DB: 2017-11-25
1 new exploits Linksys SPA941 - \377 Character Remote Denial of Service Linksys SPA941 - '\377' Character Remote Denial of Service Caucho Resin 3.1 - \web-inf Traversal Arbitrary File Access Caucho Resin 3.1 - '/web-inf' Traversal Arbitrary File Access Google Urchin 5.7.3 - \Report.cgi' Authentication Bypass Google Urchin 5.7.3 - 'Report.cgi' Authentication Bypass Dojo Toolkit 1.4.1 - '\dijit\tests\_testCommon.js?theme' Cross-Site Scripting Dojo Toolkit 1.4.1 - 'doh\runner.html' Multiple Cross-Site Scripting Vulnerabilities Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities
This commit is contained in:
parent
d304cc3d3e
commit
66dc3007b7
1 changed files with 5 additions and 5 deletions
10
files.csv
10
files.csv
|
@ -556,7 +556,7 @@ id,file,description,date,author,platform,type,port
|
|||
3788,exploits/windows/dos/3788.html,"Second Sight Software - ActiveGS.ocx ActiveX Buffer Overflow (PoC)",2007-04-24,"Umesh Wanve",windows,dos,
|
||||
3789,exploits/windows/dos/3789.html,"Second Sight Software - ActiveMod.ocx ActiveX Buffer Overflow (PoC)",2007-04-24,"Umesh Wanve",windows,dos,
|
||||
3790,exploits/windows/dos/3790.html,"NetSprint Toolbar - ActiveX 'toolbar.dll' Denial of Service (PoC)",2007-04-24,"Umesh Wanve",windows,dos,
|
||||
3791,exploits/hardware/dos/3791.pl,"Linksys SPA941 - \377 Character Remote Denial of Service",2007-04-24,MADYNES,hardware,dos,
|
||||
3791,exploits/hardware/dos/3791.pl,"Linksys SPA941 - '\377' Character Remote Denial of Service",2007-04-24,MADYNES,hardware,dos,
|
||||
3792,exploits/hardware/dos/3792.pl,"Linksys SPA941 - Remote Reboot (Denial of Service)",2007-04-24,MADYNES,hardware,dos,
|
||||
3807,exploits/linux/dos/3807.c,"MyDNS 1.1.0 - Remote Heap Overflow (PoC)",2007-04-27,mu-b,linux,dos,
|
||||
3819,exploits/windows/dos/3819.py,"RealPlayer 10 - '.ra' Remote Denial of Service",2007-04-30,n00b,windows,dos,
|
||||
|
@ -14238,7 +14238,7 @@ id,file,description,date,author,platform,type,port
|
|||
29490,exploits/windows/remote/29490.txt,"avm fritz!dsl igd control service 2.2.29 - Directory Traversal Information Disclosure",2007-01-17,DPR,windows,remote,
|
||||
29496,exploits/linux/remote/29496.txt,"ArsDigita Community System 3.4.x - Directory Traversal",2007-01-18,"Elliot Kendall",linux,remote,
|
||||
30037,exploits/windows/remote/30037.txt,"Caucho Resin 3.1 - Encoded Space Request Full Path Disclosure",2007-05-15,"Derek Abdine",windows,remote,
|
||||
30038,exploits/windows/remote/30038.txt,"Caucho Resin 3.1 - \web-inf Traversal Arbitrary File Access",2007-05-15,"Derek Abdine",windows,remote,
|
||||
30038,exploits/windows/remote/30038.txt,"Caucho Resin 3.1 - '/web-inf' Traversal Arbitrary File Access",2007-05-15,"Derek Abdine",windows,remote,
|
||||
30043,exploits/linux/remote/30043.txt,"Sun Java JDK 1.x - Multiple Vulnerabilities",2007-05-16,"Chris Evans",linux,remote,
|
||||
30045,exploits/windows/remote/30045.html,"PrecisionID Barcode - 'PrecisionID_Barcode.dll' ActiveX 1.9 Control Arbitrary File Overwrite",2007-05-16,shinnai,windows,remote,
