المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 [7] 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47

  1. [dos] Microsoft Edge 40.15063.0.0 Chakra - Incorrect JIT Optimization with TypedArray
  2. [dos] Microsoft Edge Chakra - 'EmitNew' Integer Overflow
  3. [dos] Microsoft Edge Chakra - Uninitialized Arguments (2)
  4. [dos] Microsoft Edge Chakra - Uninitialized Arguments
  5. [dos] Microsoft Edge Chakra - 'JavascriptFunction::EntryCall' Fails to Handle 'CallIn
  6. [dos] Microsoft Edge Chakra - 'JavascriptArray::ConcatArgs' Type Confusion
  7. [dos] Microsoft Edge Chakra - Incorrect JIT Optimization with TypedArray Setter #2
  8. [dos] Microsoft Edge Chakra - 'EmitAssignment' uses the 'this' Register Without Initi
  9. [dos] Microsoft Edge Chakra - Incorrect Usage of 'TryUndeleteProperty'
  10. [dos] Microsoft Edge Chakra - Incorrect Usage of 'PushPopFrameHelper' in 'Interpreter
  11. [dos] Microsoft Edge Chakra - 'InterpreterStackFrame::ProcessLinkFailedAsmJsModu le' I
  12. [dos] Microsoft Edge Chakra - Heap Buffer Overflow
  13. [dos] Microsoft Edge Chakra - NULL Pointer Dereference
  14. [dos] Microsoft Edge Chakra - Buffer Overflow
  15. [dos] Microsoft Edge Chakra - 'chakra!Js::GlobalObject' Integer overflow
  16. [dos] Microsoft Edge Chakra - 'PreVisitCatch' Missing Call
  17. [webapps] Online Quiz Project 1.0 - SQL Injection
  18. [webapps] Doctor Patient Project 1.0 - SQL Injection
  19. [webapps] Photogallery Project 1.0 - SQL Injection
  20. [dos] Microsoft Edge 38.14393.1066.0 - 'CInputDateTimeScrollerElement::_SelectValueIn
  21. [webapps] AdvanDate iCupid Dating Software 12.2 - SQL Injection
  22. [local] Internet Download Manager 6.28 Build 17 - Buffer Overflow (SEH Unicode)
  23. [webapps] ClipBucket 2.8.3 - Multiple Vulnerabilities
  24. [local] ALLPlayer 7.4 - Buffer Overflow (SEH Unicode)
  25. [local] Xamarin Studio for Mac 6.2.1 (build 3)/6.3 (build 863) - Privilege Escalation
  26. [webapps] Quali CloudShell 7.1.0.6508 (Patch 6) - Persistent Cross Site Scripting
  27. [dos] Tomabo MP4 Converter 3.19.15 - Denial of Service
  28. [webapps] RealTime RWR-3G-100 Router - Cross-Site Request Forgery (Change Admin Passw
  29. [webapps] DeWorkshop 1.0 - SQL Injection
  30. [webapps] De-Journal 1.0 - SQL Injection
  31. [webapps] De-Tutor 1.0 - SQL Injection
  32. [dos] Microsoft Edge 38.14393.1066.0 - 'textarea.defaultValue' Memory Disclosure
  33. [webapps] Red-Gate SQL Monitor < 3.10/4.2 - Authentication Bypass
  34. [webapps] Piwigo Plugin User Tag 0.9.0 - Cross-Site Scripting
  35. [webapps] GIF Collection 2.0 - SQL Injection
  36. [webapps] ImageBay 1.0 - SQL Injection
  37. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration
  38. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site
  39. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - Directory Traversal
  40. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - Server-Side Request Forgery
  41. [webapps] WebFile Explorer 1.0 - Arbitrary File Download
  42. [local] Microsoft Windows 8.1 (x64) - RGNOBJ Integer Overflow (MS16-098) (2)
  43. [dos] WildMIDI 0.4.2 - Multiple Vulnerabilities
  44. [webapps] Synology Photo Station 6.7.3-3432 / 6.3-2967 - Remote Code Execution
  45. [local] Microsoft Windows 7 SP1 x86 - GDI Palette Objects Local Privilege Escalation
  46. [webapps] WordPress Plugin Easy Modal 2.0.17 - SQL Injection
  47. [local] Microsoft Windows - LNK Shortcut File Code Execution
  48. [shellcode] Linux x86 - /bin/sh Shellcode (24 bytes)
  49. [webapps] Joomla! Component StreetGuessr Game 1.1.8 - SQL Injection
  50. [local] VirtualBox 5.1.22 - Windows Process DLL Signature Bypass Privilege Escalation
  51. [local] VirtualBox 5.1.22 - Windows Process DLL UNC Path Signature Bypass Privilege E
  52. [webapps] Technicolor TC7337 - SSID Persistent Cross-Site Scripting
  53. [local] DNSTracer 1.9 - Buffer Overflow
  54. [webapps] EDUMOD Pro 1.3 - SQL Injection
  55. [webapps] Muviko 1.0 - 'q' Parameter SQL Injection
  56. [webapps] Premium Servers List Tracker 1.0 - SQL Injection
  57. [local] Nitro Pro PDF Reader 11.0.3.173 - Javascript API Remote Code Execution (Metas
  58. [webapps] Entrepreneur B2B Script - 'pid' Parameter SQL Injection
  59. [webapps] Joomla! Component Event Registration Pro Calendar 4.1.3 - SQL Injection
  60. [webapps] Joomla! Component LMS King Professional 3.2.4.0 - SQL Injection
  61. [webapps] Joomla! Component PHP-Bridge 1.2.3 - SQL Injection
  62. [webapps] Joomla! Component SIMGenealogy 2.1.5 - SQL Injection
  63. [webapps] Joomla! Component Ultimate Property Listing 1.0.2 - SQL Injection
  64. [dos] Solarwinds Kiwi Syslog 9.6.1.6 - Denial of Service
  65. [local] iOS/macOS - xpc_data Objects Sandbox Escape Privelege Escalation
  66. [webapps] SOL.Connect ISET-mpp meter 1.2.4.2 - SQL Injection
  67. [dos] libmad 0.15.1b - 'mp3' Memory Corruption
  68. [webapps] Advantech SUSIAccess
  69. [webapps] Advantech SUSIAccess
  70. [webapps] VehicleWorkshop - Authentication Bypass
  71. [webapps] VehicleWorkshop - Arbitrary File Upload
  72. [papers] [Hebrew] Digital Whisper Security Magazine #84
  73. [papers] [Hebrew] Digital Whisper Security Magazine #85
  74. [dos] DivFix++ 0.34 - Denial of Service
  75. [dos] Vorbis Tools oggenc 1.4.0 - '.wav' Denial of Service
  76. [dos] Sound eXchange (SoX) 14.4.2 - Multiple Vulnerabilities
  77. [dos] libvorbis 1.3.5 - Multiple Vulnerabilities
  78. [dos] libao 1.2.0 - Denial of Service
  79. [remote] Jenkins < 1.650 - Java Deserialization
  80. [remote] DiskBoss Enterprise 8.2.14 - Buffer Overflow
  81. [webapps] VehicleWorkshop - SQL Injection
  82. [webapps] GitHub Enterprise < 2.8.7 - Remote Code Execution
  83. [dos] SoundTouch 1.9.2 - Multiple Vulnerabilities
  84. [dos] GNU libiberty - Buffer Overflow
  85. [dos] libjpeg-turbo 1.5.1 - Denial of Service
  86. [dos] LAME 3.99.5 - Multiple Vulnerabilities
  87. [webapps] FortiOS < 5.6.0 - Cross-Site Scripting
  88. [webapps] Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
  89. [local] AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
  90. [webapps] Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin
  91. [local] MediaCoder 0.8.48.5888 - Local Buffer Overflow (SEH)
  92. [dos] WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free
  93. [webapps] WebKit JSC - 'JSObject::putInlineSlow and JSValue::putToPrimitive' Universa
  94. [webapps] Friends in War Make or Break 1.7 - Authentication Bypass
  95. [local] Microsoft Windows - LNK Shortcut File Code Execution (Metasploit)
  96. [webapps] Friends in War Make or Break 1.7 - SQL Injection
  97. [webapps] PaulShop - SQL Injection / Cross-Site Scripting
  98. [dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElemen t' Use-After-Free
  99. [dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExp andedChanged' Use-Af
  100. [dos] WebKit - 'WebCore::Node::nextSibling' Use-After-Free
  101. [dos] WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
  102. [dos] WebKit - 'WebCore::InputType::element' Use-After-Free
  103. [dos] WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
  104. [dos] WebKit - 'WebCore::Node::getFlag' Use-After-Free
  105. [dos] WebKit - 'WebCore::getCachedWrapper' Use-After-Free
  106. [local] Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
  107. [remote] IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
  108. [remote] VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command E
  109. [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
  110. [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
  111. [dos] WebKit JSC - 'DFG::ByteCodeParser::flush(InlineStackEntry* inlineStackEntry)' I
  112. [dos] WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference
  113. [dos] WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy
  114. [dos] WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handl
  115. [webapps] Barracuda Load Balancer Firmware
  116. [webapps] Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Meta
  117. [remote] Belkin NetCam F7D7601 - Multiple Vulnerabilities
  118. [webapps] Orangescrum 1.6.1 - Multiple Vulnerabilities
  119. [papers] How to exploit ETERNALROMANCE/SYNERGY on Windows Server 2016
  120. [remote] FTPGetter 5.89.0.85 - Buffer Overflow (SEH)
  121. [remote] Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution
  122. [webapps] WDTV Live SMP 2.03.20 - Remote Password Reset
  123. [local] Counter Strike: Condition Zero - '.BSP' Map File Code Execution
  124. [webapps] Apache Struts 2.3.x Showcase - Remote Code Execution (PoC)
  125. [webapps] DataTaker DT80 dEX 1.50.012 - Information Disclosure
  126. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download
  127. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation
  128. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Cross-Site Request Forger
  129. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass
  130. [papers] Hidden Network: Detecting Hidden Networks created with USB Devices
  131. [remote] Skype for Business 2016 - Cross-Site Scripting
  132. [remote] Microsoft Windows Windows 7/8.1/2008 R2/2012 R2/2016 R2 - 'EternalBlue' SMB
  133. [webapps] NfSen
  134. [webapps] Pelco VideoXpert 1.12.105 - Information Disclosure
  135. [webapps] Pelco VideoXpert 1.12.105 - Directory Traversal
  136. [local] Pelco VideoXpert 1.12.105 - Privilege Escalation
  137. [webapps] Pelco Sarix/Spectra Cameras - Remote Code Execution
  138. [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery (Enable SSH Root A
  139. [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scrip
  140. [remote] NfSen
  141. [local] NfSen < 1.3.7 / AlienVault OSSIM < 5.3.6 - Privilege Escalation
  142. [remote] Easy File Sharing Web Server 7.2 - GET HTTP Request 'PassWD' Buffer Overflow
  143. [remote] Yaws 1.91 - Remote File Disclosure
  144. [dos] Firefox 54.0.1 - Denial of Service
  145. [dos] LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read
  146. [dos] LibTIFF - 'tif_jbig.c' Denial of Service
  147. [dos] LibTIFF - 'tif_dirwrite.c' Denial of Service
  148. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  149. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  150. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  151. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  152. [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
  153. [webapps] BOA Web Server 0.94.14rc21 - Arbitrary File Access
  154. [remote] BestSafe Browser - MITM Remote Code Execution
  155. [remote] eVestigator Forensic PenTester - MITM Remote Code Execution
  156. [dos] Google Chrome - Out-of-Bounds Access in RegExp Stubs
  157. [dos] LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow
  158. [webapps] Humax HG100R 2.0.6 - Backup File Download
  159. [remote] ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit)
  160. [remote] Veritas/Symantec Backup Exec - SSL NDMP Connection Use-After-Free (Metasploi
  161. [papers] [Spanish] How to Exploit ETERNALBLUE on Windows Server 2012 R2
  162. [papers] How to Exploit ETERNALBLUE on Windows Server 2012 R2
  163. [dos] FreeBSD - 'setrlimit' Stack Clash (PoC)
  164. [dos] FreeBSD - 'FGPE' Stack Clash (PoC)
  165. [dos] FreeBSD - 'FGPU' Stack Clash (PoC)
  166. [local] Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) -
  167. [local] Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/2
  168. [local] Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2
  169. [local] Linux Kernel - 'offset2lib' 'Stack Clash' Exploit
  170. [dos] NetBSD - 'Stack Clash' (PoC)
  171. [local] OpenBSD - 'at' Local Privilege Escalation 'Stack Clash' Exploit
  172. [local] Oracle Solaris 11.1/11.3 (RSH) - Local Privilege Escalation 'Stack Clash' Exp
  173. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  174. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  175. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  176. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  177. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  178. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  179. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  180. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  181. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  182. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  183. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  184. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  185. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  186. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  187. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  188. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  189. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  190. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  191. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  192. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  193. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  194. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  195. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  196. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  197. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  198. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  199. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  200. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  201. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  202. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  203. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  204. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  205. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  206. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  207. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  208. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  209. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  210. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  211. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  212. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  213. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  214. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  215. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  216. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  217. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  218. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  219. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  220. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  221. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  222. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  223. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  224. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  225. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  226. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  227. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  228. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  229. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  230. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  231. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  232. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  233. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  234. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  235. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  236. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  237. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  238. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  239. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  240. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  241. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  242. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  243. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  244. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  245. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  246. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  247. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  248. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  249. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  250. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution