المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 [43] 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62

  1. [dos] - Wireshark 2.0.0 to 2.0.4 - CORBA IDL Dissectors Denial of Service
  2. [dos] - Wireshark 2.0.0 to 2.0.4 - MMSE, WAP, WBXML, and WSP Dissectors Denial of Ser
  3. [dos] - Wireshark 1.12.0 to 1.12.12 - NDS Dissector Denial of Service
  4. [webapps] - Open Upload 0.4.2 - (Add Admin) CSRF
  5. [dos] - Halliburton LogView Pro 9.7.5 - (.cgm/.tif/.tiff/.tifh) Crash PoC
  6. [webapps] - WordPress WP Live Chat Support Plugin 6.2.03 - Stored XSS
  7. [webapps] - WordPress ALO EasyMail Newsletter Plugin 2.9.2 - (Add/Import Arbitrary Su
  8. [webapps] - WordPress Booking Calendar Plugin 6.2 - SQL Injection
  9. [papers] - [Hebrew] Digital Whisper Security Magazine #74
  10. [webapps] - PhpMyAdmin 4.6.2 - Post-Auth Remote Code Execution
  11. [dos] - WebKit - TypedArray.copyWithin Memory Corruption
  12. [webapps] - Trend Micro Deep Discovery 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) - hotf
  13. [shellcode] - Linux/x86 - NetCat Bind Shell with Port (44, 52 bytes)
  14. [remote] - Easy File Sharing Web Server 7.2 - SEH Overflow (Egghunter)
  15. [remote] - Barracuda Web Application Firewall 8.0.1.008 - Post Auth Remote Root Explo
  16. [remote] - Barracuda Web App Firewall 8.0.1.008/Load Balancer 5.4.0.004 - Post Auth R
  17. [shellcode] - Windows x86 - localhost Port Scanner Shellcode (556 bytes)
  18. [webapps] - Wordpress Ultimate Product Catalog 3.9.8 - (do_shortcode via ajax) Blind
  19. [local] - mySCADAPro 7 - Local Privilege Escalation
  20. [local] - VUPlayer 2.49 - (.pls) Stack Buffer Overflow (DEP Bypass)
  21. [webapps] - AXIS Multiple Products - Authenticated Remote Command Execution via devto
  22. [remote] - Centreon 2.5.3 - Web Useralias Command Execution (Metasploit)
  23. [local] - VMware - Setuid vmware-mount Popen lsb_release Privilege Escalation (VMSA-2
  24. [remote] - Iris ID IrisAccess iCAM4000/iCAM7000 - Hardcoded Credentials Remote Shell
  25. [webapps] - Iris ID IrisAccess ICU 7000-2 - Remote Root Command Execution
  26. [webapps] - Iris ID IrisAccess ICU 7000-2 - Multiple Vulnerabilities
  27. [webapps] - PHP File Vault 0.9 - Directory Traversal
  28. [remote] - Barracuda Web App Firewall 8.0.1.007/Load Balancer 5.4.0.004 - Post Auth R
  29. [webapps] - Micro Focus Filr 2 2.0.0.421, Filr 1.2 1.2.0.846 - Multiple Vulnerabiliti
  30. [webapps] - Bellini/Supercook Wi-Fi Yumi SC200 - Multiple Vulnerabilities
  31. [webapps] - PHP gettext (gettext.php) 1.0.12 - Unauthenticated Code Execution
  32. [local] - CoolPlayer+ Portable 2.19.6 - .m3u Stack Overflow (Egghunter+ASLR bypass)
  33. [papers] - Cryptshare 3.10.1.2 - Stored XSS
  34. [webapps] - GRR Système de Gestion et de Réservations de Ressources 3.0.0-RC1 - Arbit
  35. [dos] - PHP 7.0.8, 5.6.23 and 5.5.37 - bzread() Out-of-Bounds Write
  36. [webapps] - Ubee EVW3226 Modem/Router 1.0.20 - Multiple Vulnerabilities
  37. [webapps] - Technicolor TC7200 Modem/Router STD6.02.11 - Multiple Vulnerabilities
  38. [webapps] - Hitron CGNV4 Modem/Router 4.3.9.9-SIP-UPC - Multiple Vulnerabilities
  39. [webapps] - Compal CH7465LG-LC Modem/Router CH7465LG-NCIP-4.50.18.13-NOSH - Multiple
  40. [webapps] - CodoForum 3.2.1 - SQL Injection
  41. [local] - Rapid7 AppSpider 6.12 - Local Privilege Escalation
  42. [remote] - Barracuda Web App Firewall 8.0.1.007/Load Balancer 5.4.0.004 - Remote Comm
  43. [remote] - Barracuda Spam & Virus Firewall 5.1.3.007 - Remote Command Execution (Meta
  44. [local] - MediaCoder 0.8.43.5852 - .m3u SEH Exploit
  45. [webapps] - Drupal CODER Module 2.5 - Remote Command Execution (Metasploit)
  46. [local] - mail.local(8) (NetBSD) - Local Root Exploit (NetBSD-SA2016-006)
  47. [remote] - Apache 2.4.7 & PHP
  48. [papers] - Novel contributions to the field - How I broke MySQL's codebase
  49. [remote] - TFTP Server 1.4 - WRQ Buffer Overflow Exploit (Egghunter)
  50. [shellcode] - Linux/x86-64 - Subtle Probing Reverse Shell, Timer, Burst, Password, Mu
  51. [webapps] - TeamPass Passwords Management System 2.1.26 - Arbitrary File Download
  52. [local] - Wowza Streaming Engine 4.5.0 - Local Privilege Escalation
  53. [webapps] - Wowza Streaming Engine 4.5.0 - Remote Privilege Escalation
  54. [webapps] - Wowza Streaming Engine 4.5.0 - Add Advanced Admin CSRF
  55. [remote] - OpenSSHD
  56. [webapps] - Wowza Streaming Engine 4.5.0 - Multiple XSS
  57. [webapps] - WordPress Video Player Plugin 1.5.16 - SQL Injection
  58. [shellcode] - Linux/CRISv32 - Axis Communication Connect Back Shellcode (189 bytes)
  59. [webapps] - Django CMS 3.3.0 - (Editor Snippet) Persistent XSS
  60. [remote] - Drupal RESTWS Module 7.x - Remote PHP Code Execution (Metasploit)
  61. [shellcode] - Linux/x86 - execve /bin/sh Shellcode (19 bytes)
  62. [webapps] - newsp.eu PHP Calendar Script 1.0 - User Credentials Disclosure
  63. [webapps] - NewsP Free News Script 1.4.7 - User Credentials Disclosure
  64. [papers] - Exploiting Apache James Server 2.3.2
  65. [remote] - Axis Communications MPQT/PACS 5.20.x - Server Side Include (SSI) Daemon Re
  66. [shellcode] - Linux/x86-64 - Syscall Persistent Bind Shell + (Multi-terminal) + Passw
  67. [remote] - Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution
  68. [WebApps] - vBulletin 5.x/4.x - Persistent XSS in AdminCP/ApiLog via xmlrpc API (Post
  69. [WebApps] - vBulletin 4.x - SQLi in breadcrumbs via xmlrpc API (Post-Auth)
  70. [Local] - Internet Explorer 11 (on Windows 10) - VBScript Memory Corruption Proof-of-
  71. [Remote] - DropBearSSHD
  72. [remote] - OpenSSHD
  73. [webapps] - Clear Voyager Hotspot IMW-C910W - Arbitrary File Disclosure
  74. [webapps] - Joomla Guru Pro (com_guru) Component - SQL Injection
  75. [shellcode] - Linux x86 Reverse Shell using Xterm ///usr/bin/xterm -display 127.1.1.
  76. [webapps] - Apache Archiva 1.3.9 - Multiple CSRF Vulnerabilities
  77. [remote] - Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution
  78. [local] - MS16-032 Secondary Logon Handle Privilege Escalation
  79. [dos] - Adobe Flash Player 22.0.0.192 - DefineSprite Memory Corruption
  80. [dos] - Adobe Flash Player 22.0.0.192 - DefineBitsJPEG2 Memory Corruption
  81. [webapps] - GSX Analyzer 10.12 and 11 - Main.swf Hardcoded Superadmin Credentials
  82. [shellcode] - Windows x86 URLDownloadToFileA()+SetFileAttributesA()+WinExec( )+ExitPro
  83. [dos] - Adobe Flash Player 22.0.0.192 - SceneAndFrameData Memory Corruption
  84. [dos] - Adobe Flash Player 22.0.0.192 - TAG Memory Corruption
  85. [webapps] - Clinic Management System - Blind SQL Injection
  86. [webapps] - Beauty Parlour & SPA Saloon Management System - Blind SQL Injection
  87. [webapps] - WordPress All in One SEO Pack Plugin 2.3.6.1 - Persistent XSS
  88. [webapps] - Belkin Router AC1200 Firmware 1.00.27 - Authentication Bypass
  89. [remote] - Ruby on Rails ActionPack Inline ERB Code Execution
  90. [local] - MS16-016 mrxdav.sys WebDav Local Privilege Escalation
  91. [remote] - Tiki Wiki 15.1 - Unauthenticated File Upload Vulnerability (msf)
  92. [dos] - Adobe Flash - ATF Image Packing Overflow
  93. [webapps] - Tiki Wiki CMS 15.0 - Arbitrary File Download
  94. [shellcode] - Linux x86-64 Continuously-Probing Reverse Shell via Socket + Port-range
  95. [webapps] - Streamo Online Radio And TV Streaming CMS - SQL Injection
  96. [webapps] - CyberPower Systems PowerPanel 3.1.2 - XXE Out-Of-Band Data Retrieval
  97. [webapps] - php Real Estate Script 3 - Arbitrary File Disclosure
  98. [shellcode] - Linux x86 TCP Reverse Shellcode - 75 bytes
  99. [dos] - Microsoft WinDbg logviewer.exe - Crash PoC
  100. [dos] - Microsoft Process Kill Utility (kill.exe) 6.3.9600.17298 - Crash PoC
  101. [local] - InstantHMI 6.1 - Privilege Escalation
  102. [local] - Hide.Me VPN Client 1.2.4 - Privilege Escalation
  103. [webapps] - WordPress Lazy Content Slider Plugin 3.4 - (Add Catetory) CSRF
  104. [local] - GE Proficy HMI/SCADA CIMPLICITY 8.2 - Local Privilege Escalation
  105. [webapps] - OPAC KpwinSQL - Multiple Vulnerabilities
  106. [dos] - Core FTP LE 2.2 - Path Field Local Buffer Overflow
  107. [local] - VUPlayer 2.49 - .m3u Buffer Overflow Exploit (Win 7 DEP Bypass)
  108. [remote] - Nagios XI Chained Remote Code Execution
  109. [local] - Samsung Android JACK - Privilege Escalation
  110. [webapps] - OpenFire 3.10.2 - 4.0.1 - Multiple Vulnerabilities
  111. [remote] - GNU Wget < 1.18 - Arbitrary File Upload/Remote Code Execution
  112. [webapps] - PaKnPost Pro 1.14 - Multiple Vulnerabilities
  113. [webapps] - Advanced Webhost Billing System (AWBS) 2.9.6 - Multiple Vulnerabilities
  114. [shellcode] - Linux 64bit Ncat Shellcode (SSL, MultiChannel, Persistant, Fork, IPv4/6
  115. [webapps] - 24online SMS_2500i 8.3.6 build 9.0 - SQL Injection
  116. [webapps] - CIMA DocuClass ECM - Multiple Vulnerabilities
  117. [shellcode] - Linux x86 TCP Bind Shell Port 4444 - 98 bytes
  118. [webapps] - eCardMAX 10.5 - Multiple Vulnerabilities
  119. [webapps] - WebCalendar 1.2.7 - Multiple Vulnerabilities
  120. [webapps] - WordPress Real3D FlipBook Plugin - Multiple Vulnerabilities
  121. [local] - Debian Exim - Spool Local Root Privilege Escalation
  122. [local] - Ubuntu 16.04 Kernel 4.4.0-21-generic - netfilter target_offset Local root E
  123. [shellcode] - Linux 64bit NetCat Bind Shell Shellcode - 64 bytes
  124. [webapps] - Ktools Photostore 4.7.5 - Multiple Vulnerabilities
  125. [webapps] - XpoLog Center 6 - Remote Command Execution CSRF
  126. [local] - Ubuntu 16.04 local root exploit - netfilter target_offset OOB
  127. [webapps] - Phoenix Exploit Kit - Remote Code Execution
  128. [webapps] - Ktools Photostore 4.7.5 - Blind SQL Injection
  129. [webapps] - Concrete5 5.7.3.1 - (Application::dispatch) Local File Inclusion
  130. [webapps] - Ubiquiti Administration Portal - CSRF to Remote Command Execution
  131. [local] - Cuckoo Sandbox Guest 2.0.1 - XMLRPC Privileged Remote Code Execution
  132. [webapps] - WordPress Ultimate Membership Pro Plugin 3.3 - SQL Injection
  133. [local] - Lenovo ThinkPad - System Management Mode Arbitrary Code Execution Exploit
  134. [local] - Windows 7 SP1 x86 - Privilege Escalation (MS16-014)
  135. [dos] - Symantec Antivirus - Missing Bounds Checks in dec2zip ALPkOldFormatDecompress
  136. [dos] - Symantec Antivirus - Integer Overflow in TNEF Decoder
  137. [dos] - Symantec Antivirus - Heap Overflow Modifying MIME Messages
  138. [dos] - Symantec Antivirus - Remote Stack Buffer Overflow in dec2lha Library
  139. [dos] - Symantec Antivirus - Multiple Remote Memory Corruption Unpacking RAR
  140. [webapps] - Untangle NGFW 12.1.0 beta - execEvil() Command Injection
  141. [shellcode] - Linux x86_64 /etc/passwd File Sender Shellcode
  142. [webapps] - Riverbed SteelCentral NetProfiler & NetExpress 10.8.7 - Multiple Vulnerab
  143. [webapps] - SugarCRM 6.5.18 - PHP Code Injection
  144. [shellcode] - Linux x86 /bin/sh Shellcode + ASLR Bruteforce
  145. [local] - HNB 1.9.18-10 - Local Buffer Overflow
  146. [webapps] - BigTree CMS 4.2.11 - SQL Injection
  147. [local] - PInfo 0.6.9-5.1 - Local Buffer Overflow
  148. [webapps] - iBilling 3.7.0 - Stored and Reflected XSS
  149. [webapps] - MyLittleForum 2.3.5 - PHP Command Injection
  150. [local] - Panda Security Multiple Products - Privilege Escalation
  151. [webapps] - Kagao 3.0 - Multiple Vulnerabilities
  152. [webapps] - Option CloudGate CG0192-11897 - Multiple Vulnerabilities
  153. [dos] - Magnet Networks Tesley CPVA 642 Router – Weak WPA-PSK Passphrase Algorithm
  154. [webapps] - XuezhuLi FileSharing - Directory Traversal
  155. [webapps] - XuezhuLi FileSharing - (Add User) CSRF
  156. [webapps] - FinderView - Multiple Vulnerabilities
  157. [shellcode] - Linux Netcat Reverse Shell - 32bit - 77 bytes
  158. [webapps] - Getsimple CMS 3.3.10 - Arbitrary File Upload
  159. [webapps] - Alibaba Clone B2B Script - Arbitrary File Disclosure
  160. [papers] - [Hebrew] Digital Whisper Security Magazine #73
  161. [local] - Linux Kernel
  162. [remote] - PCMAN FTP 2.0.7 - ls Command Buffer Overflow (Metasploit)
  163. [papers] - [Hebrew] Digital Whisper Security Magazine #71
  164. [papers] - [Hebrew] Digital Whisper Security Magazine #72
  165. [remote] - Wolf CMS 0.8.2 - Arbitrary File Upload Exploit (Metasploit)
  166. [shellcode] - Windows x86 ShellExecuteA(NULL,NULL,"cmd.exe",NULL,NULL,1) Shellcode
  167. [webapps] - Radiant CMS 1.1.3 - Mutiple Persistent XSS Vulnerabilities
  168. [webapps] - YetiForce CRM < 3.1 - Persistent XSS
  169. [webapps] - SAP NetWeaver AS JAVA 7.1 - 7.5 - Directory Traversal
  170. [webapps] - SAP NetWeaver AS JAVA 7.1 - 7.5 - ctcprotocol Servlet XXE
  171. [dos] - Windows - Custom Font Disable Policy Bypass
  172. [local] - Linux - ecryptfs and /proc/$pid/environ Privilege Escalation
  173. [dos] - Windows Kernel - ATMFD.DLL NamedEscape 0x250C Pool Corruption (MS16-074)
  174. [dos] - Windows - gdi32.dll Multiple DIB-Related EMF Record Handlers Heap-Based Out-o
  175. [dos] - Internet Explorer 11 - Garbage Collector Attribute Type Confusion (MS16-063)
  176. [webapps] - Joomla Publisher Pro (com_publisher) Component - SQL Injection
  177. [webapps] - Yona CMS - (Add Admin) CSRF
  178. [webapps] - IonizeCMS 1.0.8 - (Add Admin) CSRF
  179. [dos] - Banshee 2.6.2 - .mp3 Crash PoC
  180. [remote] - DarkComet Server Remote File Download Exploit (msf)
  181. [local] - ACROS Security 0patch 2016.05.19.539 - (0PatchServicex64.exe) Unquoted Serv
  182. [webapps] - Symphony CMS 2.6.7 - Session Fixation
  183. [webapps] - Airia - Webshell Upload Exploit
  184. [webapps] - Airia - (Add content) CSRF
  185. [local] - Tomabo MP4 Player 3.11.6 - SEH Based Stack Overflow (msf)
  186. [shellcode] - Windows XP - 10 - Download & Execute Shellcode
  187. [webapps] - Premium SEO Pack 1.9.1.3 - wp_options Overwrite
  188. [webapps] - Joomla BT Media (com_bt_media) Component - SQL Injection
  189. [webapps] - sNews CMS 1.7.1 - Multiple Vulnerabilities
  190. [shellcode] - Linux x86_64 execve Shellcode - 15 bytes
  191. [webapps] - WordPress Ultimate Product Catalog Plugin 3.8.1 - Privilege Escalation
  192. [remote] - op5 v7.1.9 Configuration Command Execution
  193. [webapps] - phpATM 1.32 - Multiple Vulnerabilities
  194. [webapps] - phpATM 1.32 - Remote Command Execution (Shell Upload) on Windows Servers
  195. [webapps] - Vicidial 2.11 - Scripts Stored XSS
  196. [webapps] - WordPress Gravity Forms Plugin 1.8.19 - Arbitrary File Upload
  197. [dos] - Blat 3.2.14 - Stack Overflow
  198. [local] - Solarwinds Virtualization Manager - Privilege Escalation
  199. [webapps] - Tiki-Wiki CMS Calendar 14.2, 12.5 LTS, 9.11 LTS, and 6.15 - Remote Code E
  200. [webapps] - SlimCMS 0.1 - CSRF (Change Admin Password)
  201. [webapps] - Roxy Fileman 1.4.4 - Arbitrary File Upload
  202. [webapps] - ATCOM PBX IP01, IP08 , IP4G, IP2G4A - Authentication Bypass
  203. [shellcode] - Linux/Windows/BSD x86_64 execve("/bin//sh", {"//bin/sh", "-c", "cmd"},
  204. [shellcode] - Linux x86 TCP Bind Shell Port 4444 (656 bytes)
  205. [shellcode] - Linux x86_64 Shellcode Null-Free Reverse TCP Shell
  206. [shellcode] - Linux/x86 - Bindshell with Configurable Port - 87 bytes
  207. [shellcode] - Linux x86_64 - Reverse Shell Shellcode
  208. [dos] - Google Chrome - GPU Process MailboxManagerImpl Double-Read
  209. [dos] - Windows 7 - win32k Bitmap Use-After-Free (MS16-062) (2)
  210. [dos] - Windows 7 - win32k Bitmap Use-After-Free (MS16-062) (1)
  211. [remote] - Bomgar Remote Support Unauthenticated Code Execution (msf)
  212. [webapps] - PHPLive 4.4.8 - 4.5.4 - Password Recovery SQL Injection
  213. [webapps] - jbFileManager - Directory Traversal
  214. [webapps] - BookingWizz Booking System < 5.5 - Multiple Vulnerabilities
  215. [local] - AdobeUpdateService 3.6.0.248 - Unquoted Service Path Privilege Escalation
  216. [webapps] - Joomla En Masse (com_enmasse) Component 5.1 - 6.4 - SQL Injection
  217. [webapps] - Dokeos 2.2.1 - Blind SQL Injection
  218. [webapps] - Hyperoptic (Tilgin) Router HG23xx - Multiple Vulnerabilities
  219. [webapps] - w2wiki - Multiple XSS Vulnerabilities
  220. [webapps] - Ultrabenosaurus ChatBoard - CSRF (Send Message)
  221. [webapps] - Ultrabenosaurus ChatBoard - Stored XSS
  222. [dos] - Oracle Orakill.exe 11.2.0 - Buffer Overflow
  223. [webapps] - WordPress Social Stream Plugin 1.5.15 - wp_options Overwrite
  224. [dos] - Oracle Orakill.exe 11.2.0 - Buffer Overflow
  225. [remote] - Apache Continuum Arbitrary Command Execution
  226. [dos] - Foxit PDF Reader 1.0.1.0925 - CFX_BaseSegmentedArray::IterateIndex Memory Cor
  227. [dos] - Foxit PDF Reader 1.0.1.0925 -kdu_core::kdu_codestream::get_subsampling Memory
  228. [dos] - Foxit PDF Reader 1.0.1.0925 - CFX_WideString::operator= Invalid Read
  229. [dos] - Foxit PDF Reader 1.0.1.0925 - CPDF_DIBSource::TranslateScanline24bpp Out-of-B
  230. [dos] - Foxit PDF Reader 1.0.1.0925 - CPDF_StreamContentParser::~CPDF_StreamContentPa
  231. [dos] - iSQL 1.0 - isql_main.c Buffer Overflow PoC
  232. [local] - iSQL 1.0 - Shell Command Injection
  233. [webapps] - Zabbix 2.2 - 3.0.3 - RCE with API JSON-RPC
  234. [webapps] - Joomla PayPlans (com_payplans) Extension 3.3.6 - SQL Injection
  235. [webapps] - Grid Gallery 1.0 - Admin Panel Authentication Bypass
  236. [webapps] - Dream Gallery 2.0 - Admin Panel Authentication Bypass
  237. [local] - Easy RM to MP3 Converter 2.7.3.700 - (.m3u) Exploit with Universal DEP+ASLR
  238. [webapps] - Viart Shopping Cart 5.0 - CSRF Shell Upload
  239. [webapps] - FRticket Ticket System - Stored XSS
  240. [dos] - OS X Kernel - Stack Buffer Overflow in GeForce GPU Driver
  241. [dos] - OS X/iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootM
  242. [dos] - OS X Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2
  243. [dos] - OS X Kernel - Exploitable NULL Dereference in CoreCaptureResponder Due to Unc
  244. [dos] - OS X Kernel - Exploitable NULL Dereference in IOAccelSharedUserClient2::page_
  245. [dos] - Android - /system/bin/sdcard Stack Buffer Overflow
  246. [webapps] - Drale DBTableViewer 100123 - Blind SQL Injection
  247. [webapps] - Cisco EPC 3928 - Multiple Vulnerabilities
  248. [local] - League of Legends Screensaver - Insecure File Permissions Privilege Escalat
  249. [local] - League of Legends Screensaver - Unquoted Service Path Privilege Escalation
  250. [shellcode] - Linux x86 /bin/nc -le /bin/sh -vp13337 Shellcode (56 bytes)