المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 [45] 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65

  1. [remote] - DiskBoss Enterprise - GET Buffer Overflow (Metasploit)
  2. [webapps] - Image Sharing Script 4.13 - Multiple Vulnerabilities
  3. [remote] - WinaXe Plus 8.7 - Buffer Overflow
  4. [shellcode] - Windows x64 - CreateRemoteThread() DLL Injection Shellcode (584 bytes)
  5. [webapps] - 9 Network Linkedin Clone Script - Improper Access Restrictions
  6. [webapps] - Article Directory Script Seo 3.2 - Improper Access Restrictions
  7. [webapps] - e-Soft24 Jokes Portal Script Seo 1.3 - Authentication Bypass
  8. [webapps] - MC Smart Shop Script - SQL Injection
  9. [webapps] - MC Buy and Sell Cars Script 1.1 - SQL Injection
  10. [webapps] - MC Yellow Pages Script - SQL Injection
  11. [webapps] - MC Real Estate Pro Script - Improper Access Restrictions
  12. [webapps] - MC Hosting Coupons Script - Cross-Site Request Forgery
  13. [webapps] - MC Inventory Manager Script - Multiple Vulnerabilities
  14. [webapps] - MC Coming Soon Script - Arbitrary File Upload / Improper Access Restricti
  15. [webapps] - My Private Tutor Website Script - Authentication Bypass
  16. [webapps] - Hindu Matrimonial Script - Authentication Bypass
  17. [webapps] - Just Dial Marketplace Script - Authentication Bypass
  18. [webapps] - Entrepreneur Matrimonial Script - Authentication Bypass
  19. [webapps] - Open Source Real-Estate Script - SQL Injection
  20. [webapps] - Inout StickBoard 1.0 Script - Improper Access Restrictions
  21. [webapps] - Inout Search Engine Ultimate Edition 7.0/8.0 Script - Improper Access Res
  22. [dos] - Mozilla Firefox < 50.1.0 - Use After Free
  23. [remote] - Cisco Firepower Management Console 6.0 - Post Authentication UserAdd
  24. [webapps] - Zeroshell 3.6.0/3.7.0 Net Services - Remote Code Execution
  25. [local] - aSc Timetables 2017 - Buffer Overflow
  26. [webapps] - Airbnb Clone Script - Arbitrary File Upload
  27. [webapps] - School Management Software 2.75 - SQL Injection
  28. [webapps] - Penny Auction Script - Arbitrary File Upload
  29. [webapps] - ECommerce-TIBSECART - Arbitrary File Upload
  30. [webapps] - ECommerce-Multi-Vendor Software - Arbitrary File Upload
  31. [webapps] - Job Portal Script 9.11 - Authentication Bypass
  32. [webapps] - Online Food Delivery 2.04 - Authentication Bypass
  33. [webapps] - Dating Script 3.25 - SQL Injection
  34. [webapps] - Travel Portal Script 9.33 - SQL Injection
  35. [webapps] - Movie Portal Script 7.35 - SQL Injection
  36. [dos] - Boxoft Wav 1.0 - Buffer Overflow
  37. [papers] - OpenSSL - Weak KDF
  38. [webapps] - Starting Page 1.3 - 'category' Parameter SQL Injection
  39. [webapps] - My link trader 1.1 - 'id' Parameter SQL Injection
  40. [dos] - Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corrupti
  41. [dos] - Adobe Flash Player 24.0.0.186 - 'ActionGetURL2' Out-of-Bounds Memory Corrupti
  42. [webapps] - WordPress Plugin WP Support Plus Responsive Ticket System 7.1.3 - Privile
  43. [webapps] - FMyLife Clone Script (Pro Edition) 1.1 - Cross-Site Request Forgery (Add
  44. [webapps] - Starting Page 1.3 - SQL Injection
  45. [remote] - DiskBoss Enterprise 7.5.12 - 'POST' Buffer Overflow (SEH)
  46. [webapps] - Friends in War Make or Break 1.7 - 'imgid' Parameter SQL Injection
  47. [webapps] - My Php Dating 2.0 - 'id' Parameter SQL Injection
  48. [webapps] - My Php Dating 2.0 - SQL Injection
  49. [webapps] - Splunk 6.1.1 - 'Referer' Header Cross-Site Scripting
  50. [webapps] - My Link Trader 1.1 - Authentication Bypass
  51. [local] - Advanced Desktop Locker 6.0.0 - Lock Screen Bypass
  52. [webapps] - DirectAdmin 1.50.1 - Denial of Service
  53. [dos] - Brave Browser 1.2.16/1.9.56 - Address Bar URL Spoofing
  54. [dos] - Google Android max86902 Driver - 'sysfs' Interfaces Race Condition
  55. [papers] - Web App Penetration Testing - Local File Inclusion (LFI)
  56. [remote] - Microsoft Windows 10 Edge - 'chakra.dll' Info Leak / Type Confusion Remote
  57. [webapps] - Atlassian Confluence Jira 5.9.12 - Persistent Cross-Site Scripting
  58. [local] - Kaspersky 17.0.0 - Local CA root is Incorrectly Protected
  59. [webapps] - My Click Counter 1.0 - Authentication Bypass
  60. [webapps] - PHPMailer < 5.2.20 / SwiftMailer
  61. [dos] - QNAP NAS Devices - Heap Overflow
  62. [remote] - Internet Download Accelerator 6.10.1.1527 - FTP Buffer Overflow (SEH)
  63. [papers] - [Hebrew] Digital Whisper Security Magazine #79
  64. [shellcode] - Windows x64 - Password Protected Bind Shellcode (825 bytes)
  65. [webapps] - Zend Framework / zend-mail < 2.4.11 - Remote Code Execution
  66. [webapps] - WordPress Plugin Slider Templatic Tevolution
  67. [webapps] - Dell SonicWALL Global Management System GMS 8.1 - Blind SQL Injection
  68. [webapps] - Dell SonicWALL Secure Mobile Access SMA 8.1 - Cross-Site Scripting / Cros
  69. [local] - Android - get_user/put_user Exploit (Metasploit)
  70. [webapps] - Joomla! Component aWeb Cart Watching System for Virtuemart 2.6.0 - SQL In
  71. [webapps] - PHPMailer < 5.2.18 - Remote Code Execution (Python)
  72. [webapps] - SwiftMailer < 5.4.5-DEV - Remote Code Execution
  73. [webapps] - WordPress Plugin Simply Poll 1.4.1 - SQL Injection
  74. [webapps] - PHPMailer < 5.2.20 - Remote Code Execution
  75. [webapps] - PHPMailer < 5.2.18 - Remote Code Execution (PHP)
  76. [webapps] - PHPMailer 5.2.17 - Remote Code Execution
  77. [local] - Wampserver 3.0.6 - Insecure File Permissions Privilege Escalation
  78. [dos] - FTPShell Server 6.36 - '.csv' Local Denial of Service
  79. [webapps] - Joomla! Component Blog Calendar - SQL Injection
  80. [dos] - XAMPP Control Panel - Denial Of Service
  81. [local] - OpenSSH < 7.4 - 'UsePrivilegeSeparation Disabled' Forwarded Unix Domain Soc
  82. [remote] - OpenSSH < 7.4 - agent Protocol Arbitrary Library Loading
  83. [webapps] - Apache mod_session_crypto - Padding Oracle
  84. [dos] - Microsoft Internet Explorer 11 MSHTML - CPaste*Command::Convert*Bitmapto*Png
  85. [local] - Vesta Control Panel 0.9.8-16 - Local Privilege Escalation
  86. [dos] - MacOS 10.12 - Double vm_deallocate in Userspace MIG Code Use-After-Free
  87. [dos] - MacOS < 10.12.2 / iOS < 10.2 Kernel - ipc_port_t Reference Count Leak Due to
  88. [local] - MacOS < 10.12.2 / iOS < 10.2 Kernel - _kernelrpc_mach_port_insert_right_tra
  89. [local] - MacOS < 10.12.2 / iOS < 10.2 - Broken Kernel Mach Port Name uref Handling P
  90. [dos] - MacOS 10.12.1 / iOS < 10.2 - powerd Arbitrary Port Replacement
  91. [dos] - MacOS 10.12.1 / iOS < 10.2 - syslogd Arbitrary Port Replacement
  92. [dos] - MacOS Kernel 10.12.1 - Writable Privileged IOKit Registry Properties Code Exe
  93. [local] - IBM AIX 6.1/7.1/7.2 - 'Bellmail' Privilege Escalation
  94. [remote] - NETGEAR WNR2000v5 - Remote Code Execution
  95. [dos] - Microsoft Edge - SIMD.toLocaleString Uninitialized Memory (MS16-145)
  96. [dos] - Microsoft Edge - Internationalization Initialization Type Confusion (MS16-144
  97. [dos] - Microsoft Internet Explorer 11 MSHTML - CSplice*Tree*Engine::Remove*Splice Us
  98. [dos] - Google Android - WifiNative::setHotlist Stack Overflow
  99. [webapps] - WordPress Plugin 404 Redirection Manager 1.0 - SQL Injection
  100. [dos] - Google Chrome < 31.0.1650.48 - HTTP 1xx base::String*Tokenizer*T::Quick*Get*N
  101. [local] - Naenara Browser 3.5 (RedStar 3.0 Desktop) - 'JACKRABBIT' Client-Side Comman
  102. [local] - RedStar 3.0 Server - 'BEAM & RSSMON' Command Execution (Shellshock)
  103. [shellcode] - Linux/x86 - /bin/bash -c Arbitrary Command Execution Shellcode (72 byte
  104. [dos] - Orthanc DICOM Server 1.1.0 - Memory Corruption
  105. [local] - iOS 10.1.1 / macOS 10.12 16A323 XNU Kernel - set_dp_control_port Lack of Lo
  106. [dos] - OsiriX DICOM Viewer 8.0.1 - Memory Corruption
  107. [dos] - ConQuest DICOM Server 1.4.17d - Stack Buffer Overflow
  108. [dos] - DCMTK 3.6.0 storescp - Stack Buffer Overflow
  109. [papers] - [Hebrew] Digital Whisper Security Magazine #75
  110. [local] - FortiClient SSLVPN 5.4 - Credentials Disclosure
  111. [dos] - PHP 7.0 - JsonSerializable::jsonSerialize json_encode Local Denial of Service
  112. [webapps] - ZKTeco ZKAccess Security System 5.3.1 - Persistent Cross-Site Scripting
  113. [webapps] - ZKTeco ZKBioSecurity 3.0 - (visLogin.jsp) Local Authorization Bypass
  114. [webapps] - ZKTeco ZKBioSecurity 3.0 - Directory Traversal
  115. [webapps] - ZKTeco ZKBioSecurity 3.0 - (Add Superadmin) Cross-Site Request Forgery
  116. [webapps] - ZKTeco ZKBioSecurity 3.0 - Hardcoded Credentials Remote SYSTEM Code Execu
  117. [local] - ZKTeco ZKAccess Professional 3.5.3 - Insecure File Permissions Privilege Es
  118. [local] - ZKTeco ZKTime.Net 3.0.1.6 - Insecure File Permissions Privilege Escalation
  119. [dos] - PHP 7.0 - AppendIterator::append Local Denial of Service
  120. [dos] - PHP 5.0.0 - snmpset() Local Denial of Service
  121. [dos] - PHP 5.0.0 - fbird_[p]connect() Local Denial of Service
  122. [dos] - PHP 5.0.0 - snmpwalkoid() Local Denial of Service
  123. [dos] - PHP 5.0.0 - html_doc_file() Local Denial of Service
  124. [dos] - PHP 5.0.0 - hw_docbyanchor() Local Denial of Service
  125. [dos] - PHP 5.0.0 - imap_mail() Local Denial of Service
  126. [webapps] - FreePBX 13.0.35 - SQL Injection
  127. [dos] - Adobe Flash - MovieClip Transform Getter Use-After-Free
  128. [dos] - Adobe Flash - Use-After-Free When Returning Rectangle
  129. [dos] - Adobe Flash - Stage.align Setter Use-After-Free
  130. [dos] - Adobe Flash - BitmapData.copyPixels Use-After-Free
  131. [dos] - Adobe Flash - Selection.setFocus Use-After-Free
  132. [webapps] - PLC Wireless Router GPN2.4P21-C-CN - Arbitrary File Disclosure
  133. [papers] - [Persian] Android Security and Forensic Science
  134. [webapps] - HelpDeskZ 1.0.2 - Unauthenticated Shell Upload
  135. [webapps] - INTELLINET IP Camera INT-L100M20N - Unauthorized admin Credential Change
  136. [dos] - PHP 7.0 - Object Cloning Local Denial of Service
  137. [dos] - PHP 5.0.0 - domxml_open_file() Local Denial of Service
  138. [local] - NScan 0.9.1 - (Target) Buffer Overflow
  139. [dos] - Goron Webserver 2.0 - Multiple Vulnerabilities
  140. [webapps] - FreePBX 13.0.35 - Remote Command Execution
  141. [remote] - Phoenix Exploit Kit - Remote Code Execution (Metasploit)
  142. [webapps] - chatNow - Multiple Vulnerabilities
  143. [webapps] - SimplePHPQuiz - Blind SQL Injection
  144. [dos] - Eye of Gnome 3.10.2 - GMarkup Out of Bounds Write
  145. [webapps] - WordPress Mail Masta Plugin 1.0 - Local File Inclusion
  146. [dos] - ObiHai ObiPhone 1032/1062 < 5-0-0-3497 - Multiple Vulnerabilities
  147. [webapps] - WordPress 4.5.3 - Directory Traversal / Denial of Service
  148. [papers] - Hunting HTML 5 postMessage Vulnerabilities
  149. [webapps] - Sakai 10.7 - Multiple Vulnerabilities
  150. [webapps] - VideoIQ Camera - Local File Disclosure
  151. [webapps] - Honeywell IP-Camera HICC-1100PT - Local File Disclosure
  152. [webapps] - JVC IP-Camera VN-T216VPRU - Local File Disclosure
  153. [webapps] - Vanderbilt IP-Camera CCPW3025-IR, CVMW3025-IR - Local File Disclosure
  154. [webapps] - Fortigate Firewalls - Remote Code Execution (EGREGIOUSBLUNDER)
  155. [remote] - TOPSEC Firewalls - Remote Exploit (ELIGIBLEBACHELOR)
  156. [webapps] - TOPSEC Firewalls - Remote Code Execution (ELIGIBLEBOMBSHELL)
  157. [webapps] - TOPSEC Firewalls - Remote Code Execution (ELIGIBLECANDIDATE)
  158. [webapps] - TOPSEC Firewalls - Remote Code Execution (ELIGIBLECONTESTANT)
  159. [local] - Cisco ASA / PIX - Privilege Escalation (EPICBANANA)
  160. [local] - WatchGuard Firewalls - ifconfig Privilege Escalation (ESCALATEPLOWMAN)
  161. [webapps] - tcPbX - (tcpbx_lang) Local File Inclusion
  162. [webapps] - MESSOA IP Cameras (Multiple Models) - Unauthenticated Password Change
  163. [webapps] - ZYCOO IP Phone System - Remote Command Execution
  164. [local] - Windows - Fileless UAC Protection Bypass Privilege Escalation (Metasploit)
  165. [webapps] - MESSOA IP-Camera NIC990 - Auth Bypass / Configuration Download
  166. [webapps] - TOSHIBA IP-Camera IK-WP41A - Auth Bypass / Configuration Download
  167. [webapps] - C2S DVR Management IRDOME-II-C2S, IRBOX-II-C2S, DVR - Credentials Disclos
  168. [webapps] - JVC IP-Camera VN-T216VPRU - Credentials Disclosure
  169. [webapps] - Vanderbilt IP-Camera CCPW3025-IR, CVMW3025-IR - Credentials Disclosure
  170. [webapps] - SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configurat
  171. [remote] - Cisco ASA 8.X - Authentication Bypass (EXTRABACON)
  172. [webapps] - Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
  173. [webapps] - SIEMENS IP Camera CCMW1025 x.2.2.1798 - Remote Admin Credentials Change
  174. [shellcode] - Windows x86 - InitiateSystemShutdownA() Shellcode (599 bytes)
  175. [dos] - Microsoft GDI+ - EMR_EXTTEXTOUTA and EMR_POLYTEXTOUTA Heap-Based Buffer Overf
  176. [webapps] - SIEMENS IP-Camera CVMS2025-IR, CCMS2025 - Credentials Disclosure
  177. [dos] - Internet Explorer - MSHTML!CMultiReadStreamLifetimeManager::ReleaseThr eadStat
  178. [webapps] - Nagios Incident Manager 2.0.0 - Multiple Vulnerabilities
  179. [webapps] - Nagios Network Analyzer 2.2.0 - Multiple Vulnerabilities
  180. [webapps] - Nagios Log Server 1.4.1 - Multiple Vulnerabilities
  181. [webapps] - Pi-Hole Web Interface 2.8.1 - Stored XSS in Whitelist/Blacklist
  182. [webapps] - Lepton CMS 2.2.0 / 2.2.1 - PHP Code Injection
  183. [webapps] - Lepton CMS 2.2.0 / 2.2.1 - Directory Traversal
  184. [shellcode] - Windows x86 - CreateProcessA cmd.exe Shellcode (253 bytes)
  185. [shellcode] - Windows x86 - MessageBoxA Shellcode (242 bytes)
  186. [papers] - [Turkish] Drupal Coder Vulnerability Analysis & MSF Module Dev
  187. [dos] - Google Chrome 26.0.1410.43 (Webkit) - OBJECT Element Use After Free PoC
  188. [webapps] - WSO2 Carbon 4.4.5 - (Denial of Service) CSRF
  189. [webapps] - WSO2 Carbon 4.4.5 - Stored XSS
  190. [webapps] - WSO2 Carbon 4.4.5 - Local File Inclusion
  191. [webapps] - WSO2 Identity Server 5.1.0 - Multiple Vulnerabilities
  192. [dos] - Microsoft Office Word 2013,2016 - sprmSdyaTop Denial of Service (MS16-099)
  193. [webapps] - Zabbix 2.2.x, 3.0.x - SQL Injection
  194. [webapps] - GitLab - "impersonate" Feature Privilege Escalation
  195. [remote] - Samsung Smart Home Camera SNH-P-6410 - Command Injection
  196. [remote] - Easy FTP Server - "APPE" Command Buffer Overflow Remote Exploit
  197. [remote] - Apache + PHP < 5.3.12 / < 5.4.2 - Remote Code Execution (Multithreaded Sca
  198. [webapps] - FreePBX 13 / 14 - Remote Code Execution
  199. [webapps] - ColoradoFTP 1.3 Prime Edition (Build 8) - Directory Traversal
  200. [local] - EyeLock Myris 3.3.2 - SDK Service Unquoted Service Path Privilege Escalatio
  201. [webapps] - vBulletin 5.2.2 - Preauth Server Side Request Forgery (SSRF)
  202. [webapps] - EyeLock nano NXT 3.5 - Local File Disclosure
  203. [webapps] - EyeLock nano NXT 3.5 - Remote Root Exploit
  204. [dos] - SAP SAPCAR - Multiple Vulnerabilities
  205. [webapps] - WebNMS Framework Server 5.2 and 5.2 SP1 - Multiple Vulnerabilities
  206. [dos] - Microsoft Office Word 2007,2010,2013,2016 - Out-of-Bounds Read Remote Code Ex
  207. [webapps] - Nagios Network Analyzer 2.2.1 - Multiple CSRF
  208. [shellcode] - Linux/x86 - zsh TCP Bind Shell Port 9090 (96 bytes)
  209. [shellcode] - Linux/x86 - zsh Reverse TCP Shellcode port 9090 (80 bytes)
  210. [webapps] - WordPress Add From Server Plugin < 3.3.2 - (File Upload) CSRF
  211. [webapps] - phpCollab CMS 2.5 - (emailusers.php) SQL Injection
  212. [local] - Microsoft Windows Group Policy - Privilege Escalation (MS16-072)
  213. [webapps] - Navis WebAccess - SQL Injection
  214. [remote] - Drupal Module Coder < 7.x-1.3 / 7.x-2.6 - Remote Code Execution Exploit (S
  215. [webapps] - NUUO NVRmini 2 3.0.8 - (strong_user.php) Backdoor Remote Shell Access
  216. [webapps] - NUUO NVRmini 2 3.0.8 - Arbitrary File Deletion
  217. [webapps] - NUUO NVRmini 2 3.0.8 - ShellShock Remote Code Execution
  218. [webapps] - NUUO NVRmini 2 3.0.8 - Multiple OS Command Injection
  219. [webapps] - NUUO NVRmini 2 3.0.8 - Local File Disclosure
  220. [webapps] - NUUO NVRmini 2 3.0.8 - (Add Admin) CSRF
  221. [webapps] - NUUO NVRmini 2 3.0.8 - Remote Root Exploit
  222. [dos] - Kodi Web Server 16.1 - Denial of Service
  223. [webapps] - NASdeluxe NDL-2400r 2.01.09 - OS Command Injection
  224. [webapps] - WordPress Count per Day Plugin 3.5.4 - Stored Cross-Site Scripting
  225. [webapps] - Davolink DV-2051 - Multiple Vulnerabilities
  226. [webapps] - PHP Power Browse 1.2 - Directory Traversal
  227. [local] - zFTP Client 20061220 - (Connection Name) Local Buffer Overflow
  228. [webapps] - Subrion CMS 4.0.5 - SQL Injection
  229. [remote] - ntop 2.3
  230. [remote] - NUUO NVRmini2 / NVRsolo / Crystal Devices and NETGEAR ReadyNAS Surveillanc
  231. [dos] - Wireshark 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 - RLC Dissector Denial of Service
  232. [dos] - Wireshark 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 - WSP Dissector Denial of Service
  233. [dos] - Wireshark 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 - PacketBB Dissector Denial of Se
  234. [dos] - Wireshark 2.0.0 to 2.0.4 - CORBA IDL Dissectors Denial of Service
  235. [dos] - Wireshark 2.0.0 to 2.0.4 - MMSE, WAP, WBXML, and WSP Dissectors Denial of Ser
  236. [dos] - Wireshark 1.12.0 to 1.12.12 - NDS Dissector Denial of Service
  237. [webapps] - Open Upload 0.4.2 - (Add Admin) CSRF
  238. [dos] - Halliburton LogView Pro 9.7.5 - (.cgm/.tif/.tiff/.tifh) Crash PoC
  239. [webapps] - WordPress WP Live Chat Support Plugin 6.2.03 - Stored XSS
  240. [webapps] - WordPress ALO EasyMail Newsletter Plugin 2.9.2 - (Add/Import Arbitrary Su
  241. [webapps] - WordPress Booking Calendar Plugin 6.2 - SQL Injection
  242. [papers] - [Hebrew] Digital Whisper Security Magazine #74
  243. [webapps] - PhpMyAdmin 4.6.2 - Post-Auth Remote Code Execution
  244. [dos] - WebKit - TypedArray.copyWithin Memory Corruption
  245. [webapps] - Trend Micro Deep Discovery 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) - hotf
  246. [shellcode] - Linux/x86 - NetCat Bind Shell with Port (44, 52 bytes)
  247. [remote] - Easy File Sharing Web Server 7.2 - SEH Overflow (Egghunter)
  248. [remote] - Barracuda Web Application Firewall 8.0.1.008 - Post Auth Remote Root Explo
  249. [remote] - Barracuda Web App Firewall 8.0.1.008/Load Balancer 5.4.0.004 - Post Auth R
  250. [shellcode] - Windows x86 - localhost Port Scanner Shellcode (556 bytes)