|
||||
30049,exploits/windows/remote/30049.html,"LeadTools MultiMedia 15 - 'Ltmm15.dll' ActiveX Control Stack Buffer Overflow",2007-05-17,shinnai,windows,remote,
|
||||
|
@ -32083,7 +32083,7 @@ id,file,description,date,author,platform,type,port
|
|||
30658,exploits/php/webapps/30658.txt,"CRS Manager - Multiple Remote File Inclusions",2007-10-11,iNs,php,webapps,
|
||||
30659,exploits/php/webapps/30659.txt,"Nucleus CMS 3.0.1 - 'index.php' Cross-Site Scripting",2007-10-11,MustLive,php,webapps,
|
||||
30660,exploits/php/webapps/30660.txt,"Scott Manktelow Design Stride 1.0 Courses - 'detail.php' Multiple SQL Injections",2007-10-11,durito,php,webapps,
|
||||
30661,exploits/cgi/webapps/30661.txt,"Google Urchin 5.7.3 - \Report.cgi' Authentication Bypass",2007-10-11,MustLive,cgi,webapps,
|
||||
30661,exploits/cgi/webapps/30661.txt,"Google Urchin 5.7.3 - 'Report.cgi' Authentication Bypass",2007-10-11,MustLive,cgi,webapps,
|
||||
30662,exploits/php/webapps/30662.txt,"Scott Manktelow Design Stride 1.0 - 'Content Management System main.php' SQL Injection",2007-10-11,durito,php,webapps,
|
||||
30663,exploits/php/webapps/30663.txt,"Linkliste 1.2 - 'index.php' Multiple Remote File Inclusions",2007-10-11,iNs,php,webapps,
|
||||
30664,exploits/php/webapps/30664.txt,"Scott Manktelow Design Stride 1.0 - 'Merchant shop.php' SQL Injection",2007-10-11,durito,php,webapps,
|
||||
|
@ -33906,8 +33906,8 @@ id,file,description,date,author,platform,type,port
|
|||
33758,exploits/asp/webapps/33758.txt,"Zigurrat Farsi CMS - '/manager/textbox.asp' SQL Injection",2010-03-15,Isfahan,asp,webapps,
|
||||
33762,exploits/php/webapps/33762.txt,"Andromeda 1.9.2 - 's' Cross-Site Scripting / Session Fixation",2010-03-15,indoushka,php,webapps,
|
||||
33763,exploits/php/webapps/33763.txt,"Domain Verkaus & Auktions Portal - 'index.php' SQL Injection",2010-03-15,"Easy Laster",php,webapps,
|
||||
33764,exploits/multiple/webapps/33764.txt,"Dojo Toolkit 1.4.1 - '\dijit\tests\_testCommon.js?theme' Cross-Site Scripting",2010-03-15,"Adam Bixby",multiple,webapps,
|
||||
33765,exploits/multiple/webapps/33765.txt,"Dojo Toolkit 1.4.1 - 'doh\runner.html' Multiple Cross-Site Scripting Vulnerabilities",2010-03-15,"Adam Bixby",multiple,webapps,
|
||||
33764,exploits/multiple/webapps/33764.txt,"Dojo Toolkit 1.4.1 - '/dijit/tests/_testCommon.js?theme' Cross-Site Scripting",2010-03-15,"Adam Bixby",multiple,webapps,
|
||||
33765,exploits/multiple/webapps/33765.txt,"Dojo Toolkit 1.4.1 - '/doh/runner.html' Multiple Cross-Site Scripting Vulnerabilities",2010-03-15,"Adam Bixby",multiple,webapps,
|
||||
33766,exploits/php/webapps/33766.txt,"Joomla! Component com_as - 'catid' SQL Injection",2010-03-16,N2n-Hacker,php,webapps,
|
||||
33787,exploits/php/webapps/33787.txt,"RepairShop2 - 'index.php?Prod' Cross-Site Scripting",2010-03-23,kaMtiEz,php,webapps,
|
||||
33769,exploits/php/webapps/33769.txt,"eFront 3.5.5 - 'langname' Local File Inclusion",2010-03-17,7Safe,php,webapps,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue