المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 [7] 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48

  1. [remote] Netgear DGN1000 1.1.00.48 - Setup.cgi Unauthenticated Remote Code Execution
  2. [webapps] KeystoneJS 4.0.0-beta.5 - CSV Excel Macro Injection
  3. [webapps] KeystoneJS 4.0.0-beta.5 - Cross-Site Scripting
  4. [webapps] FS Trademe Clone - 'id' SQL Injection
  5. [webapps] FS Thumbtack Clone - 'ser' SQL Injection
  6. [webapps] FS Monster Clone - 'id' SQL Injection
  7. [webapps] FS Care Clone - 'sitterService' SQL Injection
  8. [webapps] FS Realtor Clone - 'id' SQL Injection
  9. [webapps] FS Crowdfunding Script - 'id' SQL Injection
  10. [webapps] FS Shutter Stock Clone - 'keywords' SQL Injection
  11. [webapps] Mura CMS < 6.2 - Server-Side Request Forgery / XML External Entity Injectio
  12. [webapps] FS Ebay Clone - 'pd_maincat_id' Parameter SQL Injection
  13. [webapps] FS Expedia Clone - 'hid' SQL Injection
  14. [webapps] FS Groupon Clone - 'category' SQL Injection
  15. [webapps] FS Lynda Clone - 'category' SQL Injection
  16. [webapps] FS Indiamart Clone - 'keywords' SQL Injection
  17. [webapps] FS Freelancer Clone - 'sk' SQL Injection
  18. [webapps] FS Food Delivery Script - 'keywords' SQL Injection
  19. [webapps] FS Car Rental Script - 'pickup_location' Parameter SQL Injection
  20. [webapps] FS Amazon Clone - 'category_id' Parameter SQL Injection
  21. [webapps] FS OLX Clone - 'catg_id' Parameter SQL Injection
  22. [webapps] FS Book Store Script - 'category' Parameter SQL Injection
  23. [local] Mikogo 5.4.1.160608 - Local Credentials Disclosure
  24. [remote] Polycom - Command Shell Authorization Bypass (Metasploit)
  25. [remote] Unitrends UEB 9 - bpserverd Authentication Bypass Remote Command Execution (
  26. [remote] Unitrends UEB 9 - http api/storage Remote Root (Metasploit)
  27. [local] Linux Kernel 4.14.0-rc4+ - 'waitid()' Privilege Escalation
  28. [webapps] Kaltura
  29. [webapps] CometChat < 6.2.0 BETA 1 - Local File Inclusion
  30. [dos] ArGoSoft Mini Mail Server 1.0.0.2 - Denial of Service
  31. [remote] Ayukov NFTP FTP Client
  32. [webapps] TP-Link TL-MR3220 - Cross-Site Scripting
  33. [webapps] Logitech Media Server - Cross-Site Scripting
  34. [webapps] TP-Link WR940N - Authenticated Remote Code Exploit
  35. [webapps] Check_MK 1.2.8p25 - Information Disclosure
  36. [dos] Mozilla Firefox < 55 - Denial of Service
  37. [webapps] ZKTime Web Software 2.0 - Improper Access Restrictions
  38. [webapps] ZKTime Web Software 2.0 - Cross-Site Request Forgery
  39. [local] Microsoft Game Definition File Editor 6.3.9600 - XML External Entity Injectio
  40. [papers] Hacksys Extreme Vulnerable Windows Driver analysis Part 1
  41. [dos] Xen - Unbounded Recursion in Pagetable De-typing
  42. [webapps] Afian AB FileRun 2017.03.18 - Multiple Vulnerabilities
  43. [webapps] Linksys E Series - Multiple Vulnerabilities
  44. [webapps] Wordpress Plugin Car Park Booking - SQL Injection
  45. [webapps] Career Portal 1.0 - SQL Injection
  46. [dos] Linux Kernel - 'AF_PACKET' Use-After-Free
  47. [webapps] Apache Solr 7.0.1 - XML External Entity Expansion / Remote Code Execution
  48. [remote] Tomcat - Remote Code Execution via JSP Upload Bypass (Metasploit)
  49. [local] Shadowsocks - Log File Command Execution
  50. [local] shadowsocks-libev 3.1.0 - Command Execution
  51. [webapps] OpenText Documentum Content Server - Arbitrary File Download
  52. [webapps] OpenText Documentum Content Server - dmr_content Privilege Escalation
  53. [webapps] OpenText Documentum Content Server - Arbitrary File Download Privilege Esca
  54. [webapps] OpenText Documentum Content Server - Privilege Escalation
  55. [dos] Microsoft Windows - 'nt!NtQueryObject (ObjectNameInformation)' Kernel Pool Memo
  56. [dos] Microsoft Edge Chakra JIT - 'RegexHelper::StringReplace' Must Call the Callback
  57. [dos] Microsoft Edge Chakra - Accesses to Uninitialized Pointers in 'StackScriptFunct
  58. [dos] Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns
  59. [dos] Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass
  60. [remote] Apple iOS 10.2 (14C92) - Remote Code Execution
  61. [dos] Microsoft Excel - OLE Arbitrary Code Execution
  62. [dos] Microsoft Office Groove - 'Workspace Shortcut' Arbitrary Code Execution
  63. [shellcode] Windows x64 - API Hooking Shellcode (117 bytes)
  64. [webapps] 3CX Phone System 15.5.3554.1 - Directory Traversal
  65. [webapps] Trend Micro Data Loss Prevention Virtual Appliance 5.2 - Path Traversal
  66. [webapps] Webmin 1.850 - Multiple Vulnerabilities
  67. [webapps] AlienVault Unified Security Management (USM) 5.4.2 - Cross-Site Request For
  68. [webapps] phpMyFAQ 2.9.8 - Cross-Site Scripting
  69. [webapps] Dreambox Plugin BouquetEditor - Cross-Site Scripting
  70. [webapps] TYPO3 Extension Restler 1.7.0 - Local File Disclosure
  71. [remote] Sync Breeze Enterprise 10.1.16 - Buffer Overflow (SEH) (Metasploit)
  72. [webapps] E-Sic Software livre CMS - Cross Site Scripting
  73. [webapps] E-Sic Software livre CMS - 'f' Parameter SQL Injection
  74. [webapps] E-Sic Software livre CMS - 'cpfcnpj' Parameter SQL Injection
  75. [webapps] E-Sic Software livre CMS - Autentication Bypass
  76. [webapps] E-Sic Software livre CMS - 'q' Parameter SQL Injection
  77. [webapps] OctoberCMS 1.0.425 (Build 425) - Cross-Site Scripting
  78. [shellcode] Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (30 bytes)
  79. [dos] binutils 2.29.51.20170921 - 'read_1_byte' Heap-Based Buffer Overflow
  80. [local] ASX to MP3 3.1.3.7 - '.m3u' Buffer Overflow
  81. [remote] VX Search Enterprise 10.1.12 - Buffer Overflow
  82. [webapps] Trend Micro InterScan Messaging Security (Virtual Appliance) - Remote Code
  83. [webapps] Trend Micro OfficeScan 11.0/XG (12.0) - Remote Code Execution (Metasploit)
  84. [local] ASX to MP3 converter < 3.1.3.7 - Stack Overflow (DEP Bypass)
  85. [dos] IBM Notes 8.5.x/9.0.x - Denial of Service (Metasploit)
  86. [webapps] Complain Management System - Hard-Coded Credentials / Blind SQL injection
  87. [webapps] ClipShare 7.0 - SQL Injection
  88. [webapps] Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload B
  89. [remote] OrientDB 2.2.2 - 2.2.22 - Remote Code Execution (Metasploit)
  90. [remote] Rancher Server - Docker Daemon Code Execution (Metasploit)
  91. [dos] PyroBatchFTP 3.17 - Buffer Overflow (SEH)
  92. [webapps] Metasploit < 4.14.1-20170828 - Cross-Site Request Forgery
  93. [local] Microsoft Windows 10 x64 RS2 - 'win32kfull!bFill' Pool Overflow
  94. [webapps] Unitrends UEB 9.1 - Privilege Escalation
  95. [remote] Unitrends UEB 9.1 - Authentication Bypass / Remote Command Execution
  96. [remote] Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution
  97. [webapps] NETGEAR ReadyNAS Surveillance 1.4.3-16 - Remote Command Execution
  98. [dos] WebKit JSC - 'BytecodeGenerator::emitGetByVal' Incorrect Optimization (2)
  99. [webapps] ClipBucket 2.8.3 - Remote Code Execution
  100. [webapps] Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload B
  101. [remote] ERS Data System 1.8.1 - Java Deserialization
  102. [local] DiskBoss Enterprise 8.4.16 - Local Buffer Overflow
  103. [webapps] EPESI 1.8.2 rev20170830 - Cross-Site Scripting
  104. [remote] UCOPIA Wireless Appliance < 5.1 (Captive Portal) - Unauthenticated Root Remo
  105. [local] Apple Mac OS X + Safari - Local Javascript Quarantine Bypass
  106. [local] Microsoft Word 2007 (x86) - Information Disclosure
  107. [webapps] Fiberhome AN5506-04-F - Command Injection
  108. [dos] Dnsmasq < 2.78 - Integer Underflow
  109. [dos] Dnsmasq < 2.78 - Lack of free() Denial of Service
  110. [dos] Dnsmasq < 2.78 - Information Leak
  111. [dos] Dnsmasq < 2.78 - Stack-Based Overflow
  112. [dos] Dnsmasq < 2.78 - Heap-Based Overflow
  113. [dos] Dnsmasq < 2.78 - 2-byte Heap-Based Overflow
  114. [webapps] OpenText Document Sciences xPression 4.5SP1 Patch 13 - 'documentId' SQL Inj
  115. [webapps] OpenText Document Sciences xPression 4.5SP1 Patch 13 - 'jobRunId' SQL Injec
  116. [remote] Qmail SMTP - Bash Environment Variable Injection (Metasploit)
  117. [local] UCOPIA Wireless Appliance < 5.1.8 - Restricted Shell Escape
  118. [local] UCOPIA Wireless Appliance < 5.1.8 - Privilege Escalation
  119. [webapps] phpCollab 2.5.1 - SQL Injection
  120. [webapps] phpCollab 2.5.1 - Arbitrary File Upload
  121. [webapps] NPM-V (Network Power Manager) 2.4.1 - Password Reset
  122. [dos] Linux Kernel < 4.14.rc3 - Local Denial of Service
  123. [webapps] HBGK DVR 3.0.0 build20161206 - Authentication Bypass
  124. [papers] [Hebrew] Digital Whisper Security Magazine #87
  125. [remote] Sync Breeze Enterprise 10.0.28 - Buffer Overflow
  126. [webapps] ConverTo Video Downloader & Converter 1.4.1 - Arbitrary File Download
  127. [webapps] Real Estate MLM plan script 1.0 - 'srch' Parameter SQL Injection
  128. [webapps] PHP Multi Vendor Script 1.02 - 'sid' Parameter SQL Injection
  129. [webapps] WordPress Plugin WPHRM - SQL Injection
  130. [webapps] SmarterStats 11.3.6347 - Cross-Site Scripting
  131. [local] Dup Scout Enterprise 10.0.18 - 'Import Command' Buffer Overflow
  132. [webapps] FileRun
  133. [dos] Trend Micro OfficeScan 11.0/XG (12.0) - Memory Corruption
  134. [webapps] Easy Blog PHP Script 1.3a - 'id' Parameter SQL Injection
  135. [local] DiskBoss Enterprise 8.4.16 - 'Import Command' Buffer Overflow
  136. [dos] DiskBoss Enterprise 8.4.16 - Local Buffer Overflow (PoC)
  137. [webapps] Trend Micro OfficeScan 11.0/XG (12.0) - 'Host' Header Injection
  138. [webapps] Trend Micro OfficeScan 11.0/XG (12.0) - Server Side Request Forgery
  139. [webapps] Trend Micro OfficeScan 11.0/XG (12.0) - Information Disclosure
  140. [webapps] Trend Micro OfficeScan 11.0/XG (12.0) - Code Execution / Memory Corruption
  141. [webapps] Roteador Wireless Intelbras WRN150 - Autentication Bypass
  142. [papers] [eZine] i sh0t the white hat 3
  143. [papers] [eZine] i sh0t the white hat 2
  144. [papers] [eZine] i sh0t the white hat 1
  145. [papers] HackThisZine (HTZ) #7
  146. [papers] HackThisZine (HTZ) #6 - Lets Smash Windows!
  147. [papers] HackThisZine (HTZ) #4 - Ammo For The Info-Warrior
  148. [papers] HackThisZine (HTZ) #3
  149. [papers] HackThisZine (HTZ) #2
  150. [papers] HackThisZine (HTZ) #1
  151. [papers] Hack The Planet (HTP) Zine 4
  152. [papers] LabSec Industries - x0x0x exposed
  153. [papers] x0x0x #2
  154. [papers] x0x0x #1
  155. [papers] TeaMp0isoN Issue 2
  156. [papers] TeaMp0isoN Issue 1
  157. [papers] Hack The Planet (HTP) Zine 3
  158. [papers] Hack The Planet (HTP) Zine 2
  159. [papers] FUCK THEM ALL - Staminus Communications
  160. [papers] Inj3ct0r Team has hacked ExploitHub.com
  161. [papers] A day in the life of a pentester: How I owned your domain in 4 hours
  162. [remote] Cisco Prime Collaboration Provisioning < 12.1 - Authentication Bypass / Remo
  163. [remote] LAquis SCADA 4.1.0.2385 - Directory Traversal (Metasploit)
  164. [webapps] Fibaro Home Center 2 - Remote Command Execution / Privilege Escalation
  165. [papers] Phrack: VM escape - QEMU Case Study
  166. [papers] Phrack: Team Shellphish - Cyber Grand Shellphish
  167. [papers] Phrack: Attacking JavaScript Engines: A case study of JavaScriptCore and CVE
  168. [papers] Phrack #69
  169. [papers] Phrack #68
  170. [papers] Phrack #67
  171. [papers] Phrack #66
  172. [papers] Phrack #65
  173. [papers] Phrack #64
  174. [papers] Phrack #63
  175. [papers] Phrack #62
  176. [papers] Phrack #61
  177. [papers] Phrack #60
  178. [papers] Phrack #59
  179. [papers] Phrack #58
  180. [papers] Phrack #57
  181. [papers] Phrack #56
  182. [papers] Phrack #55
  183. [papers] Phrack #54
  184. [papers] Phrack #53
  185. [papers] Phrack #52
  186. [papers] Phrack #51
  187. [papers] Phrack #50
  188. [papers] Phrack #49
  189. [remote] NodeJS Debugger - Command Injection (Metasploit)
  190. [webapps] Sitefinity CMS 9.2 - Cross-Site Scripting
  191. [shellcode] Linux/x86_64 - mkdir() 'evil' Shellcode (30 bytes)
  192. [webapps] FLIR Thermal Camera F/FC/PT/D - Stream Disclosure
  193. [webapps] FLIR Thermal Camera FC-S/PT - Command Injection
  194. [remote] FLIR Thermal Camera F/FC/PT/D - SSH Backdoor
  195. [webapps] FLIR Thermal Camera F/FC/PT/D - Information Disclosure
  196. [webapps] FLIR Systems FLIR Thermal Camera PT-Series (PT-334 200562) - Root Remote Co
  197. [remote] Oracle 9i XDB 9.2.0.1 - HTTP PASS Buffer Overflow
  198. [remote] Supervisor 3.0a1 - 3.3.2 - XML-RPC Authenticated Remote Code Execution (Meta
  199. [webapps] JitBit HelpDesk
  200. [remote] Disk Pulse Enterprise 10.0.12 - GET Buffer Overflow (SEH)
  201. [local] CyberLink LabelPrint
  202. [webapps] PHP Auction Ecommerce Script 1.6 - SQL Injection
  203. [webapps] Secure E-commerce Script 1.02 - 'sid' Parameter SQL Injection
  204. [webapps] Claydip Airbnb Clone 1.0 - Arbitrary File Upload
  205. [webapps] Cash Back Comparison Script 1.0 - SQL Injection
  206. [webapps] Multi Level Marketing - SQL Injection
  207. [webapps] Lending And Borrowing - 'pid' Parameter SQL Injection
  208. [webapps] DenyAll WAF < 6.3.0 - Remote Code Execution (Metasploit)
  209. [webapps] Stock Photo Selling 1.0 - SQL Injection
  210. [remote] Disk Pulse Enterprise 9.9.16 - GET Buffer Overflow (Metasploit)
  211. [dos] Microsoft Edge Chakra - 'JavascriptFunction::ReparseAsmJsModule' Incorrectly Re
  212. [dos] Microsoft Edge Chakra - 'Parser::ParseCatch' does not Handle 'eval'
  213. [dos] Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes
  214. [dos] Microsoft Edge - Chakra Incorrectly Parses Object Patterns
  215. [dos] Linux Kernel
  216. [webapps] PHPMyFAQ 2.9.8 - Cross-Site Scripting
  217. [papers] Kernel Driver mmap Handler Exploitation
  218. [dos] Microsoft Edge 38.14393.1066.0 - 'COptionsCollectionCacheItem::GetAt' Out-of-Bo
  219. [dos] Microsoft Edge 38.14393.1066.0 - Memory Corruption with Partial Page Loading
  220. [papers] Windows and Linux Privilege Escalation
  221. [remote] HPE < 7.2 - Java Deserialization
  222. [webapps] Tecnovision DLX Spot - Arbitrary File Upload
  223. [webapps] Tecnovision DLX Spot - Authentication Bypass
  224. [remote] Tecnovision DLX Spot - SSH Backdoor
  225. [webapps] iTech Gigs Script 1.20 - 'cat' Parameter SQL Injection
  226. [webapps] Foodspotting Clone 1.0 - SQL Injection
  227. [dos] Microsoft Windows Kernel - 'win32k!NtQueryCompositionSurfaceBinding' Stack Memo
  228. [dos] Microsoft Windows Kernel - 'win32k!NtGdiDoBanding' Stack Memory Disclosure
  229. [dos] Microsoft Windows Kernel - 'win32k!NtGdiEngCreatePalette' Stack Memory Disclosu
  230. [dos] Microsoft Windows Kernel - 'win32k!NtGdiGetFontResourceInfoInternalW' Stack Mem
  231. [dos] Microsoft Windows Kernel win32k.sys TTF Font Processing - Out-of-Bounds Read wi
  232. [webapps] Apache - HTTP OPTIONS Memory Leak
  233. [dos] Microsoft Windows Kernel win32k.sys TTF Font Processing - Out-of-Bounds Reads/W
  234. [dos] Microsoft Windows Kernel - 'nt!NtSetIoCompletion / nt!NtRemoveIoCompletion' Poo
  235. [dos] Microsoft Windows Kernel - 'win32k!NtGdiGetPhysicalMonitorDescription' Stack Me
  236. [dos] Microsoft Windows Kernel - 'win32k!NtGdiGetGlyphOutline' Pool Memory Disclosure
  237. [webapps] iBall ADSL2+ Home Router - Authentication Bypass
  238. [webapps] UTStar WA3002G4 ADSL Broadband Modem - Authentication Bypass
  239. [webapps] DigiAffiliate 1.4 - Cross-Site Request Forgery (Update Admin)
  240. [webapps] Digileave 1.2 - Cross-Site Request Forgery (Update Admin)
  241. [webapps] Digirez 3.4 - Cross-Site Request Forgery (Update Admin)
  242. [local] Netdecision 5.8.2 - Local Privilege Escalation
  243. [webapps] Contact Manager 1.0 - 'femail' Parameter SQL Injection
  244. [webapps] PTCEvolution 5.50 - SQL Injection
  245. [webapps] D-Link DIR8xx Routers - Local Firmware Upload
  246. [webapps] D-Link DIR8xx Routers - Root Remote Code Execution
  247. [webapps] D-Link DIR8xx Routers - Leak Credentials
  248. [webapps] Consumer Review Script 1.0 - SQL Injection
  249. [webapps] XYZ Auto Classifieds 1.0 - SQL Injection
  250. [remote] Astaro Security Gateway 7 - Remote Code Execution