المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 [31] 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70

  1. [webapps] Synology Photo Station 6.7.3-3432 / 6.3-2967 - Remote Code Execution
  2. [local] Microsoft Windows 7 SP1 x86 - GDI Palette Objects Local Privilege Escalation
  3. [webapps] WordPress Plugin Easy Modal 2.0.17 - SQL Injection
  4. [local] Microsoft Windows - LNK Shortcut File Code Execution
  5. [shellcode] Linux x86 - /bin/sh Shellcode (24 bytes)
  6. [webapps] Joomla! Component StreetGuessr Game 1.1.8 - SQL Injection
  7. [local] VirtualBox 5.1.22 - Windows Process DLL Signature Bypass Privilege Escalation
  8. [local] VirtualBox 5.1.22 - Windows Process DLL UNC Path Signature Bypass Privilege E
  9. [webapps] Technicolor TC7337 - SSID Persistent Cross-Site Scripting
  10. [local] DNSTracer 1.9 - Buffer Overflow
  11. [webapps] EDUMOD Pro 1.3 - SQL Injection
  12. [webapps] Muviko 1.0 - 'q' Parameter SQL Injection
  13. [webapps] Premium Servers List Tracker 1.0 - SQL Injection
  14. [local] Nitro Pro PDF Reader 11.0.3.173 - Javascript API Remote Code Execution (Metas
  15. [webapps] Entrepreneur B2B Script - 'pid' Parameter SQL Injection
  16. [webapps] Joomla! Component Event Registration Pro Calendar 4.1.3 - SQL Injection
  17. [webapps] Joomla! Component LMS King Professional 3.2.4.0 - SQL Injection
  18. [webapps] Joomla! Component PHP-Bridge 1.2.3 - SQL Injection
  19. [webapps] Joomla! Component SIMGenealogy 2.1.5 - SQL Injection
  20. [webapps] Joomla! Component Ultimate Property Listing 1.0.2 - SQL Injection
  21. [dos] Solarwinds Kiwi Syslog 9.6.1.6 - Denial of Service
  22. [local] iOS/macOS - xpc_data Objects Sandbox Escape Privelege Escalation
  23. [webapps] SOL.Connect ISET-mpp meter 1.2.4.2 - SQL Injection
  24. [dos] libmad 0.15.1b - 'mp3' Memory Corruption
  25. [webapps] Advantech SUSIAccess
  26. [webapps] Advantech SUSIAccess
  27. [webapps] VehicleWorkshop - Authentication Bypass
  28. [webapps] VehicleWorkshop - Arbitrary File Upload
  29. [papers] [Hebrew] Digital Whisper Security Magazine #84
  30. [papers] [Hebrew] Digital Whisper Security Magazine #85
  31. [dos] DivFix++ 0.34 - Denial of Service
  32. [dos] Vorbis Tools oggenc 1.4.0 - '.wav' Denial of Service
  33. [dos] Sound eXchange (SoX) 14.4.2 - Multiple Vulnerabilities
  34. [dos] libvorbis 1.3.5 - Multiple Vulnerabilities
  35. [dos] libao 1.2.0 - Denial of Service
  36. [remote] Jenkins < 1.650 - Java Deserialization
  37. [remote] DiskBoss Enterprise 8.2.14 - Buffer Overflow
  38. [webapps] VehicleWorkshop - SQL Injection
  39. [webapps] GitHub Enterprise < 2.8.7 - Remote Code Execution
  40. [dos] SoundTouch 1.9.2 - Multiple Vulnerabilities
  41. [dos] GNU libiberty - Buffer Overflow
  42. [dos] libjpeg-turbo 1.5.1 - Denial of Service
  43. [dos] LAME 3.99.5 - Multiple Vulnerabilities
  44. [webapps] FortiOS < 5.6.0 - Cross-Site Scripting
  45. [webapps] Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
  46. [local] AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
  47. [webapps] Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin
  48. [local] MediaCoder 0.8.48.5888 - Local Buffer Overflow (SEH)
  49. [dos] WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free
  50. [webapps] WebKit JSC - 'JSObject::putInlineSlow and JSValue::putToPrimitive' Universa
  51. [webapps] Friends in War Make or Break 1.7 - Authentication Bypass
  52. [local] Microsoft Windows - LNK Shortcut File Code Execution (Metasploit)
  53. [webapps] Friends in War Make or Break 1.7 - SQL Injection
  54. [webapps] PaulShop - SQL Injection / Cross-Site Scripting
  55. [dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElemen t' Use-After-Free
  56. [dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExp andedChanged' Use-Af
  57. [dos] WebKit - 'WebCore::Node::nextSibling' Use-After-Free
  58. [dos] WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
  59. [dos] WebKit - 'WebCore::InputType::element' Use-After-Free
  60. [dos] WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
  61. [dos] WebKit - 'WebCore::Node::getFlag' Use-After-Free
  62. [dos] WebKit - 'WebCore::getCachedWrapper' Use-After-Free
  63. [local] Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
  64. [remote] IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
  65. [remote] VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command E
  66. [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
  67. [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
  68. [dos] WebKit JSC - 'DFG::ByteCodeParser::flush(InlineStackEntry* inlineStackEntry)' I
  69. [dos] WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference
  70. [dos] WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy
  71. [dos] WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handl
  72. [webapps] Barracuda Load Balancer Firmware
  73. [webapps] Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Meta
  74. [remote] Belkin NetCam F7D7601 - Multiple Vulnerabilities
  75. [webapps] Orangescrum 1.6.1 - Multiple Vulnerabilities
  76. [papers] How to exploit ETERNALROMANCE/SYNERGY on Windows Server 2016
  77. [remote] FTPGetter 5.89.0.85 - Buffer Overflow (SEH)
  78. [remote] Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution
  79. [webapps] WDTV Live SMP 2.03.20 - Remote Password Reset
  80. [local] Counter Strike: Condition Zero - '.BSP' Map File Code Execution
  81. [webapps] Apache Struts 2.3.x Showcase - Remote Code Execution (PoC)
  82. [webapps] DataTaker DT80 dEX 1.50.012 - Information Disclosure
  83. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download
  84. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation
  85. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Cross-Site Request Forger
  86. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass
  87. [papers] Hidden Network: Detecting Hidden Networks created with USB Devices
  88. [remote] Skype for Business 2016 - Cross-Site Scripting
  89. [remote] Microsoft Windows Windows 7/8.1/2008 R2/2012 R2/2016 R2 - 'EternalBlue' SMB
  90. [webapps] NfSen
  91. [webapps] Pelco VideoXpert 1.12.105 - Information Disclosure
  92. [webapps] Pelco VideoXpert 1.12.105 - Directory Traversal
  93. [local] Pelco VideoXpert 1.12.105 - Privilege Escalation
  94. [webapps] Pelco Sarix/Spectra Cameras - Remote Code Execution
  95. [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery (Enable SSH Root A
  96. [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scrip
  97. [remote] NfSen
  98. [local] NfSen < 1.3.7 / AlienVault OSSIM < 5.3.6 - Privilege Escalation
  99. [remote] Easy File Sharing Web Server 7.2 - GET HTTP Request 'PassWD' Buffer Overflow
  100. [remote] Yaws 1.91 - Remote File Disclosure
  101. [dos] Firefox 54.0.1 - Denial of Service
  102. [dos] LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read
  103. [dos] LibTIFF - 'tif_jbig.c' Denial of Service
  104. [dos] LibTIFF - 'tif_dirwrite.c' Denial of Service
  105. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  106. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  107. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  108. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  109. [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
  110. [webapps] BOA Web Server 0.94.14rc21 - Arbitrary File Access
  111. [remote] BestSafe Browser - MITM Remote Code Execution
  112. [remote] eVestigator Forensic PenTester - MITM Remote Code Execution
  113. [dos] Google Chrome - Out-of-Bounds Access in RegExp Stubs
  114. [dos] LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow
  115. [webapps] Humax HG100R 2.0.6 - Backup File Download
  116. [remote] ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit)
  117. [remote] Veritas/Symantec Backup Exec - SSL NDMP Connection Use-After-Free (Metasploi
  118. [papers] [Spanish] How to Exploit ETERNALBLUE on Windows Server 2012 R2
  119. [papers] How to Exploit ETERNALBLUE on Windows Server 2012 R2
  120. [dos] FreeBSD - 'setrlimit' Stack Clash (PoC)
  121. [dos] FreeBSD - 'FGPE' Stack Clash (PoC)
  122. [dos] FreeBSD - 'FGPU' Stack Clash (PoC)
  123. [local] Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) -
  124. [local] Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/2
  125. [local] Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2
  126. [local] Linux Kernel - 'offset2lib' 'Stack Clash' Exploit
  127. [dos] NetBSD - 'Stack Clash' (PoC)
  128. [local] OpenBSD - 'at' Local Privilege Escalation 'Stack Clash' Exploit
  129. [local] Oracle Solaris 11.1/11.3 (RSH) - Local Privilege Escalation 'Stack Clash' Exp
  130. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  131. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  132. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  133. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  134. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  135. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  136. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  137. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  138. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  139. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  140. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  141. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  142. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  143. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  144. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  145. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  146. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  147. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  148. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  149. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  150. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  151. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  152. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  153. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  154. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  155. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  156. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  157. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  158. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  159. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  160. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  161. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  162. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  163. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  164. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  165. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  166. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  167. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  168. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  169. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  170. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  171. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  172. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  173. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  174. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  175. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  176. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  177. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  178. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  179. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  180. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  181. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  182. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  183. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  184. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  185. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  186. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  187. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  188. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  189. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  190. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  191. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  192. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  193. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  194. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  195. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  196. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  197. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  198. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  199. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  200. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  201. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  202. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  203. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  204. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  205. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  206. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  207. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  208. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  209. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  210. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  211. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  212. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  213. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  214. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  215. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  216. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  217. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  218. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  219. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  220. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  221. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  222. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  223. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  224. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  225. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  226. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  227. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  228. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  229. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  230. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  231. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  232. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  233. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  234. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  235. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  236. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  237. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  238. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  239. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  240. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  241. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  242. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  243. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  244. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  245. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  246. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  247. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  248. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  249. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  250. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution