المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 [28] 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67

  1. [webapps] Doctor Patient Project 1.0 - SQL Injection
  2. [webapps] Photogallery Project 1.0 - SQL Injection
  3. [dos] Microsoft Edge 38.14393.1066.0 - 'CInputDateTimeScrollerElement::_SelectValueIn
  4. [webapps] AdvanDate iCupid Dating Software 12.2 - SQL Injection
  5. [local] Internet Download Manager 6.28 Build 17 - Buffer Overflow (SEH Unicode)
  6. [webapps] ClipBucket 2.8.3 - Multiple Vulnerabilities
  7. [local] ALLPlayer 7.4 - Buffer Overflow (SEH Unicode)
  8. [local] Xamarin Studio for Mac 6.2.1 (build 3)/6.3 (build 863) - Privilege Escalation
  9. [webapps] Quali CloudShell 7.1.0.6508 (Patch 6) - Persistent Cross Site Scripting
  10. [dos] Tomabo MP4 Converter 3.19.15 - Denial of Service
  11. [webapps] RealTime RWR-3G-100 Router - Cross-Site Request Forgery (Change Admin Passw
  12. [webapps] DeWorkshop 1.0 - SQL Injection
  13. [webapps] De-Journal 1.0 - SQL Injection
  14. [webapps] De-Tutor 1.0 - SQL Injection
  15. [dos] Microsoft Edge 38.14393.1066.0 - 'textarea.defaultValue' Memory Disclosure
  16. [webapps] Red-Gate SQL Monitor < 3.10/4.2 - Authentication Bypass
  17. [webapps] Piwigo Plugin User Tag 0.9.0 - Cross-Site Scripting
  18. [webapps] GIF Collection 2.0 - SQL Injection
  19. [webapps] ImageBay 1.0 - SQL Injection
  20. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - User Enumeration
  21. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - Cross-Site Scripting / Cross-Site
  22. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - Directory Traversal
  23. [webapps] DALIM SOFTWARE ES Core 5.0 build 7184.1 - Server-Side Request Forgery
  24. [webapps] WebFile Explorer 1.0 - Arbitrary File Download
  25. [local] Microsoft Windows 8.1 (x64) - RGNOBJ Integer Overflow (MS16-098) (2)
  26. [dos] WildMIDI 0.4.2 - Multiple Vulnerabilities
  27. [webapps] Synology Photo Station 6.7.3-3432 / 6.3-2967 - Remote Code Execution
  28. [local] Microsoft Windows 7 SP1 x86 - GDI Palette Objects Local Privilege Escalation
  29. [webapps] WordPress Plugin Easy Modal 2.0.17 - SQL Injection
  30. [local] Microsoft Windows - LNK Shortcut File Code Execution
  31. [shellcode] Linux x86 - /bin/sh Shellcode (24 bytes)
  32. [webapps] Joomla! Component StreetGuessr Game 1.1.8 - SQL Injection
  33. [local] VirtualBox 5.1.22 - Windows Process DLL Signature Bypass Privilege Escalation
  34. [local] VirtualBox 5.1.22 - Windows Process DLL UNC Path Signature Bypass Privilege E
  35. [webapps] Technicolor TC7337 - SSID Persistent Cross-Site Scripting
  36. [local] DNSTracer 1.9 - Buffer Overflow
  37. [webapps] EDUMOD Pro 1.3 - SQL Injection
  38. [webapps] Muviko 1.0 - 'q' Parameter SQL Injection
  39. [webapps] Premium Servers List Tracker 1.0 - SQL Injection
  40. [local] Nitro Pro PDF Reader 11.0.3.173 - Javascript API Remote Code Execution (Metas
  41. [webapps] Entrepreneur B2B Script - 'pid' Parameter SQL Injection
  42. [webapps] Joomla! Component Event Registration Pro Calendar 4.1.3 - SQL Injection
  43. [webapps] Joomla! Component LMS King Professional 3.2.4.0 - SQL Injection
  44. [webapps] Joomla! Component PHP-Bridge 1.2.3 - SQL Injection
  45. [webapps] Joomla! Component SIMGenealogy 2.1.5 - SQL Injection
  46. [webapps] Joomla! Component Ultimate Property Listing 1.0.2 - SQL Injection
  47. [dos] Solarwinds Kiwi Syslog 9.6.1.6 - Denial of Service
  48. [local] iOS/macOS - xpc_data Objects Sandbox Escape Privelege Escalation
  49. [webapps] SOL.Connect ISET-mpp meter 1.2.4.2 - SQL Injection
  50. [dos] libmad 0.15.1b - 'mp3' Memory Corruption
  51. [webapps] Advantech SUSIAccess
  52. [webapps] Advantech SUSIAccess
  53. [webapps] VehicleWorkshop - Authentication Bypass
  54. [webapps] VehicleWorkshop - Arbitrary File Upload
  55. [papers] [Hebrew] Digital Whisper Security Magazine #84
  56. [papers] [Hebrew] Digital Whisper Security Magazine #85
  57. [dos] DivFix++ 0.34 - Denial of Service
  58. [dos] Vorbis Tools oggenc 1.4.0 - '.wav' Denial of Service
  59. [dos] Sound eXchange (SoX) 14.4.2 - Multiple Vulnerabilities
  60. [dos] libvorbis 1.3.5 - Multiple Vulnerabilities
  61. [dos] libao 1.2.0 - Denial of Service
  62. [remote] Jenkins < 1.650 - Java Deserialization
  63. [remote] DiskBoss Enterprise 8.2.14 - Buffer Overflow
  64. [webapps] VehicleWorkshop - SQL Injection
  65. [webapps] GitHub Enterprise < 2.8.7 - Remote Code Execution
  66. [dos] SoundTouch 1.9.2 - Multiple Vulnerabilities
  67. [dos] GNU libiberty - Buffer Overflow
  68. [dos] libjpeg-turbo 1.5.1 - Denial of Service
  69. [dos] LAME 3.99.5 - Multiple Vulnerabilities
  70. [webapps] FortiOS < 5.6.0 - Cross-Site Scripting
  71. [webapps] Joomla Component CCNewsLetter 2.1.9 - 'sbid' Parameter SQL Injection
  72. [local] AudioCoder 0.8.46 - Local Buffer Overflow (SEH)
  73. [webapps] Friends in War Make or Break 1.7 - Cross-Site Request Forgery (Change Admin
  74. [local] MediaCoder 0.8.48.5888 - Local Buffer Overflow (SEH)
  75. [dos] WebKit JSC - 'ObjectPatternNode::appendEntry' Stack Use-After-Free
  76. [webapps] WebKit JSC - 'JSObject::putInlineSlow and JSValue::putToPrimitive' Universa
  77. [webapps] Friends in War Make or Break 1.7 - Authentication Bypass
  78. [local] Microsoft Windows - LNK Shortcut File Code Execution (Metasploit)
  79. [webapps] Friends in War Make or Break 1.7 - SQL Injection
  80. [webapps] PaulShop - SQL Injection / Cross-Site Scripting
  81. [dos] WebKit - 'WebCore::AccessibilityNodeObject::textUnderElemen t' Use-After-Free
  82. [dos] WebKit - 'WebCore::AccessibilityRenderObject::handleAriaExp andedChanged' Use-Af
  83. [dos] WebKit - 'WebCore::Node::nextSibling' Use-After-Free
  84. [dos] WebKit - 'WebCore::RenderSearchField::addSearchResult' Heap Buffer Overflow
  85. [dos] WebKit - 'WebCore::InputType::element' Use-After-Free
  86. [dos] WebKit - 'WebCore::RenderObject' with Accessibility Enabled Use-After-Free
  87. [dos] WebKit - 'WebCore::Node::getFlag' Use-After-Free
  88. [dos] WebKit - 'WebCore::getCachedWrapper' Use-After-Free
  89. [local] Razer Synapse 2.20.15.1104 - rzpnk.sys ZwOpenProcess (Metasploit)
  90. [remote] IPFire < 2.19 Update Core 110 - Remote Code Execution (Metasploit)
  91. [remote] VICIdial 2.9 RC 1 to 2.13 RC1 - user_authorization Unauthenticated Command E
  92. [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution
  93. [webapps] REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure
  94. [dos] WebKit JSC - 'DFG::ByteCodeParser::flush(InlineStackEntry* inlineStackEntry)' I
  95. [dos] WebKit JSC - 'arrayProtoFuncSplice' Uninitialized Memory Reference
  96. [dos] WebKit JSC - 'JSArray::appendMemcpy' Uninitialized Memory Copy
  97. [dos] WebKit JSC - 'ArgumentsEliminationPhase::transform' Incorrect LoadVarargs Handl
  98. [webapps] Barracuda Load Balancer Firmware
  99. [webapps] Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Meta
  100. [remote] Belkin NetCam F7D7601 - Multiple Vulnerabilities
  101. [webapps] Orangescrum 1.6.1 - Multiple Vulnerabilities
  102. [papers] How to exploit ETERNALROMANCE/SYNERGY on Windows Server 2016
  103. [remote] FTPGetter 5.89.0.85 - Buffer Overflow (SEH)
  104. [remote] Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution
  105. [webapps] WDTV Live SMP 2.03.20 - Remote Password Reset
  106. [local] Counter Strike: Condition Zero - '.BSP' Map File Code Execution
  107. [webapps] Apache Struts 2.3.x Showcase - Remote Code Execution (PoC)
  108. [webapps] DataTaker DT80 dEX 1.50.012 - Information Disclosure
  109. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Configuration Download
  110. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Privilege Escalation
  111. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Cross-Site Request Forger
  112. [webapps] Dasan Networks GPON ONT WiFi Router H64X Series - Authentication Bypass
  113. [papers] Hidden Network: Detecting Hidden Networks created with USB Devices
  114. [remote] Skype for Business 2016 - Cross-Site Scripting
  115. [remote] Microsoft Windows Windows 7/8.1/2008 R2/2012 R2/2016 R2 - 'EternalBlue' SMB
  116. [webapps] NfSen
  117. [webapps] Pelco VideoXpert 1.12.105 - Information Disclosure
  118. [webapps] Pelco VideoXpert 1.12.105 - Directory Traversal
  119. [local] Pelco VideoXpert 1.12.105 - Privilege Escalation
  120. [webapps] Pelco Sarix/Spectra Cameras - Remote Code Execution
  121. [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery (Enable SSH Root A
  122. [webapps] Pelco Sarix/Spectra Cameras - Cross-Site Request Forgery / Cross-Site Scrip
  123. [remote] NfSen
  124. [local] NfSen < 1.3.7 / AlienVault OSSIM < 5.3.6 - Privilege Escalation
  125. [remote] Easy File Sharing Web Server 7.2 - GET HTTP Request 'PassWD' Buffer Overflow
  126. [remote] Yaws 1.91 - Remote File Disclosure
  127. [dos] Firefox 54.0.1 - Denial of Service
  128. [dos] LibTIFF - '_TIFFVGetField (tiffsplit)' Out-of-Bounds Read
  129. [dos] LibTIFF - 'tif_jbig.c' Denial of Service
  130. [dos] LibTIFF - 'tif_dirwrite.c' Denial of Service
  131. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  132. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  133. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  134. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  135. [papers] [French] SYN FLOOD ATTACK for IP CISCO Phone
  136. [webapps] BOA Web Server 0.94.14rc21 - Arbitrary File Access
  137. [remote] BestSafe Browser - MITM Remote Code Execution
  138. [remote] eVestigator Forensic PenTester - MITM Remote Code Execution
  139. [dos] Google Chrome - Out-of-Bounds Access in RegExp Stubs
  140. [dos] LG MRA58K - 'ASFParser::SetMetaData' Stack Overflow
  141. [webapps] Humax HG100R 2.0.6 - Backup File Download
  142. [remote] ActiveMQ < 5.14.0 - Web Shell Upload (Metasploit)
  143. [remote] Veritas/Symantec Backup Exec - SSL NDMP Connection Use-After-Free (Metasploi
  144. [papers] [Spanish] How to Exploit ETERNALBLUE on Windows Server 2012 R2
  145. [papers] How to Exploit ETERNALBLUE on Windows Server 2012 R2
  146. [dos] FreeBSD - 'setrlimit' Stack Clash (PoC)
  147. [dos] FreeBSD - 'FGPE' Stack Clash (PoC)
  148. [dos] FreeBSD - 'FGPU' Stack Clash (PoC)
  149. [local] Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) -
  150. [local] Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/2
  151. [local] Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2
  152. [local] Linux Kernel - 'offset2lib' 'Stack Clash' Exploit
  153. [dos] NetBSD - 'Stack Clash' (PoC)
  154. [local] OpenBSD - 'at' Local Privilege Escalation 'Stack Clash' Exploit
  155. [local] Oracle Solaris 11.1/11.3 (RSH) - Local Privilege Escalation 'Stack Clash' Exp
  156. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  157. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  158. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  159. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  160. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  161. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  162. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  163. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  164. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  165. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  166. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  167. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  168. [remote] Lepide Auditor Suite - 'createdb()' Web Console Database Injection Remote Co
  169. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  170. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  171. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  172. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  173. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  174. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  175. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  176. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  177. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  178. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  179. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  180. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  181. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  182. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  183. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  184. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  185. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  186. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  187. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  188. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  189. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  190. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  191. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  192. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  193. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  194. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  195. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  196. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  197. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  198. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  199. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  200. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  201. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  202. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  203. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  204. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  205. [remote] GoAutoDial 3.3 - Authentication Bypass / Command Injection (Metasploit)
  206. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  207. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  208. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  209. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  210. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  211. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  212. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  213. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  214. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  215. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  216. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  217. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  218. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  219. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  220. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  221. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  222. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  223. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  224. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  225. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  226. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  227. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  228. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  229. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  230. [shellcode] Linux/x86 - Reverse TCP Shellcode (67 bytes)
  231. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  232. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  233. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  234. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  235. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  236. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  237. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  238. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  239. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  240. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  241. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  242. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  243. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  244. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  245. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  246. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  247. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  248. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  249. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution
  250. [webapps] OpenDreamBox 2.0.0 Plugin WebAdmin - Remote Code Execution