المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 [12] 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68

  1. [webapps] WordPress Plugin UserPro 4.9.32 - Cross-Site Scripting
  2. [webapps] WordPress Plugin Import Export WordPress Users 1.3.1 - CSV Injection
  3. [webapps] LSoft ListServ < 16.5-2018a - Cross-Site Scripting
  4. [webapps] Nimble Streamer 3.0.2-2 < 3.5.4-9 - Directory Traversal
  5. [remote] LibreOffice < 6.2 Macro - Python Code Execution (Metasploit)
  6. [webapps] Pulse Secure 8.1R15.1/8.2/8.3/9.0 SSL VPN - Arbitrary File Disclosure (meta
  7. [webapps] WordPress Plugin 2.2.1 - Cross-Site Request Forgery
  8. [webapps] YouPHPTube 7.2 - 'userCreate.json.php' SQL Injection
  9. [webapps] Webmin 1.920 - Remote Code Execution
  10. [webapps] Neo Billing 3.5 - Persistent Cross-Site Scripting
  11. [webapps] FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure
  12. [webapps] FortiOS 5.6.3 - 5.6.7 / FortiOS 6.0.0 - 6.0.4 - Credentials Disclosure (Met
  13. [webapps] Kimai 2 - Persistent Cross-Site Scripting
  14. [dos] RAR Password Recovery 1.80 - 'User Name and Registration Code' Denial of Servic
  15. [webapps] Web Wiz Forums 12.01 - 'PF' SQL Injection
  16. [webapps] Integria IMS 5.0.86 - Arbitrary File Upload
  17. [dos] GetGo Download Manager 6.2.2.3300 - Denial of Service
  18. [webapps] Joomla! component com_jsjobs 1.2.6 - Arbitrary File Deletion
  19. [webapps] EyesOfNetwork 5.1 - Authenticated Remote Command Execution
  20. [dos] Adobe Acrobat Reader DC for Windows - Double Free due to Malformed JP2 Stream
  21. [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malform
  22. [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Memory Corruption due to Malfo
  23. [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow in CoolType.dl
  24. [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow due to Malform
  25. [dos] Adobe Acrobat Reader DC for Windows - Static Buffer Overflow due to Malformed F
  26. [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Buffer Overflow While Processi
  27. [dos] Adobe Acrobat Reader DC for Windows - Use-After-Free due to Malformed JP2 Strea
  28. [dos] Adobe Acrobat Reader DC for Windows - Heap-Based Out-of-Bounds read due to Malf
  29. [dos] Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in FixSbitSubTabl
  30. [dos] Microsoft Font Subsetting - DLL Heap Corruption in MakeFormat12MergedGlyphList
  31. [dos] Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in WriteTableFrom
  32. [dos] Microsoft Font Subsetting - DLL Heap Corruption in ReadAllocFormat12CharGlyphMa
  33. [dos] Microsoft Font Subsetting - DLL Heap Corruption in ReadTableIntoStructure
  34. [dos] Microsoft Font Subsetting - DLL Heap Corruption in FixSbitSubTables
  35. [dos] Microsoft Font Subsetting - DLL Double Free in MergeFormat12Cmap / MakeFormat12
  36. [dos] Microsoft Font Subsetting - DLL Heap-Based Out-of-Bounds read in GetGlyphIdx
  37. [dos] Adobe Acrobat CoolType (AFDKO) - Call from Uninitialized Memory due to Empty FD
  38. [dos] Adobe Acrobat CoolType (AFDKO) - Memory Corruption in the Handling of Type 1 Fo
  39. [local] Microsoft Windows Text Services Framework MSCTF - Multiple Vulnerabilities
  40. [dos] NSKeyedUnarchiver - Info Leak in Decoding SGBigUTF8String
  41. [remote] Agent Tesla Botnet - Arbitrary Code Execution (Metasploit)
  42. [webapps] ManageEngine opManager 12.3.150 - Authenticated Code Execution
  43. [dos] ABC2MTEX 1.6.1 - Command Line Stack Overflow
  44. [local] Microsoft Windows 10 AppXSvc Deployment Service - Arbitrary File Deletion
  45. [webapps] TortoiseSVN 1.12.1 - Remote Code Execution
  46. [webapps] WordPress Plugin Download Manager 2.5 - Cross-Site Request Forgery
  47. [webapps] D-Link DIR-600M - Authentication Bypass (Metasploit)
  48. [webapps] Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'customfields.php' SQL Injec
  49. [dos] Windows PowerShell - Unsanitized Filename Command Execution
  50. [webapps] SugarCRM Enterprise 9.0.0 - Cross-Site Scripting
  51. [webapps] Mitsubishi Electric smartRTU / INEA ME-RTU - Unauthenticated OS Command Inj
  52. [webapps] Mitsubishi Electric smartRTU / INEA ME-RTU - Unauthenticated Configuration
  53. [remote] Azorult Botnet - SQL Injection
  54. [remote] Agent Tesla Botnet - Arbitrary Code Execution
  55. [local] Steam Windows Client - Local Privilege Escalation
  56. [dos] WebKit - UXSS via XSLT and Nested Document Replacements
  57. [dos] Linux - Use-After-Free Reads in show_numa_stats()
  58. [webapps] Joomla! Component JS Jobs (com_jsjobs) 1.2.5 - 'cities.php' SQL Injection
  59. [local] Ghidra (Linux) 9.0.4 - .gar Arbitrary Code Execution
  60. [remote] Webmin 1.920 - Unauthenticated Remote Code Execution (Metasploit)
  61. [remote] ManageEngine OpManager 12.4x - Unauthenticated Remote Command Execution (Met
  62. [remote] ManageEngine Application Manager 14.2 - Privilege Escalation / Remote Comman
  63. [remote] ManageEngine OpManager 12.4x - Privilege Escalation / Remote Command Executi
  64. [webapps] osTicket 1.12 - Persistent Cross-Site Scripting
  65. [webapps] osTicket 1.12 - Formula Injection
  66. [webapps] osTicket 1.12 - Persistent Cross-Site Scripting via File Upload
  67. [webapps] Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticket.p
  68. [webapps] Joomla! Component JS Support Ticket (com_jssupportticket) 1.1.6 - 'ticketre
  69. [webapps] UNA 10.0.0 RC1 - 'polyglot.php' Persistent Cross-Site Scripting
  70. [webapps] Cisco Adaptive Security Appliance - Path Traversal (Metasploit)
  71. [webapps] BSI Advance Hotel Booking System 2.0 - 'booking_details.php Persistent Cros
  72. [webapps] Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 -
  73. [webapps] Adive Framework 2.0.7 - Cross-Site Request Forgery
  74. [webapps] Joomla! Component JS Support Ticket (component com_jssupportticket) 1.1.5 -
  75. [remote] Baldr Botnet Panel - Arbitrary Code Execution (Metasploit)
  76. [webapps] Aptana Jaxer 1.0.3.4547 - Local File inclusion
  77. [webapps] Daily Expense Manager 1.0 - Cross-Site Request Forgery (Delete Income)
  78. [webapps] Open-School 3.0 / Community Edition 2.3 - Cross-Site Scripting
  79. [dos] Google Chrome 74.0.3729.0 / 76.0.3789.0 - Heap Use-After-Free in blink::Present
  80. [webapps] WordPress Plugin JoomSport 3.3 - SQL Injection
  81. [remote] ARMBot Botnet - Arbitrary Code Execution
  82. [remote] Apache Tika 1.15 - 1.17 - Header Command Injection (Metasploit)
  83. [dos] macOS iMessage - Heap Overflow when Deserializing
  84. [webapps] 1CRM On-Premise Software 8.5.7 - Persistent Cross-Site Scripting
  85. [webapps] Rest - Cafe and Restaurant Website CMS - 'slug' SQL Injection
  86. [webapps] Sar2HTML 3.2.1 - Remote Command Execution
  87. [webapps] Cisco Catalyst 3850 Series Device Manager - Cross-Site Request Forgery
  88. [webapps] WebIncorp ERP - SQL injection
  89. [webapps] Ultimate Loan Manager 2.0 - Cross-Site Scripting
  90. [webapps] Oracle Hyperion Planning 11.1.2.3 - XML External Entity
  91. [remote] Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit)
  92. [dos] iMessage - NSKeyedUnarchiver Deserialization Allows file Backed NSData Objects
  93. [dos] iMessage - Memory Corruption when Decoding NSKnownKeysDictionary1
  94. [dos] iMessage - NSArray Deserialization can Invoke Subclass that does not Retain Ref
  95. [dos] macOS / iOS NSKeyedUnarchiver - Use-After-Free of ObjC Objects when Unarchiving
  96. [dos] macOS / iOS JavaScriptCore - JSValue Use-After-Free in ValueProfiles
  97. [dos] macOS / iOS JavaScriptCore - Loop-Invariant Code Motion (LICM) Leaves Object Pr
  98. [webapps] Amcrest Cameras 2.520.AC00.18.R - Unauthenticated Audio Streaming
  99. [remote] WP Database Backup < 5.2 - Remote Code Execution (Metasploit)
  100. [remote] Schneider Electric Pelco Endura NET55XX Encoder - Authentication Bypass (Met
  101. [webapps] GigToDo 1.3 - Cross-Site Scripting
  102. [webapps] WordPress Theme Real Estate 2.8.9 - Cross-Site Scripting
  103. [webapps] WordPress Plugin Simple Membership < 3.8.5 - Cross-Site Request Forgery
  104. [webapps] Ahsay Backup 7.x - 8.1.1.50 - XML External Entity Injection
  105. [webapps] Ahsay Backup 7.x - 8.1.1.50 - Authenticated Arbitrary File Upload / Remote
  106. [webapps] Ahsay Backup 7.x - 8.1.1.50 - Authenticated Arbitrary File Upload / Remote
  107. [dos] pdfresurrect 0.15 - Buffer Overflow
  108. [webapps] Moodle Filepicker 3.5.2 - Server Side Request Forgery
  109. [local] Microsoft Windows 7 build 7601 (x86) - Local Privilege Escalation
  110. [local] Deepin Linux 15 - 'lastore-daemon' Local Privilege Escalation
  111. [local] ASAN/SUID - Local Privilege Escalation
  112. [local] Serv-U FTP Server < 15.1.7 - Local Privilege Escalation (2)
  113. [local] S-nail < 14.8.16 - Local Privilege Escalation
  114. [local] VMware Workstation/Player < 12.5.5 - Local Privilege Escalation
  115. [local] Linux Kernel 4.4.0-21 < 4.4.0-51 (Ubuntu 14.04/16.04 x86-64) - 'AF_PACKET' Ra
  116. [local] Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin)
  117. [local] Linux Kernel 4.8.0-34 < 4.8.0-45 (Ubuntu / Linux Mint) - Packet Socket Local
  118. [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
  119. [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
  120. [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
  121. [local] Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Es
  122. [local] Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalati
  123. [dos] WebKit - Universal Cross-Site Scripting due to Synchronous Page Loads
  124. [webapps] Ovidentia 8.4.3 - SQL Injection
  125. [webapps] Ovidentia 8.4.3 - Cross-Site Scripting
  126. [dos] Apple iMessage - DigitalTouch tap Message Processing Out-of-Bounds Read
  127. [remote] Trend Micro Deep Discovery Inspector IDS - Security Bypass
  128. [webapps] WordPress Plugin Hybrid Composer 1.4.6 - Improper Access Restrictions
  129. [webapps] Cisco Wireless Controller 3.6.10E - Cross-Site Request Forgery
  130. [webapps] NoviSmart CMS - SQL injection
  131. [webapps] Axway SecureTransport 5 - Unauthenticated XML Injection
  132. [local] Comtrend-AR-5310 - Restricted Shell Escape
  133. [dos] BACnet Stack 0.8.6 - Denial of Service
  134. [local] Docker - Container Escape
  135. [webapps] REDCap < 9.1.2 - Cross-Site Scripting
  136. [webapps] Web Ofisi Firma 13 - 'oz' SQL Injection
  137. [webapps] Web Ofisi Rent a Car 3 - 'klima' SQL Injection
  138. [webapps] Web Ofisi Firma Rehberi 1 - 'il' SQL Injection
  139. [webapps] Web Ofisi Emlak 3 - 'emlak_durumu' SQL Injection
  140. [webapps] Web Ofisi Emlak 2 - 'ara' SQL Injection
  141. [webapps] Web Ofisi Platinum E-Ticaret 5 - 'q' SQL Injection
  142. [webapps] Web Ofisi E-Ticaret 3 - 'a' SQL Injection
  143. [webapps] fuelCMS 1.4.1 - Remote Code Execution
  144. [remote] MAPLE Computer WBT SNMP Administrator 2.0.195.15 - Remote Buffer Overflow (E
  145. [webapps] WordPress Plugin OneSignal 1.17.5 - 'subdomain' Persistent Cross-Site Scrip
  146. [local] Microsoft Windows 10 1903/1809 - RPCSS Activation Kernel Security Callback Pr
  147. [local] Windows - NtUserSetWindowFNID Win32k User Callback Privilege Escalation (Meta
  148. [local] Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME
  149. [webapps] Oracle Siebel CRM 19.0 - Persistent Cross-Site Scripting
  150. [dos] WinMPG iPod Convert 3.0 - 'Register' Denial of Service
  151. [remote] MAPLE Computer WBT SNMP Administrator 2.0.195.15 - Remote Buffer Overflow
  152. [remote] PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Com
  153. [local] Microsoft Windows 10 < build 17763 - AppXSvc Hard Link Privilege Escalation (
  154. [dos] Microsoft Compiled HTML Help / Uncompiled .chm File - XML External Entity Injec
  155. [local] DameWare Remote Support 12.0.0.509 - 'Host' Buffer Overflow (SEH)
  156. [webapps] CentOS Control Web Panel 0.9.8.838 - User Enumeration
  157. [webapps] CentOS Control Web Panel 0.9.8.836 - Privilege Escalation
  158. [webapps] CentOS Control Web Panel 0.9.8.836 - Authentication Bypass
  159. [local] R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass)
  160. [webapps] FlightPath < 4.8.2 / < 5.0-rc2 - Local File Inclusion
  161. [dos] Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
  162. [dos] Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write
  163. [webapps] CISCO Small Business 200 / 300 / 500 Switches - Multiple Vulnerabilities
  164. [webapps] NETGEAR WiFi Router JWNR2010v5 / R6080 - Authentication Bypass
  165. [local] Streamripper 2.6 - 'Song Pattern' Buffer Overflow
  166. [local] Microsoft Windows 10.0.17134.648 - HTTP -> SMB NTLM Reflection Leads to Privi
  167. [remote] Xymon 4.3.25 - useradm Command Execution (Metasploit)
  168. [dos] Microsoft Font Subsetting - DLL Heap Corruption in ComputeFormat4CmapData
  169. [webapps] Citrix SD-WAN Appliance 10.2.2 - Authentication Bypass / Remote Command Exe
  170. [webapps] Jenkins Dependency Graph View Plugin 0.13 - Persistent Cross-Site Scripting
  171. [webapps] Sahi Pro 8.0.0 - Remote Command Execution
  172. [webapps] MyT Project Management 1.5.1 - User[username] Persistent Cross-Site Scripti
  173. [webapps] Tenda D301 v2 Modem Router - Persistent Cross-Site Scripting
  174. [webapps] Sitecore 9.0 rev 171002 - Persistent Cross-Site Scripting
  175. [local] SNMPc Enterprise Edition 9/10 - Mapping Filename Buffer Overflow
  176. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType
  177. [dos] Microsoft DirectWrite / AFDKO - Multiple Bugs in OpenType Font Handling Related
  178. [dos] Microsoft DirectWrite / AFDKO - Out-of-Bounds Read in OpenType Font Handling Du
  179. [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Whil
  180. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
  181. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Out-of-Bounds Read/Write in OpenType
  182. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow Due to Integer Overf
  183. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
  184. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
  185. [dos] Microsoft DirectWrite / AFDKO - Heap-Based Buffer Overflow in OpenType Font Han
  186. [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due
  187. [dos] Microsoft DirectWrite / AFDKO - Interpreter Stack Underflow in OpenType Font Ha
  188. [dos] Microsoft DirectWrite / AFDKO - Use of Uninitialized Memory While Freeing Resou
  189. [dos] Microsoft DirectWrite / AFDKO - Stack-Based Buffer Overflow in do_set_weight_ve
  190. [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due
  191. [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling Due
  192. [dos] Microsoft DirectWrite / AFDKO - Stack Corruption in OpenType Font Handling due
  193. [dos] Microsoft Windows - Font Subsetting DLL Heap-Based Out-of-Bounds Read in MergeF
  194. [dos] Mozilla Spidermonkey - Unboxed Objects Uninitialized Memory Access
  195. [remote] Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow (2)
  196. [dos] Firefox 67.0.4 - Denial of Service
  197. [webapps] WordPress Plugin Like Button 1.6.0 - Authentication Bypass
  198. [webapps] Karenderia Multiple Restaurant System 5.3 - SQL Injection
  199. [remote] Microsoft Exchange 2003 - base64-MIME Remote Code Execution
  200. [webapps] Karenderia Multiple Restaurant System 5.3 - Local File Inclusion
  201. [remote] Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (Met
  202. [local] Serv-U FTP Server - prepareinstallation Privilege Escalation (Metasploit)
  203. [webapps] Symantec DLP 15.5 MP1 - Cross-Site Scripting
  204. [local] Mac OS X TimeMachine - (tmdiagnose) Command Injection Privilege Escalation (M
  205. [webapps] Centreon 19.04 - Remote Code Execution
  206. [shellcode] Linux/x86 - execve /bin/sh using JMP-CALL-POP Shellcode (21 bytes)
  207. [remote] FaceSentry Access Control System 6.4.8 - Remote SSH Root
  208. [webapps] FaceSentry Access Control System 6.4.8 - Remote Root Exploit
  209. [webapps] FaceSentry Access Control System 6.4.8 - Cross-Site Request Forgery
  210. [webapps] FaceSentry Access Control System 6.4.8 - Remote Command Injection
  211. [webapps] CyberPanel 1.8.4 - Cross-Site Request Forgery
  212. [webapps] Sahi pro 8.x - Directory Traversal
  213. [webapps] SAP Crystal Reports - Information Disclosure
  214. [webapps] ZoneMinder 1.32.3 - Cross-Site Scripting
  215. [webapps] PowerPanel Business Edition - Cross-Site Scripting
  216. [webapps] Varient 1.6.1 - SQL Injection
  217. [shellcode] Linux/ARM64 - execve("/bin/sh", ["/bin/sh"], NULL) Shellcode (48 Bytes)
  218. [shellcode] Linux/ARM64 - Jump Back Shellcode + execve("/bin/sh", NULL, NULL) Shellco
  219. [shellcode] Linux/ARM64 - mmap() + read() stager + execve("/bin/sh", NULL, NULL) Shel
  220. [shellcode] Linux/ARM64 - Egghunter (PWN!PWN!) + execve("/bin/sh", NULL, NULL) + mpro
  221. [shellcode] Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
  222. [shellcode] Linux/ARM64 - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (140
  223. [shellcode] Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes
  224. [shellcode] Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Sh
  225. [shellcode] Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164
  226. [shellcode] Linux/ARM64 - execve("/bin/sh", NULL, NULL) Shellcode (40 Bytes)
  227. [remote] Linux Mint 18.3-19.1 - 'yelp' Command Injection (Metasploit)
  228. [webapps] CiuisCRM 1.6 - 'eventType' SQL Injection
  229. [webapps] WorkSuite PRM 2.4 - 'password' SQL Injection
  230. [webapps] LibreNMS 1.46 - 'addhost' Remote Code Execution
  231. [shellcode] Linux/x86 - Chmod + Execute (/usr/bin/wget http://192.168.1.93//x) + Hide
  232. [shellcode] Windows/x86 - Start iexplore.exe (http://192.168.10.10/) Shellcode (191 B
  233. [shellcode] Windows/x86 - bitsadmin Download and Execute (http://192.168.10.10/evil.e
  234. [shellcode] Linux/x86 - ASCII AND, SUB, PUSH, POPAD Encoder Shellcode
  235. [remote] Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)
  236. [dos] Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
  237. [webapps] WordPress Plugin Live Chat Unlimited 2.8.3 - Cross-Site Scripting
  238. [webapps] WordPress Plugin iLive 1.0.4 - Cross-Site Scripting
  239. [webapps] BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal
  240. [webapps] AZADMIN CMS 1.0 - SQL Injection
  241. [webapps] Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution
  242. [papers] Buffer Overflows, C Programming, NSA GHIDRA and More
  243. [remote] SAPIDO RB-1732 - Remote Command Execution
  244. [remote] SuperDoctor5 - 'NRPE' Remote Code Execution
  245. [dos] Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation
  246. [dos] Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory C
  247. [webapps] GrandNode 4.40 - Path Traversal / Arbitrary File Download
  248. [dos] GSearch 1.0.1.0 - Denial of Service (PoC)
  249. [shellcode] Linux/x86_64 - Reverse(0.0.0.0:4444/TCP) Shell (/bin/sh) Shellcode
  250. [webapps] SeedDMS < 5.1.11 - 'out.GroupMgr.php' Cross-Site Scripting