Profile Management System Script 2.0.6 - Authentication Bypass
  19. [local] BOCHS 2.6-5 - Buffer Overflow
  20. [webapps] Joomla! Component JSP Tickets 1.1 - SQL Injection
  21. [webapps] Joomla! Component jLike 1.0 - Information Leak
  22. [webapps] Joomla! Component Zh GoogleMap 8.4.0.0 - SQL Injection
  23. [webapps] Joomla! Component Zh YandexMap 6.2.1.0 - 'id' SQL Injection
  24. [webapps] Joomla! Component Zh BaiduMap 3.0.0.1 - SQL Injection
  25. [local] MalwareFox AntiMalware 2.74.0.150 - Privilege Escalation
  26. [dos] Claymore Dual GPU Miner 10.5 - Format String
  27. [local] Apport / ABRT - chroot Privilege Escalation (Metasploit)
  28. [remote] Windows - MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote
  29. [dos] WordPress Core - 'load-scripts.php' Denial of Service
  30. [webapps] Online Voting System - Authentication Bypass
  31. [webapps] NixCMS 1.0 - 'category_id' SQL Injection
  32. [webapps] Matrimonial Website Script 2.1.6 - 'uid' SQL Injection
  33. [webapps] Wonder CMS 2.3.1 - 'Host' Header Injection
  34. [webapps] Wonder CMS 2.3.1 - Unrestricted File Upload
  35. [local] Microsoft Windows Subsystem for Linux - Privilege Escalation
  36. [webapps] FiberHome AN5506 - Unauthenticated Remote DNS Change
  37. [webapps] Oracle Hospitality Simphony (MICROS) 2.7 < 2.9 - Directory Traversal
  38. [webapps] Joomla! Component JMS Music 1.1.1 - SQL Injection
  39. [webapps] Joomla! Component Jimtawl 2.1.6 - Arbitrary File Upload
  40. [webapps] Joomla! Component JEXTN Classified 1.0.0 - 'sid' SQL Injection
  41. [shellcode] Linux/x64 - Twofish Encoded + DNS (CNAME) Password + execve(/bin/sh) Shel
  42. [shellcode] Linux/x64 - Custom Encoded XOR + Polymorphic + execve(/bin/sh) Shellcode
  43. [shellcode] Linux/x64 - Custom Encoded XOR + execve(/bin/sh) Shellcode
  44. [shellcode] Linux/x64 - Egghunter (0xbeefbeef) Shellcode (34 bytes)
  45. [shellcode] Linux/x64 - Reverse TCP (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (
  46. [shellcode] Linux/x64 - Bind TCP (4444/TCP) Shell (/bin/sh) + Password (1234567) Shel
  47. [webapps] Joomla! Component JEXTN Reverse Auction 3.1.0 - SQL Injection
  48. [webapps] Event Manager 1.0 - SQL Injection
  49. [webapps] Joomla! Component JE PayperVideo 3.0.0 - 'usr_plan' SQL Injection
  50. [webapps] IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting
  51. [papers] Web Application Firewall (WAF) Evasion Techniques
  52. [papers] Jailbreaking iOS 11.1.2: An adventure into the XNU kernel
  53. [papers] [Hebrew] Digital Whisper Security Magazine #91
  54. [webapps] Advance Loan Management System - 'id' SQL Injection
  55. [webapps] Real Estate Custom Script - 'route' SQL Injection
  56. [webapps] Fancy Clone Script - 'search_browse_product' SQL Injection
  57. [webapps] Joomla! Component JEXTN Membership 3.1.0 - 'usr_plan' SQL Injection
  58. [remote] BMC Server Automation RSCD Agent - NSH Remote Command Execution (Metasploit)
  59. [dos] WebKit - 'detachWrapper' Use-After-Free
  60. [remote] Sync Breeze Enterprise 10.4.18 - Remote Buffer Overflow (SEH)
  61. [local] systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege
  62. [webapps] BMC BladeLogic RSCD Agent 8.3.00.64 - Windows Users Disclosure
  63. [webapps] Joomla! Component Visual Calendar 3.1.3 - 'id' SQL Injection
  64. [webapps] Joomla! Component CP Event Calendar 3.0.1 - 'id' SQL Injection
  65. [webapps] Joomla! Component Picture Calendar for Joomla 3.1.4 - Directory Traversal
  66. [dos] LabF nfsAxe 3.7 TFTP Client - Local Buffer Overflow
  67. [local] System Shield 5.0.0.136 - Privilege Escalation
  68. [webapps] Advantech WebAccess < 8.3 - SQL Injection
  69. [remote] HPE iMC 7.3 - RMI Java Deserialization
  70. [local] Arq 5.10 - Local root Privilege Escalation (2)
  71. [local] Arq 5.10 - Local root Privilege Escalation
  72. [remote] Oracle WebLogic - wls-wsat Component Deserialization Remote Code Execution (
  73. [dos] macOS - 'sysctl_vfs_generic_conf' Stack Leak Through Struct Padding
  74. [webapps] KeystoneJS < 4.0.0-beta.7 - Cross-Site Request Forgery
  75. [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) Null Free
  76. [remote] Trend Micro Threat Discovery Appliance 2.6.1062r1 - 'dlp_policy_upload.cgi'
  77. [webapps] Netis WF2419 Router - Cross-Site Request Forgery
  78. [webapps] Buddy Zone 2.9.9 - SQL Injection
  79. [webapps] Multilanguage Real Estate MLM Script 3.0 - 'srch' SQL Injection
  80. [webapps] Hot Scripts Clone - 'subctid' SQL Injection
  81. [webapps] TSiteBuilder 1.0 - SQL Injection
  82. [webapps] Task Rabbit Clone 1.0 - 'id' SQL Injection
  83. [webapps] Joomla! Component Jtag Members Directory 5.3.7 - Arbitrary File Download
  84. [webapps] Joomla! Component JS Support Ticket 1.1.0 - Cross-Site Request Forgery
  85. [webapps] Nexpose < 6.4.66 - Cross-Site Request Forgery
  86. [shellcode] Linux/x86 - Egghunter Shellcode (12 Bytes)
  87. [webapps] Gnew 2018.1 - Cross-Site Request Forgery
  88. [webapps] PACSOne Server 6.6.2 DICOM Web Viewer - SQL Injection
  89. [webapps] PACSOne Server 6.6.2 DICOM Web Viewer - Directory Trasversal
  90. [papers] ARM Exploitation for IoT
  91. [dos] Artifex MuJS 1.0.2 - Integer Overflow
  92. [dos] Artifex MuJS 1.0.2 - Denial of Service
  93. [remote] BMC BladeLogic 8.3.00.64 - Remote Command Execution
  94. [webapps] WordPress Plugin Learning Management System - 'course_id' SQL Injection
  95. [webapps] ASUS DSL-N14U B1 Router 1.1.2.3_345 - Change Administrator Password
  96. [remote] Exodus Wallet (ElectronJS Framework) - Remote Code Execution
  97. [webapps] Dodocool DC38 N300 - Cross-site Request Forgery
  98. [shellcode] Linux/x86 - Disable ASLR Security Obfuscated Shellcode (23 bytes)
  99. [webapps] ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities
  100. [webapps] ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download
  101. [webapps] ManageEngine OpManager / Applications Manager / IT360 - 'FailOverServlet' M
  102. [webapps] ManageEngine EventLog Analyzer - Multiple Vulnerabilities (2)
  103. [webapps] ManageEngine Desktop Central / Desktop Central MSP - Create Administrator
  104. [dos] Lorex LH300 Series - ActiveX Buffer Overflow (PoC)
  105. [shellcode] Linux/x86 - execve(/bin/sh) + ROT-N + Shift-N + XOR-N Encoded Shellcode (
  106. [webapps] CMS Made Simple 1.11.9 - Multiple Vulnerabilities
  107. [webapps] GetSimple CMS 3.3.1 - Cross-Site Scripting
  108. [local] ICU library 52 < 54 - Multiple Vulnerabilities
  109. [webapps] Pimcore CMS 1.4.9
  110. [webapps] SysAid Help Desk 14.4 - Multiple Vulnerabilities
  111. [webapps] Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities
  112. [webapps] BMC Track-It! 11.4 - Multiple Vulnerabilities
  113. [webapps] Kaseya Virtual System Administrator (VSA) 7.0 < 9.1 - Authenticated Arbitra
  114. [remote] AsusWRT Router < 3.0.0.4.380.7743 - Unauthenticated LAN Remote Code Executio
  115. [papers] HackSysTeam Windows Kernel Vulnerable Driver: Type Confusion Vulnerability E
  116. [local] Blizzard Update Agent - JSON RPC DNS Rebinding
  117. [local] Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape
  118. [remote] GoAhead Web Server - LD_PRELOAD Arbitrary Module Load (Metasploit)
  119. [remote] Kaltura - Remote PHP Code Execution over Cookie (Metasploit)
  120. [local] Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow (Metasploit)
  121. [webapps] WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclo
  122. [remote] RAVPower 2.000.056 - Root Remote Code Execution
  123. [webapps] Professional Local Directory Script 1.0 - SQL Injection
  124. [papers] Hardcore SAP Penetration Testing
  125. [webapps] Flexible Poll 1.2 - SQL Injection
  126. [webapps] Quickad 4.0 - SQL Injection
  127. [webapps] Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin)
  128. [webapps] Tumder 2.1 - SQL Injection
  129. [webapps] Zechat 1.5 - SQL Injection
  130. [webapps] Wchat 1.5 - SQL Injection
  131. [webapps] Easy Car Script 2014 - SQL Injection
  132. [webapps] RSVP Invitation Online 1.0 - Cross-Site Request Forgery (Update Admin)
  133. [webapps] Affiligator 2.1.0 - SQL Injection
  134. [webapps] LiveCRM SaaS Cloud 1.0 - SQL Injection
  135. [local] HP Connected Backup 8.6/8.8.6 - Local Privilege Escalation
  136. [webapps] NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download
  137. [papers] Hardcore SAP Penetration Testing
  138. [webapps] CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection
  139. [dos] RAVPower 2.000.056 - Memory Disclosure
  140. [dos] MixPad 5.00 - Buffer Overflow
  141. [papers] Metasploit Pivoting
  142. [webapps] OTRS 5.0.x/6.0.x - Remote Command Execution
  143. [webapps] PHPFreeChat 1.7 - Denial of Service
  144. [papers] Metasploit Pivoting
  145. [webapps] CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities
  146. [webapps] Shopware 5.2.5/5.3 - Cross-Site Scripting
  147. [webapps] Oracle JDeveloper 11.1.x/12.x - Directory Traversal
  148. [webapps] DarkComet (C2 Server) - File Upload
  149. [webapps] D-Link DNS-325 ShareCenter < 1.05B03 - Multiple Vulnerabilities
  150. [webapps] D-Link DNS-343 ShareCenter < 1.05 - Command Injection
  151. [webapps] Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
  152. [webapps] Mambo < 4.5.4 - SQL Injection
  153. [webapps] X-Cart < 4.1.3 - Arbitrary Variable Overwrite
  154. [webapps] Claroline < 1.7.7 - Arbitrary File Inclusion
  155. [webapps] CubeCart < 3.0.12 - Multiple Vulnerabilities
  156. [webapps] SquirrelMail < 1.4.7 - Arbitrary Variable Overwrite
  157. [webapps] PHPLib < 7.4 - SQL Injection
  158. [webapps] Gallery 2 < 2.0.2 - Multiple Vulnerabilities
  159. [webapps] phpRPC < 0.7 - Remote Code Execution
  160. [webapps] Mambo < 4.5.3h - Multiple Vulnerabilities
  161. [webapps] PEAR LiveUser < 0.16.8 - Arbitrary File Access
  162. [webapps] Geeklog < 1.4.0 - Multiple Vulnerabilities
  163. [webapps] ADOdb < 4.71 - Cross Site Scripting
  164. [webapps] XPCOM - Race Condition
  165. [webapps] SquirrelMail < 1.4.5-RC1 - Arbitrary Variable Overwrite
  166. [webapps] PHPXMLRPC < 1.1 - Remote Code Execution
  167. [webapps] PEAR XML_RPC < 1.3.0 - Remote Code Execution
  168. [webapps] XOOPS < 2.0.11 - Multiple Vulnerabilities
  169. [dos] Peercast < 0.1211 - Format String
  170. [webapps] Burning Board < 2.3.1 - SQL Injection
  171. [webapps] Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities
  172. [webapps] AZBB < 1.0.07d - Multiple Vulnerabilities
  173. [webapps] PhotoPost < 4.85 - Multiple Vulnerabilities
  174. [webapps] TikiWiki < 1.8.1 - Multiple Vulnerabilities
  175. [webapps] PhotoPost < 4.6 - Multiple Vulnerabilities
  176. [webapps] Invision Gallery < 1.0.1 - SQL Injection
  177. [webapps] Invision Power Top Site List < 1.1 RC 2 - SQL Injection
  178. [webapps] phpBB < 2.0.7a - Multiple Vulnerabilities
  179. [webapps] Mambo < 4.5 - Multiple Vulnerabilities
  180. [webapps] vBulletin < 3.0.0 RC4 - Cross Site Scripting
  181. [webapps] Phorum < 5.0.3 Beta - Cross Site Scripting
  182. [webapps] phpBB < 2.0.6d - Cross Site Scripting
  183. [webapps] Invision Power Board (IP.Board) < 1.3 - SQL Injection
  184. [local] Trillian Pro < 2.01 - Design Error
  185. [webapps] phpShop < 0.6.1-b - Multiple Vulnerabilities
  186. [webapps] phpGedView < 2.65 beta 5 - Multiple Vulnerabilities
  187. [webapps] MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities
  188. [webapps] PostNuke < 0.726 Phoenix - Multiple Vulnerabilities
  189. [webapps] osCommerce < 2.2-MS2 - Multiple Vulnerabilities
  190. [webapps] ASPapp Multiple Products - Multiple Vulnerabilities
  191. [webapps] AutoRank PHP < 2.0.4 - SQL Injection (PoC)
  192. [webapps] Aardvark Topsites < 4.1.0 - Multiple Vulnerabilities
  193. [webapps] Invision Power Board (IP.Board) < 2.0 Alpha 3 - SQL Injection (PoC)
  194. [webapps] Invision Power Top Site List < 2.0 Alpha 3 - SQL Injection (PoC)
  195. [webapps] DUWare Multiple Products - Multiple Vulnerabilities
  196. [papers] [Kernel Exploitation] 5: Integer Overflow
  197. [papers] [Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
  198. [papers] [Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
  199. [papers] [Kernel Exploitation] 2: Payloads
  200. [papers] [Kernel Exploitation] 1: Setting up the environment
  201. [dos] macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking
  202. [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password
  203. [webapps] GitStack 2.3.10 - Unauthenticated Remote Code Execution
  204. [dos] Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
  205. [local] glibc - 'getcwd()' Local Privilege Escalation
  206. [shellcode] Windows/x86 (XP SP3) - MessageBox Shellcode (11 bytes)
  207. [shellcode] Windows/x86 (XP SP3) (English) - calc Shellcode (16 bytes)
  208. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (42 bytes)
  209. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (52 bytes)
  210. [shellcode] Windows/x86 (XP SP3) (Turkish) - calc.exe Shellcode (53 bytes)
  211. [shellcode] Windows/x86 (XP SP3) (Turkish) - MessageBoxA Shellcode (109 bytes)
  212. [shellcode] Windows/x86 - Message Box + Null-Free Shellcode (140 bytes)
  213. [shellcode] Windows/x86 - calc.exe + Null-Free Shellcode (100 bytes)
  214. [shellcode] Windows/x86 - Download File (http://skypher.com/dll) + LoadLibrary + Null
  215. [shellcode] Windows/x86 (XP Professional SP3) (French) - calc.exe Shellcode (31 bytes
  216. [shellcode] Windows/x86 (XP Professional SP2) - calc Shellcode (57 bytes)
  217. [shellcode] Windows/x86 (XP Professional SP2) (English) - Wordpad Shellcode (15 bytes
  218. [shellcode] Windows/x86 (XP SP3) (French) - Sleep 90 Seconds Shellcode (14 bytes)
  219. [shellcode] Windows/x86 - Create Admin User (X) Shellcode (304 bytes)
  220. [shellcode] Windows/x86 (2000) - Reverse TCP (192.168.0.247:8721/TCP) Connect + Vampi
  221. [shellcode] Windows/x86 (NT/XP/2000/2003) - Bind TCP (8721/TCP) Shell Shellcode (356
  222. [shellcode] Linux/x86 - ROT-7 Encodor + Decoder execve Shellcode (74 bytes)
  223. [shellcode] Linux/x86 - setreuid() + execve(/usr/bin/python) Shellcode (54 bytes)
  224. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:1337/TCP) Shell Shellcode (74 bytes)
  225. [shellcode] Linux/x86 - Bind TCP (1337/TCP) Shell Shellcode (89 bytes)
  226. [shellcode] Linux/x86 - shutdown -h now Shellcode (56 bytes)
  227. [shellcode] Linux/x86 - chmod 0777 /etc/shadow + Obfuscated Shellcode (51 bytes)
  228. [shellcode] Linux/x86 - JMP-FSTENV execve Shellcode (67 bytes)
  229. [shellcode] Linux/x86 - shift-bit execve Encoder Shellcode (114 bytes)
  230. [shellcode] Linux/x86 - Copy /etc/passwd to /tmp/outfile Shellcode (97 bytes)
  231. [shellcode] Linux/x86 - execve(/bin/sh) Using jump/call/pop Shellcode (52 bytes)
  232. [shellcode] Linux/x86 - Download (http://192.168.2.222/x) + chmod() + execute Shellco
  233. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:12345/TCP) cat /etc/passwd Shellcode (
  234. [shellcode] Linux/x86 - Bind TCP Shell Shellcode (112 bytes)
  235. [shellcode] Linux/x86 - execve(/bin/sh) + Obfuscated Shellcode (30 bytes)
  236. [shellcode] Linux/x86 - Egghunter (0x5090) Shellcode (38 bytes)
  237. [shellcode] Linux/x86 - /proc/sys/net/ipv4/ip_forward 0 + exit() Shellcode (83 bytes)
  238. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell Shellcode (108 bytes)
  239. [shellcode] Linux/x86 - Uzumaki Encryptor Shellcode (Generator)
  240. [shellcode] Linux/x86 - execve(/bin/shUzumaki) + Uzumaki Encoded + Null-Free Shellcod
  241. [shellcode] Linux/x86 - execve wget + Mutated + Null-Free Shellcode (96 bytes)
  242. [shellcode] Linux/x86 - Fork Bomb + Mutated + Null-Free Shellcode (15 bytes)
  243. [shellcode] Linux/x86 - Reboot + Mutated + Null-Free Shellcode (55 bytes)
  244. [shellcode] Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
  245. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (6)
  246. [shellcode] Linux/x86 - Insertion Decoder Shellcode (33+ bytes)
  247. [webapps] Primefaces 5.x - Remote Code Execution (Metasploit)
  248. [shellcode] Linux/x86 - Egg Hunter Shellcode (38 bytes)
  249. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
  250. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell Shellcode (73 bytes)