DB: 2016-03-19
This commit is contained in:
parent
2af7b4dfb6
commit
95bca4864b
5 changed files with 122 additions and 126 deletions
244
files.csv
244
files.csv
|
@ -133,7 +133,7 @@ id,file,description,date,author,platform,type,port
|
||||||
135,platforms/windows/remote/135.c,"Microsoft Windows Messenger Service Remote Exploit FR (MS03-043)",2003-12-16,MrNice,windows,remote,135
|
135,platforms/windows/remote/135.c,"Microsoft Windows Messenger Service Remote Exploit FR (MS03-043)",2003-12-16,MrNice,windows,remote,135
|
||||||
136,platforms/windows/remote/136.pl,"Eznet 3.5.0 - Remote Stack Overflow Universal Exploit",2003-12-18,kralor,windows,remote,80
|
136,platforms/windows/remote/136.pl,"Eznet 3.5.0 - Remote Stack Overflow Universal Exploit",2003-12-18,kralor,windows,remote,80
|
||||||
137,platforms/php/webapps/137.pl,"phpBB 2.0.6 - search_id SQL Injection MD5 Hash Remote Exploit",2003-12-21,RusH,php,webapps,0
|
137,platforms/php/webapps/137.pl,"phpBB 2.0.6 - search_id SQL Injection MD5 Hash Remote Exploit",2003-12-21,RusH,php,webapps,0
|
||||||
138,platforms/php/webapps/138.pl,"PHP-NUKE <= 6.9 - 'cid' SQL Injection Remote Exploit",2003-12-21,RusH,php,webapps,0
|
138,platforms/php/webapps/138.pl,"PHP-Nuke <= 6.9 - 'cid' SQL Injection Remote Exploit",2003-12-21,RusH,php,webapps,0
|
||||||
139,platforms/linux/remote/139.c,"Cyrus IMSPD 1.7 - abook_dbname Remote Root Exploit",2003-12-27,SpikE,linux,remote,406
|
139,platforms/linux/remote/139.c,"Cyrus IMSPD 1.7 - abook_dbname Remote Root Exploit",2003-12-27,SpikE,linux,remote,406
|
||||||
140,platforms/linux/local/140.c,"Xsok 1.02 - _-xsokdir_ Local Buffer Overflow Game Exploit",2004-01-02,c0wboy,linux,local,0
|
140,platforms/linux/local/140.c,"Xsok 1.02 - _-xsokdir_ Local Buffer Overflow Game Exploit",2004-01-02,c0wboy,linux,local,0
|
||||||
141,platforms/linux/local/141.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - _do_mremap_ Local Proof of Concept (1)",2004-01-06,"Christophe Devine",linux,local,0
|
141,platforms/linux/local/141.c,"Linux Kernel <= 2.4.23 / <= 2.6.0 - _do_mremap_ Local Proof of Concept (1)",2004-01-06,"Christophe Devine",linux,local,0
|
||||||
|
@ -1369,7 +1369,7 @@ id,file,description,date,author,platform,type,port
|
||||||
1627,platforms/php/webapps/1627.php,"Claroline <= 1.7.4 (scormExport.inc.php) Remote Code Execution Exploit",2006-03-30,rgod,php,webapps,0
|
1627,platforms/php/webapps/1627.php,"Claroline <= 1.7.4 (scormExport.inc.php) Remote Code Execution Exploit",2006-03-30,rgod,php,webapps,0
|
||||||
1628,platforms/windows/remote/1628.cpp,"Microsoft Internet Explorer (createTextRang) Download Shellcoded Exploit (2)",2006-03-31,ATmaCA,windows,remote,0
|
1628,platforms/windows/remote/1628.cpp,"Microsoft Internet Explorer (createTextRang) Download Shellcoded Exploit (2)",2006-03-31,ATmaCA,windows,remote,0
|
||||||
1629,platforms/php/webapps/1629.pl,"SQuery <= 4.5 (libpath) Remote File Inclusion Exploit",2006-04-01,uid0,php,webapps,0
|
1629,platforms/php/webapps/1629.pl,"SQuery <= 4.5 (libpath) Remote File Inclusion Exploit",2006-04-01,uid0,php,webapps,0
|
||||||
1630,platforms/php/webapps/1630.pl,"PHPNuke-Clan 3.0.1 (vwar_root2) Remote File Inclusion Exploit",2006-04-01,uid0,php,webapps,0
|
1630,platforms/php/webapps/1630.pl,"PHPNuke-Clan 3.0.1 - (vwar_root2) Remote File Inclusion Exploit",2006-04-01,uid0,php,webapps,0
|
||||||
1631,platforms/php/webapps/1631.php,"ReloadCMS <= 1.2.5 - Cross-Site Scripting / Remote Code Execution Exploit",2006-04-02,rgod,php,webapps,0
|
1631,platforms/php/webapps/1631.php,"ReloadCMS <= 1.2.5 - Cross-Site Scripting / Remote Code Execution Exploit",2006-04-02,rgod,php,webapps,0
|
||||||
1632,platforms/php/webapps/1632.pl,"VWar 1.5.0 R12 - Remote File Inclusion Exploit",2006-04-02,uid0,php,webapps,0
|
1632,platforms/php/webapps/1632.pl,"VWar 1.5.0 R12 - Remote File Inclusion Exploit",2006-04-02,uid0,php,webapps,0
|
||||||
1633,platforms/windows/dos/1633.c,"Total Commander 6.x - (unacev2.dll) Buffer Overflow PoC Exploit",2006-04-02,darkeagle,windows,dos,0
|
1633,platforms/windows/dos/1633.c,"Total Commander 6.x - (unacev2.dll) Buffer Overflow PoC Exploit",2006-04-02,darkeagle,windows,dos,0
|
||||||
|
@ -1447,7 +1447,7 @@ id,file,description,date,author,platform,type,port
|
||||||
1724,platforms/php/webapps/1724.pl,"TopList <= 1.3.8 (phpBB Hack) Remote Inclusion Exploit",2006-04-28,FOX_MULDER,php,webapps,0
|
1724,platforms/php/webapps/1724.pl,"TopList <= 1.3.8 (phpBB Hack) Remote Inclusion Exploit",2006-04-28,FOX_MULDER,php,webapps,0
|
||||||
1725,platforms/php/webapps/1725.pl,"Advanced GuestBook <= 2.4.0 (phpBB) Remote File Inclusion Exploit",2006-04-28,n0m3rcy,php,webapps,0
|
1725,platforms/php/webapps/1725.pl,"Advanced GuestBook <= 2.4.0 (phpBB) Remote File Inclusion Exploit",2006-04-28,n0m3rcy,php,webapps,0
|
||||||
1726,platforms/php/webapps/1726.pl,"Invision Power Board <= 2.1.5 - search.php Remote Code Execution Exploit",2006-04-29,"Javier Olascoaga",php,webapps,0
|
1726,platforms/php/webapps/1726.pl,"Invision Power Board <= 2.1.5 - search.php Remote Code Execution Exploit",2006-04-29,"Javier Olascoaga",php,webapps,0
|
||||||
1727,platforms/php/webapps/1727.txt,"openphpnuke <= 2.3.3 - Remote File Inclusion Vulnerability",2006-04-29,[Oo],php,webapps,0
|
1727,platforms/php/webapps/1727.txt,"openPHPNuke <= 2.3.3 - Remote File Inclusion Vulnerability",2006-04-29,[Oo],php,webapps,0
|
||||||
1728,platforms/php/webapps/1728.txt,"Knowledge Base Mod <= 2.0.2 (phpBB) Remote Inclusion Vulnerability",2006-04-29,[Oo],php,webapps,0
|
1728,platforms/php/webapps/1728.txt,"Knowledge Base Mod <= 2.0.2 (phpBB) Remote Inclusion Vulnerability",2006-04-29,[Oo],php,webapps,0
|
||||||
1729,platforms/php/webapps/1729.txt,"Limbo CMS <= 1.0.4.2 (sql.php) Remote File Inclusion Vulnerability",2006-04-29,[Oo],php,webapps,0
|
1729,platforms/php/webapps/1729.txt,"Limbo CMS <= 1.0.4.2 (sql.php) Remote File Inclusion Vulnerability",2006-04-29,[Oo],php,webapps,0
|
||||||
1730,platforms/php/webapps/1730.txt,"Aardvark Topsites PHP <= 4.2.2 - (path) Remote File Inclusion Vuln",2006-04-30,[Oo],php,webapps,0
|
1730,platforms/php/webapps/1730.txt,"Aardvark Topsites PHP <= 4.2.2 - (path) Remote File Inclusion Vuln",2006-04-30,[Oo],php,webapps,0
|
||||||
|
@ -2683,7 +2683,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3007,platforms/php/webapps/3007.txt,"Irokez CMS <= 0.7.1 - Multiple Remote File Include Vulnerabilities",2006-12-25,nuffsaid,php,webapps,0
|
3007,platforms/php/webapps/3007.txt,"Irokez CMS <= 0.7.1 - Multiple Remote File Include Vulnerabilities",2006-12-25,nuffsaid,php,webapps,0
|
||||||
3008,platforms/php/webapps/3008.pl,"Ciberia Content Federator <= 1.0.1 (path) Remote File Include Exploit",2006-12-25,DeltahackingTEAM,php,webapps,0
|
3008,platforms/php/webapps/3008.pl,"Ciberia Content Federator <= 1.0.1 (path) Remote File Include Exploit",2006-12-25,DeltahackingTEAM,php,webapps,0
|
||||||
3009,platforms/php/webapps/3009.txt,"Shadowed Portal Module Character Roster (mod_root) RFI Vulnerability",2006-12-25,"Mehmet Ince",php,webapps,0
|
3009,platforms/php/webapps/3009.txt,"Shadowed Portal Module Character Roster (mod_root) RFI Vulnerability",2006-12-25,"Mehmet Ince",php,webapps,0
|
||||||
3010,platforms/php/webapps/3010.txt,"myphpNuke Module My_eGallery 2.5.6 (basepath) RFI Vulnerability",2006-12-25,"Mehmet Ince",php,webapps,0
|
3010,platforms/php/webapps/3010.txt,"myPHPNuke Module My_eGallery 2.5.6 - (basepath) RFI Vulnerability",2006-12-25,"Mehmet Ince",php,webapps,0
|
||||||
3011,platforms/php/webapps/3011.pl,"Fishyshoop <= 0.930b Remote Add Administrator Account Exploit",2006-12-25,"James Gray",php,webapps,0
|
3011,platforms/php/webapps/3011.pl,"Fishyshoop <= 0.930b Remote Add Administrator Account Exploit",2006-12-25,"James Gray",php,webapps,0
|
||||||
3012,platforms/php/webapps/3012.txt,"Okul Merkezi Portal 1.0 (ataturk.php) Remote File Include Vulnerability",2006-12-25,ShaFuck31,php,webapps,0
|
3012,platforms/php/webapps/3012.txt,"Okul Merkezi Portal 1.0 (ataturk.php) Remote File Include Vulnerability",2006-12-25,ShaFuck31,php,webapps,0
|
||||||
3013,platforms/windows/dos/3013.py,"Microsoft Windows NetrWkstaUserEnum() Remote DoS Exploit (0day)",2006-12-25,h07,windows,dos,0
|
3013,platforms/windows/dos/3013.py,"Microsoft Windows NetrWkstaUserEnum() Remote DoS Exploit (0day)",2006-12-25,h07,windows,dos,0
|
||||||
|
@ -3105,7 +3105,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3437,platforms/asp/webapps/3437.txt,"GaziYapBoz Game Portal (kategori.asp) Remote SQL Injection Vuln",2007-03-08,CyberGhost,asp,webapps,0
|
3437,platforms/asp/webapps/3437.txt,"GaziYapBoz Game Portal (kategori.asp) Remote SQL Injection Vuln",2007-03-08,CyberGhost,asp,webapps,0
|
||||||
3438,platforms/php/webapps/3438.txt,"Magic CMS 4.2.747 (mysave.php file) Remote File Include Vulnerability",2007-03-08,DNX,php,webapps,0
|
3438,platforms/php/webapps/3438.txt,"Magic CMS 4.2.747 (mysave.php file) Remote File Include Vulnerability",2007-03-08,DNX,php,webapps,0
|
||||||
3439,platforms/windows/local/3439.php,"PHP 4.4.6 snmpget() object id Local Buffer Overflow Exploit PoC",2007-03-09,rgod,windows,local,0
|
3439,platforms/windows/local/3439.php,"PHP 4.4.6 snmpget() object id Local Buffer Overflow Exploit PoC",2007-03-09,rgod,windows,local,0
|
||||||
3440,platforms/linux/local/3440.php,"PHP 5.2.0 / PHP with PECL ZIP <= 1.8.3 zip:// URL Wrapper BoF Exploit",2007-03-09,"Stefan Esser",linux,local,0
|
3440,platforms/linux/local/3440.php,"PHP 5.2.0 / PHP with PECL ZIP <= 1.8.3 - zip:// URL Wrapper BoF Exploit",2007-03-09,"Stefan Esser",linux,local,0
|
||||||
3441,platforms/linux/dos/3441.c,"Linux Omnikey Cardman 4040 Driver - Local Buffer Overflow Exploit PoC",2007-03-09,"Daniel Roethlisberger",linux,dos,0
|
3441,platforms/linux/dos/3441.c,"Linux Omnikey Cardman 4040 Driver - Local Buffer Overflow Exploit PoC",2007-03-09,"Daniel Roethlisberger",linux,dos,0
|
||||||
3442,platforms/multiple/local/3442.php,"PHP 4.4.6 cpdf_open() Local Source Code Discslosure PoC",2007-03-09,rgod,multiple,local,0
|
3442,platforms/multiple/local/3442.php,"PHP 4.4.6 cpdf_open() Local Source Code Discslosure PoC",2007-03-09,rgod,multiple,local,0
|
||||||
3443,platforms/php/webapps/3443.txt,"PMB Services <= 3.0.13 - Multiple Remote File Inclusion Vulnerability",2007-03-09,K-159,php,webapps,0
|
3443,platforms/php/webapps/3443.txt,"PMB Services <= 3.0.13 - Multiple Remote File Inclusion Vulnerability",2007-03-09,K-159,php,webapps,0
|
||||||
|
@ -3123,7 +3123,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3457,platforms/php/webapps/3457.pl,"SonicMailer Pro <= 3.2.3 (index.php) Remote SQL Injection Exploit",2007-03-11,ajann,php,webapps,0
|
3457,platforms/php/webapps/3457.pl,"SonicMailer Pro <= 3.2.3 (index.php) Remote SQL Injection Exploit",2007-03-11,ajann,php,webapps,0
|
||||||
3458,platforms/php/webapps/3458.txt,"AssetMan <= 2.4a (download_pdf.php) Remote File Disclosure Vuln",2007-03-11,"BorN To K!LL",php,webapps,0
|
3458,platforms/php/webapps/3458.txt,"AssetMan <= 2.4a (download_pdf.php) Remote File Disclosure Vuln",2007-03-11,"BorN To K!LL",php,webapps,0
|
||||||
3459,platforms/php/webapps/3459.txt,"cPanel <= 10.9.x (fantastico) Local File Inclusion Vulnerabilities",2007-03-11,"cyb3rt & 020",php,webapps,0
|
3459,platforms/php/webapps/3459.txt,"cPanel <= 10.9.x (fantastico) Local File Inclusion Vulnerabilities",2007-03-11,"cyb3rt & 020",php,webapps,0
|
||||||
3460,platforms/osx/local/3460.php,"PHP 5.2.0 ext/filter Space Trimming Buffer Underflow Exploit (MacOSX)",2007-03-12,"Stefan Esser",osx,local,0
|
3460,platforms/osx/local/3460.php,"PHP 5.2.0 - ext/filter Space Trimming Buffer Underflow Exploit (MacOSX)",2007-03-12,"Stefan Esser",osx,local,0
|
||||||
3461,platforms/windows/dos/3461.pl,"TFTP Server 1.3 - Remote Buffer Overflow Denial of Service Exploit",2007-03-12,"Umesh Wanve",windows,dos,0
|
3461,platforms/windows/dos/3461.pl,"TFTP Server 1.3 - Remote Buffer Overflow Denial of Service Exploit",2007-03-12,"Umesh Wanve",windows,dos,0
|
||||||
3462,platforms/windows/remote/3462.cpp,"NewsReactor 20070220 Article Grabbing Remote BoF Exploit (1)",2007-03-12,Marsu,windows,remote,0
|
3462,platforms/windows/remote/3462.cpp,"NewsReactor 20070220 Article Grabbing Remote BoF Exploit (1)",2007-03-12,Marsu,windows,remote,0
|
||||||
3463,platforms/windows/remote/3463.cpp,"NewsReactor 20070220 Article Grabbing Remote BoF Exploit (2)",2007-03-12,Marsu,windows,remote,0
|
3463,platforms/windows/remote/3463.cpp,"NewsReactor 20070220 Article Grabbing Remote BoF Exploit (2)",2007-03-12,Marsu,windows,remote,0
|
||||||
|
@ -3142,7 +3142,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3477,platforms/php/webapps/3477.htm,"WSN Guest 1.21 (comments.php id) Remote SQL Injection Exploit",2007-03-14,WiLdBoY,php,webapps,0
|
3477,platforms/php/webapps/3477.htm,"WSN Guest 1.21 (comments.php id) Remote SQL Injection Exploit",2007-03-14,WiLdBoY,php,webapps,0
|
||||||
3478,platforms/php/webapps/3478.htm,"Dayfox Blog 4 (postpost.php) Remote Code Execution Vulnerability",2007-03-14,Dj7xpl,php,webapps,0
|
3478,platforms/php/webapps/3478.htm,"Dayfox Blog 4 (postpost.php) Remote Code Execution Vulnerability",2007-03-14,Dj7xpl,php,webapps,0
|
||||||
3479,platforms/linux/local/3479.php,"PHP <= 5.2.1 session_regenerate_id() Double Free Exploit",2007-03-14,"Stefan Esser",linux,local,0
|
3479,platforms/linux/local/3479.php,"PHP <= 5.2.1 session_regenerate_id() Double Free Exploit",2007-03-14,"Stefan Esser",linux,local,0
|
||||||
3480,platforms/linux/local/3480.php,"PHP 5.2.0/5.2.1 Rejected Session ID Double Free Exploit",2007-03-14,"Stefan Esser",linux,local,0
|
3480,platforms/linux/local/3480.php,"PHP 5.2.0/5.2.1 - Rejected Session ID Double Free Exploit",2007-03-14,"Stefan Esser",linux,local,0
|
||||||
3481,platforms/asp/webapps/3481.htm,"Orion-Blog 2.0 (AdminBlogNewsEdit.asp) Remote Auth Bypass Vuln",2007-03-15,WiLdBoY,asp,webapps,0
|
3481,platforms/asp/webapps/3481.htm,"Orion-Blog 2.0 (AdminBlogNewsEdit.asp) Remote Auth Bypass Vuln",2007-03-15,WiLdBoY,asp,webapps,0
|
||||||
3482,platforms/windows/remote/3482.pl,"WarFTP 1.65 - (USER) Remote Buffer Overflow SEH Overflow Exploit",2007-03-15,"Umesh Wanve",windows,remote,21
|
3482,platforms/windows/remote/3482.pl,"WarFTP 1.65 - (USER) Remote Buffer Overflow SEH Overflow Exploit",2007-03-15,"Umesh Wanve",windows,remote,21
|
||||||
3483,platforms/php/webapps/3483.pl,"Woltlab Burning Board 2.x (usergroups.php) Remote SQL Injection Exploit",2007-03-15,x666,php,webapps,0
|
3483,platforms/php/webapps/3483.pl,"Woltlab Burning Board 2.x (usergroups.php) Remote SQL Injection Exploit",2007-03-15,x666,php,webapps,0
|
||||||
|
@ -3174,12 +3174,12 @@ id,file,description,date,author,platform,type,port
|
||||||
3509,platforms/php/webapps/3509.pl,"ScriptMagix Jokes <= 2.0 (index.php catid) Remote SQL Injection Exploit",2007-03-18,ajann,php,webapps,0
|
3509,platforms/php/webapps/3509.pl,"ScriptMagix Jokes <= 2.0 (index.php catid) Remote SQL Injection Exploit",2007-03-18,ajann,php,webapps,0
|
||||||
3510,platforms/php/webapps/3510.pl,"ScriptMagix Recipes <= 2.0 (index.php catid) SQL Injection Exploit",2007-03-18,ajann,php,webapps,0
|
3510,platforms/php/webapps/3510.pl,"ScriptMagix Recipes <= 2.0 (index.php catid) SQL Injection Exploit",2007-03-18,ajann,php,webapps,0
|
||||||
3511,platforms/php/webapps/3511.pl,"ScriptMagix Photo Rating <= 2.0 - Remote SQL Injection Exploit",2007-03-18,ajann,php,webapps,0
|
3511,platforms/php/webapps/3511.pl,"ScriptMagix Photo Rating <= 2.0 - Remote SQL Injection Exploit",2007-03-18,ajann,php,webapps,0
|
||||||
3512,platforms/php/webapps/3512.txt,"iFrame for Phpnuke (iframe.php) Remote File Inclusion Vulnerability",2007-03-18,"Cold Zero",php,webapps,0
|
3512,platforms/php/webapps/3512.txt,"PHP-Nuke - iFrame (iframe.php) Remote File Inclusion Vulnerability",2007-03-18,"Cold Zero",php,webapps,0
|
||||||
3513,platforms/php/webapps/3513.php,"Katalog Plyt Audio (pl) <= 1.0 - Remote SQL Injection Exploit",2007-03-18,Kacper,php,webapps,0
|
3513,platforms/php/webapps/3513.php,"Katalog Plyt Audio (pl) <= 1.0 - Remote SQL Injection Exploit",2007-03-18,Kacper,php,webapps,0
|
||||||
3514,platforms/windows/dos/3514.pl,"Avant Browser <= 11.0 build 26 - Remote Stack Overflow Crash Exploit",2007-03-18,DATA_SNIPER,windows,dos,0
|
3514,platforms/windows/dos/3514.pl,"Avant Browser <= 11.0 build 26 - Remote Stack Overflow Crash Exploit",2007-03-18,DATA_SNIPER,windows,dos,0
|
||||||
3515,platforms/php/webapps/3515.pl,"ScriptMagix Lyrics <= 2.0 (index.php recid) SQL Injection Exploit",2007-03-19,ajann,php,webapps,0
|
3515,platforms/php/webapps/3515.pl,"ScriptMagix Lyrics <= 2.0 (index.php recid) SQL Injection Exploit",2007-03-19,ajann,php,webapps,0
|
||||||
3516,platforms/php/webapps/3516.php,"MetaForum <= 0.513 Beta Remote File Upload Exploit",2007-03-19,Gu1ll4um3r0m41n,php,webapps,0
|
3516,platforms/php/webapps/3516.php,"MetaForum <= 0.513 Beta Remote File Upload Exploit",2007-03-19,Gu1ll4um3r0m41n,php,webapps,0
|
||||||
3517,platforms/osx/local/3517.php,"PHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)",2007-03-19,"Stefan Esser",osx,local,0
|
3517,platforms/osx/local/3517.php,"PHP 5.2.0 - header() Space Trimming Buffer Underflow Exploit (MacOSX)",2007-03-19,"Stefan Esser",osx,local,0
|
||||||
3518,platforms/php/webapps/3518.pl,"PHP-Nuke Module splattforum 4.0 RC1 - Local File Inclusion Exploit",2007-03-19,GoLd_M,php,webapps,0
|
3518,platforms/php/webapps/3518.pl,"PHP-Nuke Module splattforum 4.0 RC1 - Local File Inclusion Exploit",2007-03-19,GoLd_M,php,webapps,0
|
||||||
3519,platforms/php/webapps/3519.txt,"phpBB Minerva Mod <= 2.0.21 build 238a SQL Injection Vulnerability",2007-03-19,"Mehmet Ince",php,webapps,0
|
3519,platforms/php/webapps/3519.txt,"phpBB Minerva Mod <= 2.0.21 build 238a SQL Injection Vulnerability",2007-03-19,"Mehmet Ince",php,webapps,0
|
||||||
3520,platforms/asp/webapps/3520.txt,"NetVios Portal (page.asp) Remote SQL Injection Vulnerability",2007-03-19,parad0x,asp,webapps,0
|
3520,platforms/asp/webapps/3520.txt,"NetVios Portal (page.asp) Remote SQL Injection Vulnerability",2007-03-19,parad0x,asp,webapps,0
|
||||||
|
@ -3219,7 +3219,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3556,platforms/asp/webapps/3556.htm,"Active Newsletter <= 4.3 (ViewNewspapers.asp) SQL Injection Exploit",2007-03-23,ajann,asp,webapps,0
|
3556,platforms/asp/webapps/3556.htm,"Active Newsletter <= 4.3 (ViewNewspapers.asp) SQL Injection Exploit",2007-03-23,ajann,asp,webapps,0
|
||||||
3557,platforms/php/webapps/3557.txt,"Joomla/Mambo Component SWmenuFree 4.0 RFI Vulnerability",2007-03-23,"Cold Zero",php,webapps,0
|
3557,platforms/php/webapps/3557.txt,"Joomla/Mambo Component SWmenuFree 4.0 RFI Vulnerability",2007-03-23,"Cold Zero",php,webapps,0
|
||||||
3558,platforms/asp/webapps/3558.htm,"eWebquiz <= 8 - (eWebQuiz.asp) Remote SQL Injection Exploit",2007-03-23,ajann,asp,webapps,0
|
3558,platforms/asp/webapps/3558.htm,"eWebquiz <= 8 - (eWebQuiz.asp) Remote SQL Injection Exploit",2007-03-23,ajann,asp,webapps,0
|
||||||
3559,platforms/multiple/local/3559.php,"PHP 5.2.1 unserialize() Local Information Leak Exploit",2007-03-23,"Stefan Esser",multiple,local,0
|
3559,platforms/multiple/local/3559.php,"PHP 5.2.1 - unserialize() Local Information Leak Exploit",2007-03-23,"Stefan Esser",multiple,local,0
|
||||||
3560,platforms/php/webapps/3560.txt,"Joomla Component Joomlaboard 1.1.1 (sbp) RFI Vulnerability",2007-03-23,"Cold Zero",php,webapps,0
|
3560,platforms/php/webapps/3560.txt,"Joomla Component Joomlaboard 1.1.1 (sbp) RFI Vulnerability",2007-03-23,"Cold Zero",php,webapps,0
|
||||||
3561,platforms/windows/remote/3561.pl,"Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit",2007-03-24,"Jacopo Cervini",windows,remote,143
|
3561,platforms/windows/remote/3561.pl,"Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit",2007-03-24,"Jacopo Cervini",windows,remote,143
|
||||||
3562,platforms/php/webapps/3562.txt,"Net-Side.net CMS (index.php cms) Remote File Inclusion Vulnerability",2007-03-24,Sharingan,php,webapps,0
|
3562,platforms/php/webapps/3562.txt,"Net-Side.net CMS (index.php cms) Remote File Inclusion Vulnerability",2007-03-24,Sharingan,php,webapps,0
|
||||||
|
@ -3235,7 +3235,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3572,platforms/linux/local/3572.php,"PHP < 4.4.5 / 5.2.1 _SESSION Deserialization Overwrite Exploit",2007-03-25,"Stefan Esser",linux,local,0
|
3572,platforms/linux/local/3572.php,"PHP < 4.4.5 / 5.2.1 _SESSION Deserialization Overwrite Exploit",2007-03-25,"Stefan Esser",linux,local,0
|
||||||
3574,platforms/php/webapps/3574.pl,"PBlang 4.66z Remote Code Execution Exploit",2007-03-25,Hessam-x,php,webapps,0
|
3574,platforms/php/webapps/3574.pl,"PBlang 4.66z Remote Code Execution Exploit",2007-03-25,Hessam-x,php,webapps,0
|
||||||
3575,platforms/windows/remote/3575.cpp,"Frontbase <= 4.2.7 - Remote Buffer Overflow Exploit (windows)",2007-03-25,Heretic2,windows,remote,0
|
3575,platforms/windows/remote/3575.cpp,"Frontbase <= 4.2.7 - Remote Buffer Overflow Exploit (windows)",2007-03-25,Heretic2,windows,remote,0
|
||||||
3576,platforms/windows/local/3576.php,"PHP 5.2.1 with PECL phpDOC Local Buffer Overflow Exploit",2007-03-25,rgod,windows,local,0
|
3576,platforms/windows/local/3576.php,"PHP 5.2.1 with PECL phpDOC - Local Buffer Overflow Exploit",2007-03-25,rgod,windows,local,0
|
||||||
3577,platforms/windows/remote/3577.html,"Microsoft Internet Explorer - Recordset Double Free Memory Exploit (MS07-009)",2007-03-26,N/A,windows,remote,0
|
3577,platforms/windows/remote/3577.html,"Microsoft Internet Explorer - Recordset Double Free Memory Exploit (MS07-009)",2007-03-26,N/A,windows,remote,0
|
||||||
3578,platforms/bsd/local/3578.c,"FreeBSD mcweject 0.9 (eject) - Local Root Buffer Overflow Exploit",2007-03-26,harry,bsd,local,0
|
3578,platforms/bsd/local/3578.c,"FreeBSD mcweject 0.9 (eject) - Local Root Buffer Overflow Exploit",2007-03-26,harry,bsd,local,0
|
||||||
3579,platforms/windows/remote/3579.py,"Easy File Sharing FTP Server 2.0 - (PASS) Remote Exploit (Windows 2000 SP4)",2007-03-26,"Winny Thomas",windows,remote,21
|
3579,platforms/windows/remote/3579.py,"Easy File Sharing FTP Server 2.0 - (PASS) Remote Exploit (Windows 2000 SP4)",2007-03-26,"Winny Thomas",windows,remote,21
|
||||||
|
@ -3468,7 +3468,7 @@ id,file,description,date,author,platform,type,port
|
||||||
3811,platforms/windows/local/3811.c,"IrfanView <= 4.00 - (.iff) Buffer Overflow Exploit",2007-04-27,Marsu,windows,local,0
|
3811,platforms/windows/local/3811.c,"IrfanView <= 4.00 - (.iff) Buffer Overflow Exploit",2007-04-27,Marsu,windows,local,0
|
||||||
3812,platforms/windows/local/3812.c,"Photoshop CS2/CS3 / Paint Shop Pro 11.20 - (.png) BoF Exploit",2007-04-27,Marsu,windows,local,0
|
3812,platforms/windows/local/3812.c,"Photoshop CS2/CS3 / Paint Shop Pro 11.20 - (.png) BoF Exploit",2007-04-27,Marsu,windows,local,0
|
||||||
3813,platforms/php/webapps/3813.txt,"PostNuke pnFlashGames Module 1.5 - Remote SQL Injection Vulnerability",2007-04-28,"Mehmet Ince",php,webapps,0
|
3813,platforms/php/webapps/3813.txt,"PostNuke pnFlashGames Module 1.5 - Remote SQL Injection Vulnerability",2007-04-28,"Mehmet Ince",php,webapps,0
|
||||||
3814,platforms/php/webapps/3814.txt,"wordpress plugin mygallery <= 1.4b4 - Remote File Inclusion Vulnerability",2007-04-29,GoLd_M,php,webapps,0
|
3814,platforms/php/webapps/3814.txt,"WordPress Plugin mygallery <= 1.4b4 - Remote File Inclusion Vulnerability",2007-04-29,GoLd_M,php,webapps,0
|
||||||
3815,platforms/linux/remote/3815.c,"Fenice Oms server 1.10 - Remote Buffer Overflow Exploit (exec-shield)",2007-04-29,Xpl017Elz,linux,remote,0
|
3815,platforms/linux/remote/3815.c,"Fenice Oms server 1.10 - Remote Buffer Overflow Exploit (exec-shield)",2007-04-29,Xpl017Elz,linux,remote,0
|
||||||
3816,platforms/php/webapps/3816.php,"TCExam <= 4.0.011 (SessionUserLang) Shell Injection Exploit",2007-04-29,rgod,php,webapps,0
|
3816,platforms/php/webapps/3816.php,"TCExam <= 4.0.011 (SessionUserLang) Shell Injection Exploit",2007-04-29,rgod,php,webapps,0
|
||||||
3817,platforms/php/webapps/3817.txt,"Imageview 5.3 (fileview.php album) Local File Inclusion Vulnerability",2007-04-29,DNX,php,webapps,0
|
3817,platforms/php/webapps/3817.txt,"Imageview 5.3 (fileview.php album) Local File Inclusion Vulnerability",2007-04-29,DNX,php,webapps,0
|
||||||
|
@ -3728,7 +3728,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4076,platforms/php/webapps/4076.php,"MiniBB 2.0.5 (language) Local File Inclusion Exploit",2007-06-17,Dj7xpl,php,webapps,0
|
4076,platforms/php/webapps/4076.php,"MiniBB 2.0.5 (language) Local File Inclusion Exploit",2007-06-17,Dj7xpl,php,webapps,0
|
||||||
4078,platforms/php/webapps/4078.php,"Solar Empire <= 2.9.1.1 - BlindSQL Injection / Hash Retrieve Exploit",2007-06-18,BlackHawk,php,webapps,0
|
4078,platforms/php/webapps/4078.php,"Solar Empire <= 2.9.1.1 - BlindSQL Injection / Hash Retrieve Exploit",2007-06-18,BlackHawk,php,webapps,0
|
||||||
4079,platforms/php/webapps/4079.txt,"MiniBill 1.2.5 (run_billing.php) Remote File Inclusion Vulnerability",2007-06-18,Abo0od,php,webapps,0
|
4079,platforms/php/webapps/4079.txt,"MiniBill 1.2.5 (run_billing.php) Remote File Inclusion Vulnerability",2007-06-18,Abo0od,php,webapps,0
|
||||||
4080,platforms/windows/local/4080.php,"PHP 5.2.3 Tidy extension Local Buffer Overflow Exploit",2007-06-19,rgod,windows,local,0
|
4080,platforms/windows/local/4080.php,"PHP 5.2.3 Tidy extension - Local Buffer Overflow Exploit",2007-06-19,rgod,windows,local,0
|
||||||
4081,platforms/php/webapps/4081.php,"Jasmine CMS 1.0 - SQL Injection/Remote Code Execution Exploit",2007-06-19,Silentz,php,webapps,0
|
4081,platforms/php/webapps/4081.php,"Jasmine CMS 1.0 - SQL Injection/Remote Code Execution Exploit",2007-06-19,Silentz,php,webapps,0
|
||||||
4082,platforms/php/webapps/4082.pl,"LiveCMS <= 3.4 (categoria.php cid) Remote SQL Injection Exploit",2007-06-20,g00ns,php,webapps,0
|
4082,platforms/php/webapps/4082.pl,"LiveCMS <= 3.4 (categoria.php cid) Remote SQL Injection Exploit",2007-06-20,g00ns,php,webapps,0
|
||||||
4083,platforms/asp/webapps/4083.txt,"W1L3D4 WEBmarket 0.1 - Remote SQL Injection Vulnerability",2007-06-20,Crackers_Child,asp,webapps,0
|
4083,platforms/asp/webapps/4083.txt,"W1L3D4 WEBmarket 0.1 - Remote SQL Injection Vulnerability",2007-06-20,Crackers_Child,asp,webapps,0
|
||||||
|
@ -3821,13 +3821,13 @@ id,file,description,date,author,platform,type,port
|
||||||
4172,platforms/linux/local/4172.c,"Linux Kernel < 2.6.20.2 - IPv6_Getsockopt_Sticky Memory Leak PoC",2007-07-10,dreyer,linux,local,0
|
4172,platforms/linux/local/4172.c,"Linux Kernel < 2.6.20.2 - IPv6_Getsockopt_Sticky Memory Leak PoC",2007-07-10,dreyer,linux,local,0
|
||||||
4173,platforms/php/webapps/4173.txt,"SquirrelMail G/PGP Encryption Plugin 2.0 - Command Execution Vuln",2007-07-11,jmp-esp,php,webapps,0
|
4173,platforms/php/webapps/4173.txt,"SquirrelMail G/PGP Encryption Plugin 2.0 - Command Execution Vuln",2007-07-11,jmp-esp,php,webapps,0
|
||||||
4174,platforms/php/webapps/4174.txt,"PsNews 1.1 (show.php newspath) Local File Inclusion Vulnerability",2007-07-12,irk4z,php,webapps,0
|
4174,platforms/php/webapps/4174.txt,"PsNews 1.1 (show.php newspath) Local File Inclusion Vulnerability",2007-07-12,irk4z,php,webapps,0
|
||||||
4175,platforms/multiple/dos/4175.php,"PHP 5.2.3 bz2 com_print_typeinfo() Denial of Service Exploit",2007-07-12,shinnai,multiple,dos,0
|
4175,platforms/multiple/dos/4175.php,"PHP 5.2.3 - bz2 com_print_typeinfo() Denial of Service Exploit",2007-07-12,shinnai,multiple,dos,0
|
||||||
4176,platforms/windows/remote/4176.html,"SecureBlackbox (PGPBBox.dll 5.1.0.112) Arbitary Data Write Exploit",2007-07-12,callAX,windows,remote,0
|
4176,platforms/windows/remote/4176.html,"SecureBlackbox (PGPBBox.dll 5.1.0.112) Arbitary Data Write Exploit",2007-07-12,callAX,windows,remote,0
|
||||||
4177,platforms/windows/remote/4177.html,"Program Checker (sasatl.dll 1.5.0.531) DebugMsgLog Heap Spraying Exploit",2007-07-12,callAX,windows,remote,0
|
4177,platforms/windows/remote/4177.html,"Program Checker (sasatl.dll 1.5.0.531) DebugMsgLog Heap Spraying Exploit",2007-07-12,callAX,windows,remote,0
|
||||||
4178,platforms/windows/local/4178.txt,"Symantec AntiVirus - symtdi.sys Local Privilege Escalation Exploit",2007-07-12,"Zohiartze Herce",windows,local,0
|
4178,platforms/windows/local/4178.txt,"Symantec AntiVirus - symtdi.sys Local Privilege Escalation Exploit",2007-07-12,"Zohiartze Herce",windows,local,0
|
||||||
4179,platforms/php/webapps/4179.php,"MkPortal <= 1.1.1 reviews / gallery modules SQL Injection Exploit",2007-07-12,Coloss,php,webapps,0
|
4179,platforms/php/webapps/4179.php,"MkPortal <= 1.1.1 reviews / gallery modules SQL Injection Exploit",2007-07-12,Coloss,php,webapps,0
|
||||||
4180,platforms/php/webapps/4180.txt,"MKPortal NoBoard Module (BETA) Remote File Inclusion Vulnerability",2007-07-14,g00ns,php,webapps,0
|
4180,platforms/php/webapps/4180.txt,"MKPortal NoBoard Module (BETA) Remote File Inclusion Vulnerability",2007-07-14,g00ns,php,webapps,0
|
||||||
4181,platforms/multiple/dos/4181.php,"PHP 5.2.3 glob() Denial of Service Exploit",2007-07-14,shinnai,multiple,dos,0
|
4181,platforms/multiple/dos/4181.php,"PHP 5.2.3 - glob() Denial of Service Exploit",2007-07-14,shinnai,multiple,dos,0
|
||||||
4182,platforms/php/webapps/4182.txt,"CMScout <= 1.23 (index.php) Remote SQL Injection Vulnerability",2007-07-14,g00ns,php,webapps,0
|
4182,platforms/php/webapps/4182.txt,"CMScout <= 1.23 (index.php) Remote SQL Injection Vulnerability",2007-07-14,g00ns,php,webapps,0
|
||||||
4183,platforms/php/webapps/4183.txt,"eSyndiCat Directory Software Multiple SQL Injection Vulnerabilities",2007-07-14,d3v1l,php,webapps,0
|
4183,platforms/php/webapps/4183.txt,"eSyndiCat Directory Software Multiple SQL Injection Vulnerabilities",2007-07-14,d3v1l,php,webapps,0
|
||||||
4184,platforms/php/webapps/4184.txt,"Realtor 747 (index.php categoryid) Remote SQL Injection Vulnerbility",2007-07-14,t0pP8uZz,php,webapps,0
|
4184,platforms/php/webapps/4184.txt,"Realtor 747 (index.php categoryid) Remote SQL Injection Vulnerbility",2007-07-14,t0pP8uZz,php,webapps,0
|
||||||
|
@ -3863,7 +3863,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4215,platforms/windows/dos/4215.pl,"Microsoft Windows - Explorer.exe Gif Image Denial of Service Exploit",2007-07-23,DeltahackingTEAM,windows,dos,0
|
4215,platforms/windows/dos/4215.pl,"Microsoft Windows - Explorer.exe Gif Image Denial of Service Exploit",2007-07-23,DeltahackingTEAM,windows,dos,0
|
||||||
4216,platforms/linux/dos/4216.pl,"Xserver 0.1 Alpha Post Request Remote Buffer Overflow Exploit",2007-07-23,deusconstruct,linux,dos,0
|
4216,platforms/linux/dos/4216.pl,"Xserver 0.1 Alpha Post Request Remote Buffer Overflow Exploit",2007-07-23,deusconstruct,linux,dos,0
|
||||||
4217,platforms/windows/remote/4217.html,"LinkedIn Toolbar 3.0.2.1098 - Remote Buffer Overflow Exploit",2007-07-24,"Jared DeMott",windows,remote,0
|
4217,platforms/windows/remote/4217.html,"LinkedIn Toolbar 3.0.2.1098 - Remote Buffer Overflow Exploit",2007-07-24,"Jared DeMott",windows,remote,0
|
||||||
4218,platforms/windows/local/4218.php,"PHP 5.2.3 Win32std ext. safe_mode/disable_functions Protections Bypass",2007-07-24,shinnai,windows,local,0
|
4218,platforms/windows/local/4218.php,"PHP 5.2.3 - Win32std ext. safe_mode/disable_functions Protections Bypass",2007-07-24,shinnai,windows,local,0
|
||||||
4219,platforms/php/webapps/4219.txt,"Confixx Pro <= 3.3.1 - (saveserver.php) Remote File Inclusion Vulnerability",2007-07-24,"H4 / XPK",php,webapps,0
|
4219,platforms/php/webapps/4219.txt,"Confixx Pro <= 3.3.1 - (saveserver.php) Remote File Inclusion Vulnerability",2007-07-24,"H4 / XPK",php,webapps,0
|
||||||
4220,platforms/php/webapps/4220.pl,"Entertainment CMS (Local Inclusion) Remote Command Execution Exploit",2007-07-24,Kw3[R]Ln,php,webapps,0
|
4220,platforms/php/webapps/4220.pl,"Entertainment CMS (Local Inclusion) Remote Command Execution Exploit",2007-07-24,Kw3[R]Ln,php,webapps,0
|
||||||
4221,platforms/php/webapps/4221.txt,"Article Directory (index.php page) Remote File Inclusion Vulnerability",2007-07-24,mozi,php,webapps,0
|
4221,platforms/php/webapps/4221.txt,"Article Directory (index.php page) Remote File Inclusion Vulnerability",2007-07-24,mozi,php,webapps,0
|
||||||
|
@ -3881,7 +3881,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4233,platforms/aix/local/4233.c,"IBM AIX <= 5.3 sp6 ftp gets() Local Root Exploit",2007-07-27,qaaz,aix,local,0
|
4233,platforms/aix/local/4233.c,"IBM AIX <= 5.3 sp6 ftp gets() Local Root Exploit",2007-07-27,qaaz,aix,local,0
|
||||||
4234,platforms/windows/remote/4234.html,"mlsrvx.dll 1.8.9.1 ArGoSoft Mail Server Data Write/Code Execution",2007-07-27,callAX,windows,remote,0
|
4234,platforms/windows/remote/4234.html,"mlsrvx.dll 1.8.9.1 ArGoSoft Mail Server Data Write/Code Execution",2007-07-27,callAX,windows,remote,0
|
||||||
4235,platforms/php/webapps/4235.txt,"Seditio CMS <= 121 - (pfs.php) Remote File Upload Vulnerability",2007-07-27,A.D.T,php,webapps,0
|
4235,platforms/php/webapps/4235.txt,"Seditio CMS <= 121 - (pfs.php) Remote File Upload Vulnerability",2007-07-27,A.D.T,php,webapps,0
|
||||||
4236,platforms/windows/local/4236.php,"PHP 5.x (Win32service) Local Safe Mode Bypass Exploit",2007-07-27,NetJackal,windows,local,0
|
4236,platforms/windows/local/4236.php,"PHP 5.x - (Win32service) Local Safe Mode Bypass Exploit",2007-07-27,NetJackal,windows,local,0
|
||||||
4237,platforms/windows/remote/4237.html,"Nessus Vulnerability Scanner 3.0.6 - ActiveX Command Exec Exploit",2007-07-27,h07,windows,remote,0
|
4237,platforms/windows/remote/4237.html,"Nessus Vulnerability Scanner 3.0.6 - ActiveX Command Exec Exploit",2007-07-27,h07,windows,remote,0
|
||||||
4238,platforms/php/webapps/4238.txt,"Adult Directory (cat_id) Remote SQL Injection Vulnerability",2007-07-27,t0pP8uZz,php,webapps,0
|
4238,platforms/php/webapps/4238.txt,"Adult Directory (cat_id) Remote SQL Injection Vulnerability",2007-07-27,t0pP8uZz,php,webapps,0
|
||||||
4239,platforms/asp/webapps/4239.txt,"SimpleBlog 3.0 (comments_get.asp id) Remote SQL Injection Vulnerability",2007-07-28,g00ns,asp,webapps,0
|
4239,platforms/asp/webapps/4239.txt,"SimpleBlog 3.0 (comments_get.asp id) Remote SQL Injection Vulnerability",2007-07-28,g00ns,asp,webapps,0
|
||||||
|
@ -3949,7 +3949,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4301,platforms/windows/remote/4301.cpp,"Mercury/32 4.51 SMTPD CRAM-MD5 Pre-Auth Remote Overflow Exploit",2007-08-22,ZhenHan.Liu,windows,remote,25
|
4301,platforms/windows/remote/4301.cpp,"Mercury/32 4.51 SMTPD CRAM-MD5 Pre-Auth Remote Overflow Exploit",2007-08-22,ZhenHan.Liu,windows,remote,25
|
||||||
4302,platforms/windows/local/4302.php,"PHP <= 5.2.3 - (php_win32sti) Local Buffer Overflow Exploit",2007-08-22,Inphex,windows,local,0
|
4302,platforms/windows/local/4302.php,"PHP <= 5.2.3 - (php_win32sti) Local Buffer Overflow Exploit",2007-08-22,Inphex,windows,local,0
|
||||||
4303,platforms/windows/local/4303.php,"PHP <= 5.2.3 - (php_win32sti) Local Buffer Overflow Exploit (2)",2007-08-22,NetJackal,windows,local,0
|
4303,platforms/windows/local/4303.php,"PHP <= 5.2.3 - (php_win32sti) Local Buffer Overflow Exploit (2)",2007-08-22,NetJackal,windows,local,0
|
||||||
4304,platforms/windows/dos/4304.php,"PHP 5.2.3 php_ntuser ntuser_getuserlist() Local Buffer Overflow PoC",2007-08-23,shinnai,windows,dos,0
|
4304,platforms/windows/dos/4304.php,"PHP 5.2.3 - php_ntuser ntuser_getuserlist() Local Buffer Overflow PoC",2007-08-23,shinnai,windows,dos,0
|
||||||
4305,platforms/php/webapps/4305.txt,"Joomla Component NeoRecruit <= 1.4 (id) SQL Injection Vulnerability",2007-08-23,ajann,php,webapps,0
|
4305,platforms/php/webapps/4305.txt,"Joomla Component NeoRecruit <= 1.4 (id) SQL Injection Vulnerability",2007-08-23,ajann,php,webapps,0
|
||||||
4306,platforms/php/webapps/4306.txt,"Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability",2007-08-23,ajann,php,webapps,0
|
4306,platforms/php/webapps/4306.txt,"Mambo Component RemoSitory (cat) Remote SQL Injection Vulnerability",2007-08-23,ajann,php,webapps,0
|
||||||
4307,platforms/php/webapps/4307.txt,"Joomla Component RSfiles <= 1.0.2 - (path) File Download Vulnerability",2007-08-23,ajann,php,webapps,0
|
4307,platforms/php/webapps/4307.txt,"Joomla Component RSfiles <= 1.0.2 - (path) File Download Vulnerability",2007-08-23,ajann,php,webapps,0
|
||||||
|
@ -4161,7 +4161,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4514,platforms/linux/remote/4514.c,"Eggdrop Server Module Message Handling Remote BoF Exploit",2007-10-10,bangus/magnum,linux,remote,0
|
4514,platforms/linux/remote/4514.c,"Eggdrop Server Module Message Handling Remote BoF Exploit",2007-10-10,bangus/magnum,linux,remote,0
|
||||||
4515,platforms/solaris/local/4515.c,"Solaris 10 x86/sparc sysinfo Kernel Memory Disclosure Exploit",2007-09-01,qaaz,solaris,local,0
|
4515,platforms/solaris/local/4515.c,"Solaris 10 x86/sparc sysinfo Kernel Memory Disclosure Exploit",2007-09-01,qaaz,solaris,local,0
|
||||||
4516,platforms/solaris/local/4516.c,"Solaris fifofs I_PEEK Kernel Memory Disclosure Exploit (x86/sparc)",2007-10-10,qaaz,solaris,local,0
|
4516,platforms/solaris/local/4516.c,"Solaris fifofs I_PEEK Kernel Memory Disclosure Exploit (x86/sparc)",2007-10-10,qaaz,solaris,local,0
|
||||||
4517,platforms/windows/local/4517.php,"PHP 5.2.4 ionCube extension safe_mode / disable_functions Bypass",2007-10-11,shinnai,windows,local,0
|
4517,platforms/windows/local/4517.php,"PHP 5.2.4 ionCube extension - safe_mode / disable_functions Bypass",2007-10-11,shinnai,windows,local,0
|
||||||
4518,platforms/php/webapps/4518.txt,"WebDesktop 0.1 - Remote File Inclusion Vulnerabilities",2007-10-11,S.W.A.T.,php,webapps,0
|
4518,platforms/php/webapps/4518.txt,"WebDesktop 0.1 - Remote File Inclusion Vulnerabilities",2007-10-11,S.W.A.T.,php,webapps,0
|
||||||
4519,platforms/php/webapps/4519.txt,"Pindorama 0.1 client.php Remote File Inclusion Vulnerability",2007-10-11,S.W.A.T.,php,webapps,0
|
4519,platforms/php/webapps/4519.txt,"Pindorama 0.1 client.php Remote File Inclusion Vulnerability",2007-10-11,S.W.A.T.,php,webapps,0
|
||||||
4520,platforms/php/webapps/4520.txt,"PicoFlat CMS <= 0.4.14 index.php Remote File Inclusion Vulnerability",2007-10-11,0in,php,webapps,0
|
4520,platforms/php/webapps/4520.txt,"PicoFlat CMS <= 0.4.14 index.php Remote File Inclusion Vulnerability",2007-10-11,0in,php,webapps,0
|
||||||
|
@ -4197,7 +4197,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4550,platforms/php/webapps/4550.pl,"BBPortalS <= 2.0 - Remote Blind SQL Injection Exploit",2007-10-21,Max007,php,webapps,0
|
4550,platforms/php/webapps/4550.pl,"BBPortalS <= 2.0 - Remote Blind SQL Injection Exploit",2007-10-21,Max007,php,webapps,0
|
||||||
4551,platforms/php/webapps/4551.txt,"PeopleAggregator <= 1.2pre6-release-53 - Multiple RFI Vulnerabilities",2007-10-21,GoLd_M,php,webapps,0
|
4551,platforms/php/webapps/4551.txt,"PeopleAggregator <= 1.2pre6-release-53 - Multiple RFI Vulnerabilities",2007-10-21,GoLd_M,php,webapps,0
|
||||||
4552,platforms/linux/remote/4552.pl,"Apache Tomcat (webdav) - Remote File Disclosure Exploit (ssl support)",2007-10-21,h3rcul3s,linux,remote,0
|
4552,platforms/linux/remote/4552.pl,"Apache Tomcat (webdav) - Remote File Disclosure Exploit (ssl support)",2007-10-21,h3rcul3s,linux,remote,0
|
||||||
4553,platforms/windows/local/4553.php,"PHP 5.x COM functions safe_mode and disable_function bypass",2007-10-22,shinnai,windows,local,0
|
4553,platforms/windows/local/4553.php,"PHP 5.x - COM functions safe_mode and disable_function bypass",2007-10-22,shinnai,windows,local,0
|
||||||
4554,platforms/php/webapps/4554.txt,"SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability",2007-10-22,BiNgZa,php,webapps,0
|
4554,platforms/php/webapps/4554.txt,"SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability",2007-10-22,BiNgZa,php,webapps,0
|
||||||
4555,platforms/php/webapps/4555.txt,"TOWeLS 0.1 scripture.php Remote File Inclusion Vulnerability",2007-10-22,GoLd_M,php,webapps,0
|
4555,platforms/php/webapps/4555.txt,"TOWeLS 0.1 scripture.php Remote File Inclusion Vulnerability",2007-10-22,GoLd_M,php,webapps,0
|
||||||
4556,platforms/multiple/remote/4556.txt,"LiteSpeed Web Server <= 3.2.3 - Remote Source Code Disclosure Vuln",2007-10-22,Tr3mbl3r,multiple,remote,0
|
4556,platforms/multiple/remote/4556.txt,"LiteSpeed Web Server <= 3.2.3 - Remote Source Code Disclosure Vuln",2007-10-22,Tr3mbl3r,multiple,remote,0
|
||||||
|
@ -4207,7 +4207,7 @@ id,file,description,date,author,platform,type,port
|
||||||
4560,platforms/multiple/dos/4560.pl,"DNS Recursion Bandwidth Amplification - Denial of Service PoC",2007-10-23,ShadowHatesYou,multiple,dos,0
|
4560,platforms/multiple/dos/4560.pl,"DNS Recursion Bandwidth Amplification - Denial of Service PoC",2007-10-23,ShadowHatesYou,multiple,dos,0
|
||||||
4561,platforms/php/webapps/4561.txt,"Flatnuke 3 - Remote Command Execution / Privilege Escalation",2007-10-23,KiNgOfThEwOrLd,php,webapps,0
|
4561,platforms/php/webapps/4561.txt,"Flatnuke 3 - Remote Command Execution / Privilege Escalation",2007-10-23,KiNgOfThEwOrLd,php,webapps,0
|
||||||
4562,platforms/php/webapps/4562.txt,"Flatnuke 3 - Remote Cookie Manipoulation / Privilege Escalation",2007-10-23,KiNgOfThEwOrLd,php,webapps,0
|
4562,platforms/php/webapps/4562.txt,"Flatnuke 3 - Remote Cookie Manipoulation / Privilege Escalation",2007-10-23,KiNgOfThEwOrLd,php,webapps,0
|
||||||
4563,platforms/php/webapps/4563.txt,"php-nuke platinum 7.6.b.5 - Remote File Inclusion Vulnerability",2007-10-23,BiNgZa,php,webapps,0
|
4563,platforms/php/webapps/4563.txt,"PHP-Nuke platinum 7.6.b.5 - Remote File Inclusion Vulnerability",2007-10-23,BiNgZa,php,webapps,0
|
||||||
4564,platforms/multiple/local/4564.txt,"Oracle 10g CTX_DOC.MARKUP SQL Injection Exploit",2007-10-23,sh2kerr,multiple,local,0
|
4564,platforms/multiple/local/4564.txt,"Oracle 10g CTX_DOC.MARKUP SQL Injection Exploit",2007-10-23,sh2kerr,multiple,local,0
|
||||||
4565,platforms/php/webapps/4565.txt,"PHP Image 1.2 - Multiple Remote File Inclusion Vulnerabilities",2007-10-23,Civi,php,webapps,0
|
4565,platforms/php/webapps/4565.txt,"PHP Image 1.2 - Multiple Remote File Inclusion Vulnerabilities",2007-10-23,Civi,php,webapps,0
|
||||||
4566,platforms/windows/remote/4566.rb,"eIQnetworks ESA SEARCHREPORT Remote Overflow Exploit (meta)",2007-10-24,ri0t,windows,remote,10616
|
4566,platforms/windows/remote/4566.rb,"eIQnetworks ESA SEARCHREPORT Remote Overflow Exploit (meta)",2007-10-24,ri0t,windows,remote,10616
|
||||||
|
@ -4672,7 +4672,7 @@ id,file,description,date,author,platform,type,port
|
||||||
5032,platforms/windows/local/5032.c,"Total Video Player 1.03 M3U File Local Buffer Overflow Exploit",2008-02-01,"fl0 fl0w",windows,local,0
|
5032,platforms/windows/local/5032.c,"Total Video Player 1.03 M3U File Local Buffer Overflow Exploit",2008-02-01,"fl0 fl0w",windows,local,0
|
||||||
5033,platforms/php/webapps/5033.txt,"LightBlog 9.5 cp_upload_image.php Remote File Upload Vulnerability",2008-02-01,Omni,php,webapps,0
|
5033,platforms/php/webapps/5033.txt,"LightBlog 9.5 cp_upload_image.php Remote File Upload Vulnerability",2008-02-01,Omni,php,webapps,0
|
||||||
5034,platforms/php/webapps/5034.txt,"Joomla Component NeoReferences 1.3.1 (catid) SQL Injection Vuln",2008-02-01,S@BUN,php,webapps,0
|
5034,platforms/php/webapps/5034.txt,"Joomla Component NeoReferences 1.3.1 (catid) SQL Injection Vuln",2008-02-01,S@BUN,php,webapps,0
|
||||||
5035,platforms/php/webapps/5035.txt,"wordpress plugin dmsguestbook 1.7.0 - Multiple Vulnerabilities",2008-02-02,NBBN,php,webapps,0
|
5035,platforms/php/webapps/5035.txt,"WordPress Plugin dmsguestbook 1.7.0 - Multiple Vulnerabilities",2008-02-02,NBBN,php,webapps,0
|
||||||
5036,platforms/windows/dos/5036.pl,"Titan FTP Server 6.03 (USER/PASS) Remote Heap Overflow PoC",2008-02-02,securfrog,windows,dos,0
|
5036,platforms/windows/dos/5036.pl,"Titan FTP Server 6.03 (USER/PASS) Remote Heap Overflow PoC",2008-02-02,securfrog,windows,dos,0
|
||||||
5037,platforms/php/webapps/5037.txt,"The Everything Development System <= Pre-1.0 - SQL Injection Vuln",2008-02-02,sub,php,webapps,0
|
5037,platforms/php/webapps/5037.txt,"The Everything Development System <= Pre-1.0 - SQL Injection Vuln",2008-02-02,sub,php,webapps,0
|
||||||
5039,platforms/php/webapps/5039.txt,"Wordpress Plugin Wordspew - Remote SQL Injection Vulnerability",2008-02-02,S@BUN,php,webapps,0
|
5039,platforms/php/webapps/5039.txt,"Wordpress Plugin Wordspew - Remote SQL Injection Vulnerability",2008-02-02,S@BUN,php,webapps,0
|
||||||
|
@ -5303,7 +5303,7 @@ id,file,description,date,author,platform,type,port
|
||||||
5676,platforms/php/webapps/5676.txt,"CMS MAXSITE <= 1.10 (category) Remote SQL Injection Vulnerability",2008-05-26,Tesz,php,webapps,0
|
5676,platforms/php/webapps/5676.txt,"CMS MAXSITE <= 1.10 (category) Remote SQL Injection Vulnerability",2008-05-26,Tesz,php,webapps,0
|
||||||
5677,platforms/php/webapps/5677.txt,"RevokeBB 1.0 RC11 (search) Remote SQL Injection Vulnerability",2008-05-27,The:Paradox,php,webapps,0
|
5677,platforms/php/webapps/5677.txt,"RevokeBB 1.0 RC11 (search) Remote SQL Injection Vulnerability",2008-05-27,The:Paradox,php,webapps,0
|
||||||
5678,platforms/php/webapps/5678.txt,"CKGold Shopping Cart 2.5 (category_id) SQL Injection Vulnerability",2008-05-27,Cr@zy_King,php,webapps,0
|
5678,platforms/php/webapps/5678.txt,"CKGold Shopping Cart 2.5 (category_id) SQL Injection Vulnerability",2008-05-27,Cr@zy_King,php,webapps,0
|
||||||
5679,platforms/multiple/dos/5679.php,"PHP 5.2.6 sleep() Local Memory Exhaust Exploit",2008-05-27,Gogulas,multiple,dos,0
|
5679,platforms/multiple/dos/5679.php,"PHP 5.2.6 - sleep() Local Memory Exhaust Exploit",2008-05-27,Gogulas,multiple,dos,0
|
||||||
5680,platforms/php/webapps/5680.txt,"OtomiGen.X 2.2 (lang) Local File Inclusion Vulnerabilities",2008-05-27,Saime,php,webapps,0
|
5680,platforms/php/webapps/5680.txt,"OtomiGen.X 2.2 (lang) Local File Inclusion Vulnerabilities",2008-05-27,Saime,php,webapps,0
|
||||||
5681,platforms/windows/remote/5681.html,"Creative Software AutoUpdate Engine - ActiveX Stack Overflow Exploit",2008-05-27,BitKrush,windows,remote,0
|
5681,platforms/windows/remote/5681.html,"Creative Software AutoUpdate Engine - ActiveX Stack Overflow Exploit",2008-05-27,BitKrush,windows,remote,0
|
||||||
5682,platforms/windows/dos/5682.html,"CA Internet Security Suite 2008 SaveToFile()File Corruption PoC",2008-05-28,Nine:Situations:Group,windows,dos,0
|
5682,platforms/windows/dos/5682.html,"CA Internet Security Suite 2008 SaveToFile()File Corruption PoC",2008-05-28,Nine:Situations:Group,windows,dos,0
|
||||||
|
@ -5923,7 +5923,7 @@ id,file,description,date,author,platform,type,port
|
||||||
6335,platforms/php/webapps/6335.txt,"Web Directory Script 1.5.3 - (site) SQL Injection Vulnerability",2008-08-31,"Hussin X",php,webapps,0
|
6335,platforms/php/webapps/6335.txt,"Web Directory Script 1.5.3 - (site) SQL Injection Vulnerability",2008-08-31,"Hussin X",php,webapps,0
|
||||||
6336,platforms/php/webapps/6336.txt,"Words tag script 1.2 (word) Remote SQL Injection Vulnerability",2008-08-31,"Hussin X",php,webapps,0
|
6336,platforms/php/webapps/6336.txt,"Words tag script 1.2 (word) Remote SQL Injection Vulnerability",2008-08-31,"Hussin X",php,webapps,0
|
||||||
6337,platforms/linux/local/6337.sh,"Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit",2008-08-31,RoMaNSoFt,linux,local,0
|
6337,platforms/linux/local/6337.sh,"Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit",2008-08-31,RoMaNSoFt,linux,local,0
|
||||||
6338,platforms/php/webapps/6338.txt,"myphpnuke < 1.8.8_8rc2 (xss/SQL) Multiple Vulnerabilities",2008-08-31,MustLive,php,webapps,0
|
6338,platforms/php/webapps/6338.txt,"myPHPNuke < 1.8.8_8rc2 - (XSS/SQL) Multiple Vulnerabilities",2008-08-31,MustLive,php,webapps,0
|
||||||
6339,platforms/php/webapps/6339.txt,"webid 0.5.4 - Multiple Vulnerabilities",2008-08-31,InjEctOr5,php,webapps,0
|
6339,platforms/php/webapps/6339.txt,"webid 0.5.4 - Multiple Vulnerabilities",2008-08-31,InjEctOr5,php,webapps,0
|
||||||
6341,platforms/php/webapps/6341.txt,"WeBid 0.5.4 (item.php id) Remote SQL Injection Vulnerability",2008-09-01,Stack,php,webapps,0
|
6341,platforms/php/webapps/6341.txt,"WeBid 0.5.4 (item.php id) Remote SQL Injection Vulnerability",2008-09-01,Stack,php,webapps,0
|
||||||
6342,platforms/php/webapps/6342.txt,"EasyClassifields 3.0 (go) Remote SQL Injection Vulnerability",2008-09-01,e.wiZz!,php,webapps,0
|
6342,platforms/php/webapps/6342.txt,"EasyClassifields 3.0 (go) Remote SQL Injection Vulnerability",2008-09-01,e.wiZz!,php,webapps,0
|
||||||
|
@ -5931,7 +5931,7 @@ id,file,description,date,author,platform,type,port
|
||||||
6344,platforms/php/webapps/6344.php,"WeBid 0.5.4 - (fckeditor) Remote Arbitrary File Upload Exploit",2008-09-01,Stack,php,webapps,0
|
6344,platforms/php/webapps/6344.php,"WeBid 0.5.4 - (fckeditor) Remote Arbitrary File Upload Exploit",2008-09-01,Stack,php,webapps,0
|
||||||
6345,platforms/windows/dos/6345.html,"VMware COM API ActiveX Remote Buffer Overflow PoC",2008-09-01,shinnai,windows,dos,0
|
6345,platforms/windows/dos/6345.html,"VMware COM API ActiveX Remote Buffer Overflow PoC",2008-09-01,shinnai,windows,dos,0
|
||||||
6346,platforms/php/webapps/6346.pl,"e107 Plugin BLOG Engine 2.2 (uid) SQL Injection Exploit",2008-09-01,"Virangar Security",php,webapps,0
|
6346,platforms/php/webapps/6346.pl,"e107 Plugin BLOG Engine 2.2 (uid) SQL Injection Exploit",2008-09-01,"Virangar Security",php,webapps,0
|
||||||
6347,platforms/php/webapps/6347.txt,"myPHPNuke < 1.8.8_8rc2 (artid) SQL Injection Vulnerability",2008-09-02,MustLive,php,webapps,0
|
6347,platforms/php/webapps/6347.txt,"myPHPNuke < 1.8.8_8rc2 - (artid) SQL Injection Vulnerability",2008-09-02,MustLive,php,webapps,0
|
||||||
6348,platforms/php/webapps/6348.txt,"Coupon Script 4.0 (id) Remote SQL Injection Vulnerability",2008-09-02,"Hussin X",php,webapps,0
|
6348,platforms/php/webapps/6348.txt,"Coupon Script 4.0 (id) Remote SQL Injection Vulnerability",2008-09-02,"Hussin X",php,webapps,0
|
||||||
6349,platforms/php/webapps/6349.txt,"Reciprocal Links Manager 1.1 (site) SQL Injection Vulnerability",2008-09-02,"Hussin X",php,webapps,0
|
6349,platforms/php/webapps/6349.txt,"Reciprocal Links Manager 1.1 (site) SQL Injection Vulnerability",2008-09-02,"Hussin X",php,webapps,0
|
||||||
6350,platforms/php/webapps/6350.txt,"AJ HYIP ACME (comment.php artid) SQL Injection Vulnerability",2008-09-02,"security fears team",php,webapps,0
|
6350,platforms/php/webapps/6350.txt,"AJ HYIP ACME (comment.php artid) SQL Injection Vulnerability",2008-09-02,"security fears team",php,webapps,0
|
||||||
|
@ -6405,7 +6405,7 @@ id,file,description,date,author,platform,type,port
|
||||||
6838,platforms/windows/dos/6838.rb,"PumpKIN TFTP Server 2.7.2.0 - Denial of Service Exploit (meta)",2008-10-25,"Saint Patrick",windows,dos,0
|
6838,platforms/windows/dos/6838.rb,"PumpKIN TFTP Server 2.7.2.0 - Denial of Service Exploit (meta)",2008-10-25,"Saint Patrick",windows,dos,0
|
||||||
6839,platforms/php/webapps/6839.txt,"PozScripts Classified Auctions (gotourl.php id) SQL Injection Vuln",2008-10-26,"Hussin X",php,webapps,0
|
6839,platforms/php/webapps/6839.txt,"PozScripts Classified Auctions (gotourl.php id) SQL Injection Vuln",2008-10-26,"Hussin X",php,webapps,0
|
||||||
6840,platforms/windows/remote/6840.html,"PowerTCP FTP module Multiple Technique Exploit (SEH/HeapSpray)",2008-10-26,"Shahriyar Jalayeri",windows,remote,0
|
6840,platforms/windows/remote/6840.html,"PowerTCP FTP module Multiple Technique Exploit (SEH/HeapSpray)",2008-10-26,"Shahriyar Jalayeri",windows,remote,0
|
||||||
6841,platforms/windows/remote/6841.txt,"Microsoft Windows Server - Code Execution Exploit (MS08-067) (Univ)",2008-10-26,EMM,windows,remote,135
|
6841,platforms/windows/remote/6841.txt,"Microsoft Windows Server - Code Execution Exploit (MS08-067) (Universal)",2008-10-26,EMM,windows,remote,135
|
||||||
6842,platforms/php/webapps/6842.txt,"WordPress Media Holder - (mediaHolder.php id) SQL Injection Vuln",2008-10-26,boom3rang,php,webapps,0
|
6842,platforms/php/webapps/6842.txt,"WordPress Media Holder - (mediaHolder.php id) SQL Injection Vuln",2008-10-26,boom3rang,php,webapps,0
|
||||||
6843,platforms/php/webapps/6843.txt,"SFS Ez Forum (forum.php id) SQL Injection Vulnerability",2008-10-26,Hurley,php,webapps,0
|
6843,platforms/php/webapps/6843.txt,"SFS Ez Forum (forum.php id) SQL Injection Vulnerability",2008-10-26,Hurley,php,webapps,0
|
||||||
6844,platforms/php/webapps/6844.pl,"MyForum 1.3 (lecture.php id) Remote SQL Injection Exploit",2008-10-26,Vrs-hCk,php,webapps,0
|
6844,platforms/php/webapps/6844.pl,"MyForum 1.3 (lecture.php id) Remote SQL Injection Exploit",2008-10-26,Vrs-hCk,php,webapps,0
|
||||||
|
@ -6722,7 +6722,7 @@ id,file,description,date,author,platform,type,port
|
||||||
7167,platforms/windows/remote/7167.html,"Exodus 0.10 (uri handler) Arbitrary Parameter Injection Exploit",2008-11-20,Nine:Situations:Group,windows,remote,0
|
7167,platforms/windows/remote/7167.html,"Exodus 0.10 (uri handler) Arbitrary Parameter Injection Exploit",2008-11-20,Nine:Situations:Group,windows,remote,0
|
||||||
7168,platforms/php/webapps/7168.pl,"PunBB Mod PunPortal 0.1 - Local File Inclusion Exploit",2008-11-20,StAkeR,php,webapps,0
|
7168,platforms/php/webapps/7168.pl,"PunBB Mod PunPortal 0.1 - Local File Inclusion Exploit",2008-11-20,StAkeR,php,webapps,0
|
||||||
7170,platforms/php/webapps/7170.php,"wPortfolio <= 0.3 Admin Password Changing Exploit",2008-11-20,G4N0K,php,webapps,0
|
7170,platforms/php/webapps/7170.php,"wPortfolio <= 0.3 Admin Password Changing Exploit",2008-11-20,G4N0K,php,webapps,0
|
||||||
7171,platforms/multiple/local/7171.txt,"PHP 5.2.6 (error_log) safe_mode Bypass Vulnerability",2008-11-20,SecurityReason,multiple,local,0
|
7171,platforms/multiple/local/7171.txt,"PHP 5.2.6 - (error_log) safe_mode Bypass Vulnerability",2008-11-20,SecurityReason,multiple,local,0
|
||||||
7172,platforms/php/webapps/7172.txt,"NatterChat 1.1 (Auth Bypass) Remote SQL Injection Vulnerability",2008-11-20,Bl@ckbe@rD,php,webapps,0
|
7172,platforms/php/webapps/7172.txt,"NatterChat 1.1 (Auth Bypass) Remote SQL Injection Vulnerability",2008-11-20,Bl@ckbe@rD,php,webapps,0
|
||||||
7173,platforms/php/webapps/7173.php,"PHP-Fusion 7.00.1 (messages.php) Remote SQL Injection Exploit",2008-11-20,irk4z,php,webapps,0
|
7173,platforms/php/webapps/7173.php,"PHP-Fusion 7.00.1 (messages.php) Remote SQL Injection Exploit",2008-11-20,irk4z,php,webapps,0
|
||||||
7174,platforms/php/webapps/7174.txt,"vBulletin 3.7.3 - Visitor Message CSRF + Worm Exploit",2008-11-20,Mx,php,webapps,0
|
7174,platforms/php/webapps/7174.txt,"vBulletin 3.7.3 - Visitor Message CSRF + Worm Exploit",2008-11-20,Mx,php,webapps,0
|
||||||
|
@ -9594,7 +9594,7 @@ id,file,description,date,author,platform,type,port
|
||||||
10295,platforms/windows/local/10295.txt,"DAZ Studio Arbitrary Command Execution",2009-12-03,"Core Security",windows,local,0
|
10295,platforms/windows/local/10295.txt,"DAZ Studio Arbitrary Command Execution",2009-12-03,"Core Security",windows,local,0
|
||||||
10296,platforms/php/local/10296.txt,"PHP 'ini_restore()' Memory Information Disclosure Vulnerability",2009-12-03,"Maksymilian Arciemowicz",php,local,0
|
10296,platforms/php/local/10296.txt,"PHP 'ini_restore()' Memory Information Disclosure Vulnerability",2009-12-03,"Maksymilian Arciemowicz",php,local,0
|
||||||
10297,platforms/php/webapps/10297.php,"Vivid Ads Shopping Cart (prodid) Remote SQL Injection",2009-12-03,"Yakir Wizman",php,webapps,0
|
10297,platforms/php/webapps/10297.php,"Vivid Ads Shopping Cart (prodid) Remote SQL Injection",2009-12-03,"Yakir Wizman",php,webapps,0
|
||||||
10298,platforms/windows/local/10298.c,"Jasc Paint Shop Pro 8 - Local Buffer Overflow Exploit (UNIVERSAL)",2009-12-04,"fl0 fl0w",windows,local,0
|
10298,platforms/windows/local/10298.c,"Jasc Paint Shop Pro 8 - Local Buffer Overflow Exploit (Universal)",2009-12-04,"fl0 fl0w",windows,local,0
|
||||||
10299,platforms/php/webapps/10299.txt,"GeN3 forum 1.3 - SQL Injection Vulnerability",2009-12-04,"Dr.0rYX AND Cr3W-DZ",php,webapps,0
|
10299,platforms/php/webapps/10299.txt,"GeN3 forum 1.3 - SQL Injection Vulnerability",2009-12-04,"Dr.0rYX AND Cr3W-DZ",php,webapps,0
|
||||||
10302,platforms/php/webapps/10302.txt,"427BB Fourtwosevenbb <= 2.3.2 - SQL Injection Exploit",2009-12-04,"cr4wl3r ",php,webapps,0
|
10302,platforms/php/webapps/10302.txt,"427BB Fourtwosevenbb <= 2.3.2 - SQL Injection Exploit",2009-12-04,"cr4wl3r ",php,webapps,0
|
||||||
10303,platforms/windows/dos/10303.py,"Core FTP Server 1.0 Build 319 - Denial of Service",2009-12-04,"Mert SARICA",windows,dos,0
|
10303,platforms/windows/dos/10303.py,"Core FTP Server 1.0 Build 319 - Denial of Service",2009-12-04,"Mert SARICA",windows,dos,0
|
||||||
|
@ -9618,7 +9618,7 @@ id,file,description,date,author,platform,type,port
|
||||||
10329,platforms/php/webapps/10329.txt,"AROUNDMe <= 1.1 (language_path) Remote File Include Exploit",2009-12-06,"cr4wl3r ",php,webapps,0
|
10329,platforms/php/webapps/10329.txt,"AROUNDMe <= 1.1 (language_path) Remote File Include Exploit",2009-12-06,"cr4wl3r ",php,webapps,0
|
||||||
10330,platforms/php/webapps/10330.txt,"elkagroup SQL Injection Vulnerability",2009-12-06,SadHaCkEr,php,webapps,0
|
10330,platforms/php/webapps/10330.txt,"elkagroup SQL Injection Vulnerability",2009-12-06,SadHaCkEr,php,webapps,0
|
||||||
10331,platforms/windows/webapps/10331.txt,"iWeb HTTP Server Directory Transversal Vulnerability",2009-12-06,mr_me,windows,webapps,0
|
10331,platforms/windows/webapps/10331.txt,"iWeb HTTP Server Directory Transversal Vulnerability",2009-12-06,mr_me,windows,webapps,0
|
||||||
10332,platforms/windows/local/10332.rb,"IDEAL Administration 2009 9.7 - Buffer Overflow - MSF Universal",2009-12-06,dookie,windows,local,0
|
10332,platforms/windows/local/10332.rb,"IDEAL Administration 2009 9.7 - Buffer Overflow - Metasploit Universal",2009-12-06,dookie,windows,local,0
|
||||||
10333,platforms/windows/dos/10333.py,"VLC Media Player 1.0.3 smb:// URI Handling Remote Stack Overflow PoC",2009-12-06,Dr_IDE,windows,dos,0
|
10333,platforms/windows/dos/10333.py,"VLC Media Player 1.0.3 smb:// URI Handling Remote Stack Overflow PoC",2009-12-06,Dr_IDE,windows,dos,0
|
||||||
10334,platforms/multiple/dos/10334.py,"VLC Media Player <= 1.0.3 RTSP Buffer Overflow PoC (OSX/Linux)",2009-12-06,Dr_IDE,multiple,dos,0
|
10334,platforms/multiple/dos/10334.py,"VLC Media Player <= 1.0.3 RTSP Buffer Overflow PoC (OSX/Linux)",2009-12-06,Dr_IDE,multiple,dos,0
|
||||||
10335,platforms/windows/local/10335.rb,"HTML Help Workshop 4.74 - (hhp Project File) Buffer Overflow Exploit (Meta)",2009-12-07,loneferret,windows,local,0
|
10335,platforms/windows/local/10335.rb,"HTML Help Workshop 4.74 - (hhp Project File) Buffer Overflow Exploit (Meta)",2009-12-07,loneferret,windows,local,0
|
||||||
|
@ -9654,7 +9654,7 @@ id,file,description,date,author,platform,type,port
|
||||||
10370,platforms/php/webapps/10370.txt,"PHP Inventory 1.2 - Remote (Auth Bypass) SQL Injection Vulnerabiity",2009-12-10,mr_me,php,webapps,0
|
10370,platforms/php/webapps/10370.txt,"PHP Inventory 1.2 - Remote (Auth Bypass) SQL Injection Vulnerabiity",2009-12-10,mr_me,php,webapps,0
|
||||||
10371,platforms/windows/local/10371.pl,"Xenorate 2.50 - (.xpl) universal Local Buffer Overflow Exploit (SEH)",2009-12-10,germaya_x,windows,local,0
|
10371,platforms/windows/local/10371.pl,"Xenorate 2.50 - (.xpl) universal Local Buffer Overflow Exploit (SEH)",2009-12-10,germaya_x,windows,local,0
|
||||||
10372,platforms/aix/webapps/10372.txt,"OPMANAGER - Blind SQL/XPath injectio",2009-12-10,"Asheesh kumar Mani Tripathi",aix,webapps,0
|
10372,platforms/aix/webapps/10372.txt,"OPMANAGER - Blind SQL/XPath injectio",2009-12-10,"Asheesh kumar Mani Tripathi",aix,webapps,0
|
||||||
10373,platforms/windows/local/10373.rb,"Xenorate 2.50 - (.xpl) universal Local Buffer Overflow Exploit (SEH) (meta)",2009-12-10,"loneferret germaya_x",windows,local,0
|
10373,platforms/windows/local/10373.rb,"Xenorate 2.50 - (.xpl) universal Local Buffer Overflow Exploit (SEH) (Metasploit)",2009-12-10,"loneferret germaya_x",windows,local,0
|
||||||
10374,platforms/windows/local/10374.pl,"Easy RM to MP3 Converter 2.7.3.700",2009-12-10,"Vinod Sharma",windows,local,0
|
10374,platforms/windows/local/10374.pl,"Easy RM to MP3 Converter 2.7.3.700",2009-12-10,"Vinod Sharma",windows,local,0
|
||||||
10375,platforms/windows/remote/10375.html,"SAP GUI for Windows sapirrfc.dll ActiveX Overflow Exploit",2009-12-10,Abysssec,windows,remote,0
|
10375,platforms/windows/remote/10375.html,"SAP GUI for Windows sapirrfc.dll ActiveX Overflow Exploit",2009-12-10,Abysssec,windows,remote,0
|
||||||
10376,platforms/windows/webapps/10376.txt,"Billwerx RC 3.1 - Multiple Vulnerabilities",2009-12-11,mr_me,windows,webapps,80
|
10376,platforms/windows/webapps/10376.txt,"Billwerx RC 3.1 - Multiple Vulnerabilities",2009-12-11,mr_me,windows,webapps,80
|
||||||
|
@ -9669,7 +9669,7 @@ id,file,description,date,author,platform,type,port
|
||||||
10389,platforms/php/webapps/10389.txt,"Illogator Shop SQL Injection Bypass",2009-12-11,bi0,php,webapps,0
|
10389,platforms/php/webapps/10389.txt,"Illogator Shop SQL Injection Bypass",2009-12-11,bi0,php,webapps,0
|
||||||
10390,platforms/php/webapps/10390.txt,"phpCollegeExchange 0.1.5c Multiple SQL Injection Vulnerabilities",2009-12-11,"Salvatore Fresta",php,webapps,0
|
10390,platforms/php/webapps/10390.txt,"phpCollegeExchange 0.1.5c Multiple SQL Injection Vulnerabilities",2009-12-11,"Salvatore Fresta",php,webapps,0
|
||||||
10391,platforms/php/webapps/10391.txt,"XAMPP 1.7.2 Change Administrative Password",2009-12-11,bi0,php,webapps,0
|
10391,platforms/php/webapps/10391.txt,"XAMPP 1.7.2 Change Administrative Password",2009-12-11,bi0,php,webapps,0
|
||||||
10392,platforms/windows/local/10392.rb,"Millenium MP3 Studio 2.0 (PLS File) Universal Stack Overflow (meta)",2009-12-11,dookie,windows,local,0
|
10392,platforms/windows/local/10392.rb,"Millenium MP3 Studio 2.0 (PLS File) Universal Stack Overflow (Metasploit)",2009-12-11,dookie,windows,local,0
|
||||||
10393,platforms/php/webapps/10393.txt,"B2C Booking Centre Systems SQL Injection",2009-12-11,"Salvatore Fresta",php,webapps,0
|
10393,platforms/php/webapps/10393.txt,"B2C Booking Centre Systems SQL Injection",2009-12-11,"Salvatore Fresta",php,webapps,0
|
||||||
10394,platforms/windows/remote/10394.py,"HP NNM 7.53 ovalarm.exe CGI Pre Authentication Remote Buffer Overflow",2009-12-12,"sinn3r and muts",windows,remote,80
|
10394,platforms/windows/remote/10394.py,"HP NNM 7.53 ovalarm.exe CGI Pre Authentication Remote Buffer Overflow",2009-12-12,"sinn3r and muts",windows,remote,80
|
||||||
14948,platforms/php/webapps/14948.txt,"festos CMS 2.3b - Multiple Vulnerabilities",2010-09-09,Abysssec,php,webapps,0
|
14948,platforms/php/webapps/14948.txt,"festos CMS 2.3b - Multiple Vulnerabilities",2010-09-09,Abysssec,php,webapps,0
|
||||||
|
@ -9802,7 +9802,7 @@ id,file,description,date,author,platform,type,port
|
||||||
10553,platforms/hardware/dos/10553.rb,"3Com OfficeConnect Routers Remote DoS Exploit",2009-12-19,"Alberto Ortega Llamas",hardware,dos,0
|
10553,platforms/hardware/dos/10553.rb,"3Com OfficeConnect Routers Remote DoS Exploit",2009-12-19,"Alberto Ortega Llamas",hardware,dos,0
|
||||||
10555,platforms/php/webapps/10555.txt,"Barracuda Web Firewall 660 Firmware 7.3.1.007 - Vulnerability",2009-12-19,Global-Evolution,php,webapps,0
|
10555,platforms/php/webapps/10555.txt,"Barracuda Web Firewall 660 Firmware 7.3.1.007 - Vulnerability",2009-12-19,Global-Evolution,php,webapps,0
|
||||||
10556,platforms/windows/local/10556.c,"PlayMeNow 7.3 / 7.4 - Malformed M3U Playlist File Buffer",2009-12-19,Gr33nG0bL1n,windows,local,0
|
10556,platforms/windows/local/10556.c,"PlayMeNow 7.3 / 7.4 - Malformed M3U Playlist File Buffer",2009-12-19,Gr33nG0bL1n,windows,local,0
|
||||||
10557,platforms/php/local/10557.php,"PHP 5.2.12/5.3.1 symlink() open_basedir bypass",2009-12-19,"Maksymilian Arciemowicz",php,local,0
|
10557,platforms/php/local/10557.php,"PHP 5.2.12/5.3.1 - symlink() open_basedir Bypass",2009-12-19,"Maksymilian Arciemowicz",php,local,0
|
||||||
10558,platforms/asp/webapps/10558.txt,"Toast Forums 1.8 - Database Disclosure Vulnerability",2009-12-19,"ViRuSMaN ",asp,webapps,0
|
10558,platforms/asp/webapps/10558.txt,"Toast Forums 1.8 - Database Disclosure Vulnerability",2009-12-19,"ViRuSMaN ",asp,webapps,0
|
||||||
10560,platforms/php/webapps/10560.txt,"Lizard Cart Multiple SQL Injection Exploit",2009-12-19,"cr4wl3r ",php,webapps,0
|
10560,platforms/php/webapps/10560.txt,"Lizard Cart Multiple SQL Injection Exploit",2009-12-19,"cr4wl3r ",php,webapps,0
|
||||||
10561,platforms/php/webapps/10561.txt,"CFAGCMS SQL Injection Exploit",2009-12-19,"cr4wl3r ",php,webapps,0
|
10561,platforms/php/webapps/10561.txt,"CFAGCMS SQL Injection Exploit",2009-12-19,"cr4wl3r ",php,webapps,0
|
||||||
|
@ -10258,7 +10258,7 @@ id,file,description,date,author,platform,type,port
|
||||||
11171,platforms/windows/local/11171.pl,"Audiotran 1.4.1 - Direct RET BoF",2010-01-17,jacky,windows,local,0
|
11171,platforms/windows/local/11171.pl,"Audiotran 1.4.1 - Direct RET BoF",2010-01-17,jacky,windows,local,0
|
||||||
11172,platforms/windows/remote/11172.html,"Adobe GetPlus get_atlcom 1.6.2.48 - ActiveX Remote Exec PoC (0day)",2010-01-17,superli,windows,remote,0
|
11172,platforms/windows/remote/11172.html,"Adobe GetPlus get_atlcom 1.6.2.48 - ActiveX Remote Exec PoC (0day)",2010-01-17,superli,windows,remote,0
|
||||||
11173,platforms/windows/remote/11173.txt,"TrendMicro Web-Deployment ActiveX - Remote Exec PoC (0day)",2010-01-17,superli,windows,remote,0
|
11173,platforms/windows/remote/11173.txt,"TrendMicro Web-Deployment ActiveX - Remote Exec PoC (0day)",2010-01-17,superli,windows,remote,0
|
||||||
11174,platforms/windows/local/11174.c,"VLC 0.8.6 [b][c][d][a] - (.ASS) Buffer Overflow Exploit(Win32 universal)",2010-01-17,"fl0 fl0w",windows,local,0
|
11174,platforms/windows/local/11174.c,"VLC 0.8.6 a/b/c/d - (.ASS) Buffer Overflow Exploit (Win32 universal)",2010-01-17,"fl0 fl0w",windows,local,0
|
||||||
11176,platforms/windows/dos/11176.txt,"Xunlei XPPlayer <= 5.9.14.1246 - ActiveX Remote Exec PoC (0day)",2010-01-17,superli,windows,dos,0
|
11176,platforms/windows/dos/11176.txt,"Xunlei XPPlayer <= 5.9.14.1246 - ActiveX Remote Exec PoC (0day)",2010-01-17,superli,windows,dos,0
|
||||||
11177,platforms/php/webapps/11177.txt,"Joomla Component com_prime Directory Traversal",2010-01-17,FL0RiX,php,webapps,0
|
11177,platforms/php/webapps/11177.txt,"Joomla Component com_prime Directory Traversal",2010-01-17,FL0RiX,php,webapps,0
|
||||||
11178,platforms/php/webapps/11178.txt,"Joomla Component com_libros SQL Injection Vulnerability",2010-01-17,FL0RiX,php,webapps,0
|
11178,platforms/php/webapps/11178.txt,"Joomla Component com_libros SQL Injection Vulnerability",2010-01-17,FL0RiX,php,webapps,0
|
||||||
|
@ -10286,7 +10286,7 @@ id,file,description,date,author,platform,type,port
|
||||||
11205,platforms/windows/local/11205.pl,"MP3 Studio 1.x - (.m3u) Local Stack Overflow (Universal)",2010-01-20,"D3V!L FUCKER",windows,local,0
|
11205,platforms/windows/local/11205.pl,"MP3 Studio 1.x - (.m3u) Local Stack Overflow (Universal)",2010-01-20,"D3V!L FUCKER",windows,local,0
|
||||||
11208,platforms/windows/local/11208.pl,"jetAudio 8.0.0.2 Basic (m3u) Stack Overflow Exploit",2010-01-21,"cr4wl3r ",windows,local,0
|
11208,platforms/windows/local/11208.pl,"jetAudio 8.0.0.2 Basic (m3u) Stack Overflow Exploit",2010-01-21,"cr4wl3r ",windows,local,0
|
||||||
11209,platforms/windows/dos/11209.pl,"jetAudio 8.0.0.2 Basic (.asx) - Local Crash Exploit",2010-01-21,"cr4wl3r ",windows,dos,0
|
11209,platforms/windows/dos/11209.pl,"jetAudio 8.0.0.2 Basic (.asx) - Local Crash Exploit",2010-01-21,"cr4wl3r ",windows,dos,0
|
||||||
11210,platforms/windows/remote/11210.rb,"EFS Easy Chat server Universal BOF-SEH (Meta)",2010-01-21,fb1h2s,windows,remote,0
|
11210,platforms/windows/remote/11210.rb,"EFS Easy Chat Server - Universal BOF-SEH (Metasploit)",2010-01-21,fb1h2s,windows,remote,0
|
||||||
11211,platforms/multiple/webapps/11211.txt,"cPanel - HTTP Response Splitting Vulnerability",2010-01-21,Trancer,multiple,webapps,0
|
11211,platforms/multiple/webapps/11211.txt,"cPanel - HTTP Response Splitting Vulnerability",2010-01-21,Trancer,multiple,webapps,0
|
||||||
11212,platforms/asp/webapps/11212.txt,"eWebeditor Directory Traversal",2010-01-21,N/A,asp,webapps,0
|
11212,platforms/asp/webapps/11212.txt,"eWebeditor Directory Traversal",2010-01-21,N/A,asp,webapps,0
|
||||||
11213,platforms/php/webapps/11213.txt,"Joomla Component com_book SQL Injection Vulnerability",2010-01-21,Evil-Cod3r,php,webapps,0
|
11213,platforms/php/webapps/11213.txt,"Joomla Component com_book SQL Injection Vulnerability",2010-01-21,Evil-Cod3r,php,webapps,0
|
||||||
|
@ -10639,10 +10639,10 @@ id,file,description,date,author,platform,type,port
|
||||||
11623,platforms/php/webapps/11623.txt,"smartplugs 1.3 - SQL Injection showplugs.php",2010-03-03,"Easy Laster",php,webapps,0
|
11623,platforms/php/webapps/11623.txt,"smartplugs 1.3 - SQL Injection showplugs.php",2010-03-03,"Easy Laster",php,webapps,0
|
||||||
11624,platforms/php/webapps/11624.pl,"MiNBank 1.5.0 - Remote Command Execution Exploit",2010-03-03,JosS,php,webapps,0
|
11624,platforms/php/webapps/11624.pl,"MiNBank 1.5.0 - Remote Command Execution Exploit",2010-03-03,JosS,php,webapps,0
|
||||||
11625,platforms/php/webapps/11625.txt,"Joomla Component com_blog directory traversal",2010-03-03,"DevilZ TM",php,webapps,0
|
11625,platforms/php/webapps/11625.txt,"Joomla Component com_blog directory traversal",2010-03-03,"DevilZ TM",php,webapps,0
|
||||||
11627,platforms/php/webapps/11627.txt,"PHPNUKE CMS (Survey and Poll) SQL Injection Vulnerability",2010-03-04,SENOT,php,webapps,0
|
11627,platforms/php/webapps/11627.txt,"PHP-Nuke CMS - (Survey and Poll) SQL Injection Vulnerability",2010-03-04,SENOT,php,webapps,0
|
||||||
11628,platforms/windows/dos/11628.pl,"AKoff MIDI Player 1.00 - Buffer Overflow Exploit",2010-03-04,"cr4wl3r ",windows,dos,0
|
11628,platforms/windows/dos/11628.pl,"AKoff MIDI Player 1.00 - Buffer Overflow Exploit",2010-03-04,"cr4wl3r ",windows,dos,0
|
||||||
11630,platforms/windows/dos/11630.pl,"WinSmMuPl 1.2.5 - (.mp3) Local Crash PoC",2010-03-04,"cr4wl3r ",windows,dos,0
|
11630,platforms/windows/dos/11630.pl,"WinSmMuPl 1.2.5 - (.mp3) Local Crash PoC",2010-03-04,"cr4wl3r ",windows,dos,0
|
||||||
11631,platforms/php/webapps/11631.txt,"PhP-Nuke user.php SQL Injection",2010-03-04,"Easy Laster",php,webapps,0
|
11631,platforms/php/webapps/11631.txt,"PHP-Nuke - user.php SQL Injection",2010-03-04,"Easy Laster",php,webapps,0
|
||||||
11632,platforms/windows/dos/11632.txt,"Orb 2.0.01.0049 - 2.54.0018 - DirectShow DoS",2010-03-04,"Matthew Bergin",windows,dos,0
|
11632,platforms/windows/dos/11632.txt,"Orb 2.0.01.0049 - 2.54.0018 - DirectShow DoS",2010-03-04,"Matthew Bergin",windows,dos,0
|
||||||
11633,platforms/hardware/dos/11633.pl,"Sagem Routers Remote Reset Exploit",2010-03-04,AlpHaNiX,hardware,dos,0
|
11633,platforms/hardware/dos/11633.pl,"Sagem Routers Remote Reset Exploit",2010-03-04,AlpHaNiX,hardware,dos,0
|
||||||
11634,platforms/hardware/webapps/11634.pl,"Sagem Routers Remote Auth bypass Exploit",2010-03-04,AlpHaNiX,hardware,webapps,0
|
11634,platforms/hardware/webapps/11634.pl,"Sagem Routers Remote Auth bypass Exploit",2010-03-04,AlpHaNiX,hardware,webapps,0
|
||||||
|
@ -10730,7 +10730,7 @@ id,file,description,date,author,platform,type,port
|
||||||
14367,platforms/multiple/dos/14367.txt,"Novell Groupwise Webaccess Stack Overflow",2010-07-15,"Francis Provencher",multiple,dos,0
|
14367,platforms/multiple/dos/14367.txt,"Novell Groupwise Webaccess Stack Overflow",2010-07-15,"Francis Provencher",multiple,dos,0
|
||||||
11730,platforms/php/webapps/11730.txt,"Joomla com_nfnaddressbook Remote SQL Injection Vulnerability",2010-03-14,snakespc,php,webapps,0
|
11730,platforms/php/webapps/11730.txt,"Joomla com_nfnaddressbook Remote SQL Injection Vulnerability",2010-03-14,snakespc,php,webapps,0
|
||||||
11731,platforms/php/webapps/11731.html,"RogioBiz PHP Fle Manager 1.2 - Bypass Admin Exploit",2010-03-14,ITSecTeam,php,webapps,0
|
11731,platforms/php/webapps/11731.html,"RogioBiz PHP Fle Manager 1.2 - Bypass Admin Exploit",2010-03-14,ITSecTeam,php,webapps,0
|
||||||
11732,platforms/php/webapps/11732.txt,"Php-Nuke - Local File Include Vulnerability",2010-03-14,ITSecTeam,php,webapps,0
|
11732,platforms/php/webapps/11732.txt,"PHP-Nuke - Local File Include Vulnerability",2010-03-14,ITSecTeam,php,webapps,0
|
||||||
11733,platforms/php/webapps/11733.txt,"phppool media Domain Verkaufs und Auktions Portal index.php SQL Injection",2010-03-14,"Easy Laster",php,webapps,0
|
11733,platforms/php/webapps/11733.txt,"phppool media Domain Verkaufs und Auktions Portal index.php SQL Injection",2010-03-14,"Easy Laster",php,webapps,0
|
||||||
11734,platforms/windows/dos/11734.py,"httpdx 1.5.3b - Multiple Remote Pre-Authentication DoS (PoC)",2010-03-14,loneferret,windows,dos,0
|
11734,platforms/windows/dos/11734.py,"httpdx 1.5.3b - Multiple Remote Pre-Authentication DoS (PoC)",2010-03-14,loneferret,windows,dos,0
|
||||||
11735,platforms/php/webapps/11735.php,"DZCP (deV!L_z Clanportal) 1.5.2 - Remote File Include Vulnerability",2010-03-14,"cr4wl3r ",php,webapps,0
|
11735,platforms/php/webapps/11735.php,"DZCP (deV!L_z Clanportal) 1.5.2 - Remote File Include Vulnerability",2010-03-14,"cr4wl3r ",php,webapps,0
|
||||||
|
@ -11113,7 +11113,7 @@ id,file,description,date,author,platform,type,port
|
||||||
12162,platforms/php/webapps/12162.txt,"Joomla component mv_restaurantmenumanager SQL Injection Vulnerability",2010-04-11,Sudden_death,php,webapps,0
|
12162,platforms/php/webapps/12162.txt,"Joomla component mv_restaurantmenumanager SQL Injection Vulnerability",2010-04-11,Sudden_death,php,webapps,0
|
||||||
12163,platforms/php/webapps/12163.txt,"Worldviewer.com CMS SQL Injection Vulnerability",2010-04-12,"41.w4r10r aka AN1L",php,webapps,0
|
12163,platforms/php/webapps/12163.txt,"Worldviewer.com CMS SQL Injection Vulnerability",2010-04-12,"41.w4r10r aka AN1L",php,webapps,0
|
||||||
12164,platforms/php/webapps/12164.txt,"YaPig 0.94.0u - Remote File Inclusion Vulnerability",2010-04-12,JIKO,php,webapps,0
|
12164,platforms/php/webapps/12164.txt,"YaPig 0.94.0u - Remote File Inclusion Vulnerability",2010-04-12,JIKO,php,webapps,0
|
||||||
12165,platforms/multiple/dos/12165.txt,"PHP 5.3.0 getopt() Denial of Service",2010-04-12,Napst3r,multiple,dos,0
|
12165,platforms/multiple/dos/12165.txt,"PHP 5.3.0 - getopt() Denial of Service",2010-04-12,Napst3r,multiple,dos,0
|
||||||
12166,platforms/php/webapps/12166.txt,"Joomla Component Web TV com_webtv Local File Inclusion Vulnerability",2010-04-12,AntiSecurity,php,webapps,0
|
12166,platforms/php/webapps/12166.txt,"Joomla Component Web TV com_webtv Local File Inclusion Vulnerability",2010-04-12,AntiSecurity,php,webapps,0
|
||||||
12167,platforms/php/webapps/12167.txt,"Joomla Component Horoscope com_horoscope Local File Inclusion Vulnerability",2010-04-12,AntiSecurity,php,webapps,0
|
12167,platforms/php/webapps/12167.txt,"Joomla Component Horoscope com_horoscope Local File Inclusion Vulnerability",2010-04-12,AntiSecurity,php,webapps,0
|
||||||
12168,platforms/php/webapps/12168.txt,"Joomla Component Arcade Games com_arcadegames Local File Inclusion Vulnerability",2010-04-12,AntiSecurity,php,webapps,0
|
12168,platforms/php/webapps/12168.txt,"Joomla Component Arcade Games com_arcadegames Local File Inclusion Vulnerability",2010-04-12,AntiSecurity,php,webapps,0
|
||||||
|
@ -11200,7 +11200,7 @@ id,file,description,date,author,platform,type,port
|
||||||
12256,platforms/php/webapps/12256.txt,"ilchClan <= 1.0.5B SQL Injection Vulnerability Exploit",2010-04-16,"Easy Laster",php,webapps,0
|
12256,platforms/php/webapps/12256.txt,"ilchClan <= 1.0.5B SQL Injection Vulnerability Exploit",2010-04-16,"Easy Laster",php,webapps,0
|
||||||
12257,platforms/php/webapps/12257.txt,"joomla component com_manager 1.5.3 - (id) SQL Injection Vulnerability",2010-04-16,"Islam DefenDers Mr.HaMaDa",php,webapps,0
|
12257,platforms/php/webapps/12257.txt,"joomla component com_manager 1.5.3 - (id) SQL Injection Vulnerability",2010-04-16,"Islam DefenDers Mr.HaMaDa",php,webapps,0
|
||||||
12258,platforms/windows/dos/12258.py,"Windows - SMB Client-Side Bug Proof of Concept (MS10-006)",2010-04-16,"laurent gaffie",windows,dos,0
|
12258,platforms/windows/dos/12258.py,"Windows - SMB Client-Side Bug Proof of Concept (MS10-006)",2010-04-16,"laurent gaffie",windows,dos,0
|
||||||
12259,platforms/php/dos/12259.php,"PHP 5.3.x DoS",2010-04-16,ITSecTeam,php,dos,0
|
12259,platforms/php/dos/12259.php,"PHP 5.3.x - DoS",2010-04-16,ITSecTeam,php,dos,0
|
||||||
12260,platforms/php/webapps/12260.txt,"SIESTTA 2.0 - (LFI/XSS) Multiple Vulnerabilities",2010-04-16,JosS,php,webapps,0
|
12260,platforms/php/webapps/12260.txt,"SIESTTA 2.0 - (LFI/XSS) Multiple Vulnerabilities",2010-04-16,JosS,php,webapps,0
|
||||||
12261,platforms/windows/local/12261.rb,"Archive Searcher - (.zip) Stack Overflow",2010-04-16,Lincoln,windows,local,0
|
12261,platforms/windows/local/12261.rb,"Archive Searcher - (.zip) Stack Overflow",2010-04-16,Lincoln,windows,local,0
|
||||||
12262,platforms/php/webapps/12262.php,"ZykeCMS 1.1 - (Auth Bypass) SQL Injection Vulnerability",2010-04-16,"Giuseppe 'giudinvx' D'Inverno",php,webapps,0
|
12262,platforms/php/webapps/12262.php,"ZykeCMS 1.1 - (Auth Bypass) SQL Injection Vulnerability",2010-04-16,"Giuseppe 'giudinvx' D'Inverno",php,webapps,0
|
||||||
|
@ -11422,7 +11422,7 @@ id,file,description,date,author,platform,type,port
|
||||||
12510,platforms/php/webapps/12510.php,"PHP-Nuke 7.0/8.1/8.1.35 - Wormable Remote Code Execution",2010-05-05,"Michael Brooks",php,webapps,0
|
12510,platforms/php/webapps/12510.php,"PHP-Nuke 7.0/8.1/8.1.35 - Wormable Remote Code Execution",2010-05-05,"Michael Brooks",php,webapps,0
|
||||||
12511,platforms/windows/remote/12511.txt,"MDaemon Mailer Daemon 11.0.1 - Remote File Disclosure",2010-05-05,kingcope,windows,remote,0
|
12511,platforms/windows/remote/12511.txt,"MDaemon Mailer Daemon 11.0.1 - Remote File Disclosure",2010-05-05,kingcope,windows,remote,0
|
||||||
12512,platforms/windows/remote/12512.py,"Ziepod+ 1.0 - CrossApplication Scripting",2010-05-05,sinn3r,windows,remote,0
|
12512,platforms/windows/remote/12512.py,"Ziepod+ 1.0 - CrossApplication Scripting",2010-05-05,sinn3r,windows,remote,0
|
||||||
12514,platforms/php/webapps/12514.txt,"PHP-NUKE 5.0 - Viewslink Remote SQL Injection",2010-05-05,CMD,php,webapps,0
|
12514,platforms/php/webapps/12514.txt,"PHP-Nuke 5.0 - Viewslink Remote SQL Injection",2010-05-05,CMD,php,webapps,0
|
||||||
12515,platforms/php/webapps/12515.txt,"Slooze PHP Web Photo Album 0.2.7 - Command Execution Vulnerability",2010-05-05,"Sn!pEr.S!Te Hacker",php,webapps,0
|
12515,platforms/php/webapps/12515.txt,"Slooze PHP Web Photo Album 0.2.7 - Command Execution Vulnerability",2010-05-05,"Sn!pEr.S!Te Hacker",php,webapps,0
|
||||||
12516,platforms/windows/local/12516.py,"BaoFeng Storm M3U File Processing Buffer Overflow Exploit",2010-05-06,"Lufeng Li and Qingshan Li",windows,local,0
|
12516,platforms/windows/local/12516.py,"BaoFeng Storm M3U File Processing Buffer Overflow Exploit",2010-05-06,"Lufeng Li and Qingshan Li",windows,local,0
|
||||||
12517,platforms/php/webapps/12517.txt,"GetSimple 2.01 - LFI",2010-05-06,Batch,php,webapps,0
|
12517,platforms/php/webapps/12517.txt,"GetSimple 2.01 - LFI",2010-05-06,Batch,php,webapps,0
|
||||||
|
@ -12380,7 +12380,7 @@ id,file,description,date,author,platform,type,port
|
||||||
14055,platforms/php/webapps/14055.txt,"Joomla Component (com_sef) RFI",2010-06-26,Li0n-PaL,php,webapps,0
|
14055,platforms/php/webapps/14055.txt,"Joomla Component (com_sef) RFI",2010-06-26,Li0n-PaL,php,webapps,0
|
||||||
14056,platforms/php/webapps/14056.txt,"Clicker CMS Blind SQL Injection Vulnerability",2010-06-26,hacker@sr.gov.yu,php,webapps,0
|
14056,platforms/php/webapps/14056.txt,"Clicker CMS Blind SQL Injection Vulnerability",2010-06-26,hacker@sr.gov.yu,php,webapps,0
|
||||||
14057,platforms/php/webapps/14057.txt,"WordPress Cimy Counter - Vulnerabilities",2010-06-26,sebug,php,webapps,0
|
14057,platforms/php/webapps/14057.txt,"WordPress Cimy Counter - Vulnerabilities",2010-06-26,sebug,php,webapps,0
|
||||||
14058,platforms/aix/webapps/14058.html,"PHPnuke 8.2 - Remote Upload File Exploit",2010-06-26,Net.Edit0r,aix,webapps,0
|
14058,platforms/aix/webapps/14058.html,"PHP-Nuke 8.2 - Remote Upload File Exploit",2010-06-26,Net.Edit0r,aix,webapps,0
|
||||||
14059,platforms/php/webapps/14059.txt,"Joomla JE Awd Song Component Persistent XSS Vulnerability",2010-06-26,Sid3^effects,php,webapps,0
|
14059,platforms/php/webapps/14059.txt,"Joomla JE Awd Song Component Persistent XSS Vulnerability",2010-06-26,Sid3^effects,php,webapps,0
|
||||||
14060,platforms/php/webapps/14060.txt,"Joomla JE Media Player Component LFI Vulnerability",2010-06-26,Sid3^effects,php,webapps,0
|
14060,platforms/php/webapps/14060.txt,"Joomla JE Media Player Component LFI Vulnerability",2010-06-26,Sid3^effects,php,webapps,0
|
||||||
14085,platforms/php/webapps/14085.txt,"iNet Online Community Blind SQLi Vulnerability",2010-06-28,JaMbA,php,webapps,0
|
14085,platforms/php/webapps/14085.txt,"iNet Online Community Blind SQLi Vulnerability",2010-06-28,JaMbA,php,webapps,0
|
||||||
|
@ -12585,7 +12585,7 @@ id,file,description,date,author,platform,type,port
|
||||||
14335,platforms/php/webapps/14335.txt,"Joomla Health & Fitness Stats Persistent XSS Vulnerability",2010-07-12,Sid3^effects,php,webapps,0
|
14335,platforms/php/webapps/14335.txt,"Joomla Health & Fitness Stats Persistent XSS Vulnerability",2010-07-12,Sid3^effects,php,webapps,0
|
||||||
14318,platforms/php/webapps/14318.html,"Elite CMS 1.01 - Multiple XSS/CSRF Vulnerabilities",2010-07-10,10n1z3d,php,webapps,0
|
14318,platforms/php/webapps/14318.html,"Elite CMS 1.01 - Multiple XSS/CSRF Vulnerabilities",2010-07-10,10n1z3d,php,webapps,0
|
||||||
14319,platforms/php/webapps/14319.pl,"PHP-Nuke <= 8.1.0.3.5b Remote Command Execution Exploit",2010-07-10,yawn,php,webapps,0
|
14319,platforms/php/webapps/14319.pl,"PHP-Nuke <= 8.1.0.3.5b Remote Command Execution Exploit",2010-07-10,yawn,php,webapps,0
|
||||||
14320,platforms/php/webapps/14320.pl,"PHP-Nuke <= 8.1.0.3.5b (Your_Account Module) Remote Blind SQL Injection (Benchmark Mode)",2010-07-10,yawn,php,webapps,0
|
14320,platforms/php/webapps/14320.pl,"PHP-Nuke <= 8.1.0.3.5b (Your_Account Module) - Remote Blind SQL Injection (Benchmark Mode)",2010-07-10,yawn,php,webapps,0
|
||||||
14324,platforms/php/webapps/14324.txt,"Sillaj time tracking tool Authentication Bypass",2010-07-10,"L0rd CrusAd3r",php,webapps,0
|
14324,platforms/php/webapps/14324.txt,"Sillaj time tracking tool Authentication Bypass",2010-07-10,"L0rd CrusAd3r",php,webapps,0
|
||||||
14325,platforms/php/webapps/14325.txt,"My Kazaam Notes Management System - Multiple Vulnerabilities",2010-07-10,"L0rd CrusAd3r",php,webapps,0
|
14325,platforms/php/webapps/14325.txt,"My Kazaam Notes Management System - Multiple Vulnerabilities",2010-07-10,"L0rd CrusAd3r",php,webapps,0
|
||||||
14326,platforms/php/webapps/14326.txt,"My Kazaam Address & Contact Organizer SQL Injection Vulnerability",2010-07-10,v3n0m,php,webapps,0
|
14326,platforms/php/webapps/14326.txt,"My Kazaam Address & Contact Organizer SQL Injection Vulnerability",2010-07-10,v3n0m,php,webapps,0
|
||||||
|
@ -12819,7 +12819,7 @@ id,file,description,date,author,platform,type,port
|
||||||
14623,platforms/windows/remote/14623.py,"Easy FTP Server 1.7.0.11 - Multiple Commands Remote Buffer Overflow Exploit (Post Auth)",2010-08-11,"Glafkos Charalambous ",windows,remote,21
|
14623,platforms/windows/remote/14623.py,"Easy FTP Server 1.7.0.11 - Multiple Commands Remote Buffer Overflow Exploit (Post Auth)",2010-08-11,"Glafkos Charalambous ",windows,remote,21
|
||||||
14624,platforms/windows/dos/14624.py,"JaMP Player 4.2.2.0 - Denial of Service Vulnerability",2010-08-12,"Oh Yaw Theng",windows,dos,0
|
14624,platforms/windows/dos/14624.py,"JaMP Player 4.2.2.0 - Denial of Service Vulnerability",2010-08-12,"Oh Yaw Theng",windows,dos,0
|
||||||
14625,platforms/windows/dos/14625.py,"CombiWave Lite 4.0.1.4 - Denial of Service Vulnerability",2010-08-12,"Oh Yaw Theng",windows,dos,0
|
14625,platforms/windows/dos/14625.py,"CombiWave Lite 4.0.1.4 - Denial of Service Vulnerability",2010-08-12,"Oh Yaw Theng",windows,dos,0
|
||||||
14628,platforms/win32/webapps/14628.txt,"PHP-Nuke-8.1-seo-Arabic Remote File Include",2010-08-12,LoSt.HaCkEr,win32,webapps,80
|
14628,platforms/win32/webapps/14628.txt,"PHP-Nuke 8.1 SEO Arabic - Remote File Include",2010-08-12,LoSt.HaCkEr,win32,webapps,80
|
||||||
14629,platforms/multiple/webapps/14629.html,"Kleeja Upload - CSRF Change Admin Password",2010-08-12,"KOLTN S",multiple,webapps,80
|
14629,platforms/multiple/webapps/14629.html,"Kleeja Upload - CSRF Change Admin Password",2010-08-12,"KOLTN S",multiple,webapps,80
|
||||||
14630,platforms/windows/local/14630.py,"Mediacoder 0.7.5.4710 - _Universal_ SEH Buffer Overflow Exploit",2010-08-12,Dr_IDE,windows,local,0
|
14630,platforms/windows/local/14630.py,"Mediacoder 0.7.5.4710 - _Universal_ SEH Buffer Overflow Exploit",2010-08-12,Dr_IDE,windows,local,0
|
||||||
14633,platforms/windows/local/14633.py,"Xion Player 1.0.125 - Stack Buffer Overflow Exploit",2010-08-13,corelanc0d3r,windows,local,0
|
14633,platforms/windows/local/14633.py,"Xion Player 1.0.125 - Stack Buffer Overflow Exploit",2010-08-13,corelanc0d3r,windows,local,0
|
||||||
|
@ -13425,7 +13425,7 @@ id,file,description,date,author,platform,type,port
|
||||||
15428,platforms/multiple/dos/15428.rb,"Avidemux <= 2.5.4 - Buffer Overflow Vulnerability",2010-11-05,The_UnKn@wn,multiple,dos,0
|
15428,platforms/multiple/dos/15428.rb,"Avidemux <= 2.5.4 - Buffer Overflow Vulnerability",2010-11-05,The_UnKn@wn,multiple,dos,0
|
||||||
15429,platforms/windows/dos/15429.txt,"FileFuzz Denial of Service Vulnerability",2010-11-05,Sweet,windows,dos,0
|
15429,platforms/windows/dos/15429.txt,"FileFuzz Denial of Service Vulnerability",2010-11-05,Sweet,windows,dos,0
|
||||||
15430,platforms/php/webapps/15430.txt,"Joomla ccInvoices Component (com_ccinvoices) SQL Injection Vulnerability",2010-11-05,FL0RiX,php,webapps,0
|
15430,platforms/php/webapps/15430.txt,"Joomla ccInvoices Component (com_ccinvoices) SQL Injection Vulnerability",2010-11-05,FL0RiX,php,webapps,0
|
||||||
15431,platforms/php/dos/15431.txt,"PHP 5.3.3/5.2.14 ZipArchive::getArchiveComment NULL Pointer Deference",2010-11-05,"Maksymilian Arciemowicz",php,dos,0
|
15431,platforms/php/dos/15431.txt,"PHP 5.3.3/5.2.14 - ZipArchive::getArchiveComment NULL Pointer Deference",2010-11-05,"Maksymilian Arciemowicz",php,dos,0
|
||||||
15432,platforms/windows/dos/15432.html,"LEADTOOLS 11.5.0.9 - (ltisi11n.ocx) DriverName() Access Violation DoS",2010-11-05,"Matthew Bergin",windows,dos,0
|
15432,platforms/windows/dos/15432.html,"LEADTOOLS 11.5.0.9 - (ltisi11n.ocx) DriverName() Access Violation DoS",2010-11-05,"Matthew Bergin",windows,dos,0
|
||||||
15433,platforms/windows/dos/15433.html,"LEADTOOLS 11.5.0.9 - (ltlst11n.ocx) Insert() Access Violation DoS",2010-11-05,"Matthew Bergin",windows,dos,0
|
15433,platforms/windows/dos/15433.html,"LEADTOOLS 11.5.0.9 - (ltlst11n.ocx) Insert() Access Violation DoS",2010-11-05,"Matthew Bergin",windows,dos,0
|
||||||
15434,platforms/windows/dos/15434.html,"LEADTOOLS 11.5.0.9 (ltdlg11n.ocx) - GetColorRes() Access Violation DoS",2010-11-05,"Matthew Bergin",windows,dos,0
|
15434,platforms/windows/dos/15434.html,"LEADTOOLS 11.5.0.9 (ltdlg11n.ocx) - GetColorRes() Access Violation DoS",2010-11-05,"Matthew Bergin",windows,dos,0
|
||||||
|
@ -13771,7 +13771,7 @@ id,file,description,date,author,platform,type,port
|
||||||
15856,platforms/php/webapps/15856.php,"TYPO3 Unauthenticated Arbitrary File Retrieval",2010-12-29,ikki,php,webapps,0
|
15856,platforms/php/webapps/15856.php,"TYPO3 Unauthenticated Arbitrary File Retrieval",2010-12-29,ikki,php,webapps,0
|
||||||
15855,platforms/windows/local/15855.py,"Digital Music Pad 8.2.3.4.8 - (.pls) SEH Overflow",2010-12-29,"Abhishek Lyall",windows,local,0
|
15855,platforms/windows/local/15855.py,"Digital Music Pad 8.2.3.4.8 - (.pls) SEH Overflow",2010-12-29,"Abhishek Lyall",windows,local,0
|
||||||
15857,platforms/php/webapps/15857.txt,"Discovery TorrentTrader 2.6 - Multiple Vulnerabilities",2010-12-29,EsS4ndre,php,webapps,0
|
15857,platforms/php/webapps/15857.txt,"Discovery TorrentTrader 2.6 - Multiple Vulnerabilities",2010-12-29,EsS4ndre,php,webapps,0
|
||||||
15858,platforms/php/webapps/15858.txt,"wordpress 3.0.3 - Stored XSS (IE6/7 NS8.1)",2010-12-29,Saif,php,webapps,0
|
15858,platforms/php/webapps/15858.txt,"WordPress 3.0.3 - Stored XSS (IE6/7 NS8.1)",2010-12-29,Saif,php,webapps,0
|
||||||
15860,platforms/windows/dos/15860.py,"TYPSoft FTP Server 1.10 - RETR CMD Denial of Service",2010-12-29,emgent,windows,dos,0
|
15860,platforms/windows/dos/15860.py,"TYPSoft FTP Server 1.10 - RETR CMD Denial of Service",2010-12-29,emgent,windows,dos,0
|
||||||
15861,platforms/windows/remote/15861.txt,"httpdasm 0.92 - Directory Traversal",2010-12-29,"John Leitch",windows,remote,0
|
15861,platforms/windows/remote/15861.txt,"httpdasm 0.92 - Directory Traversal",2010-12-29,"John Leitch",windows,remote,0
|
||||||
15862,platforms/windows/remote/15862.txt,"quickphp Web server 1.9.1 - Directory Traversal",2010-12-29,"John Leitch",windows,remote,0
|
15862,platforms/windows/remote/15862.txt,"quickphp Web server 1.9.1 - Directory Traversal",2010-12-29,"John Leitch",windows,remote,0
|
||||||
|
@ -13824,7 +13824,7 @@ id,file,description,date,author,platform,type,port
|
||||||
15940,platforms/windows/dos/15940.pl,"HP Data Protector Manager 6.11 - Remote DoS in RDS Service",2011-01-08,Pepelux,windows,dos,0
|
15940,platforms/windows/dos/15940.pl,"HP Data Protector Manager 6.11 - Remote DoS in RDS Service",2011-01-08,Pepelux,windows,dos,0
|
||||||
15941,platforms/windows/local/15941.py,"Winamp 5.5.8 (in_mod plugin) - Stack Overflow Exploit (SEH)",2011-01-08,fdiskyou,windows,local,0
|
15941,platforms/windows/local/15941.py,"Winamp 5.5.8 (in_mod plugin) - Stack Overflow Exploit (SEH)",2011-01-08,fdiskyou,windows,local,0
|
||||||
15942,platforms/php/webapps/15942.txt,"sahana agasti <= 0.6.5 - Multiple Vulnerabilities",2011-01-08,dun,php,webapps,0
|
15942,platforms/php/webapps/15942.txt,"sahana agasti <= 0.6.5 - Multiple Vulnerabilities",2011-01-08,dun,php,webapps,0
|
||||||
15943,platforms/php/webapps/15943.txt,"mingle forum (wordpress plugin) <= 1.0.26 - Multiple Vulnerabilities",2011-01-08,"Charles Hooper",php,webapps,0
|
15943,platforms/php/webapps/15943.txt,"WordPress Plugin mingle forum <= 1.0.26 - Multiple Vulnerabilities",2011-01-08,"Charles Hooper",php,webapps,0
|
||||||
15944,platforms/linux/local/15944.c,"Linux Kernel < 2.6.34 - CAP_SYS_ADMIN x86 & x64 - Local Privilege Escalation Exploit (2)",2011-01-08,"Joe Sylve",linux,local,0
|
15944,platforms/linux/local/15944.c,"Linux Kernel < 2.6.34 - CAP_SYS_ADMIN x86 & x64 - Local Privilege Escalation Exploit (2)",2011-01-08,"Joe Sylve",linux,local,0
|
||||||
15945,platforms/php/webapps/15945.txt,"Zwii 2.1.1 - Remote File Inclusion Vulnerbility",2011-01-08,"Abdi Mohamed",php,webapps,0
|
15945,platforms/php/webapps/15945.txt,"Zwii 2.1.1 - Remote File Inclusion Vulnerbility",2011-01-08,"Abdi Mohamed",php,webapps,0
|
||||||
16123,platforms/hardware/remote/16123.txt,"Comcast DOCSIS 3.0 Business Gateways Multiple Vulnerabilities",2011-02-06,"Trustwave's SpiderLabs",hardware,remote,0
|
16123,platforms/hardware/remote/16123.txt,"Comcast DOCSIS 3.0 Business Gateways Multiple Vulnerabilities",2011-02-06,"Trustwave's SpiderLabs",hardware,remote,0
|
||||||
|
@ -14007,7 +14007,7 @@ id,file,description,date,author,platform,type,port
|
||||||
16179,platforms/asp/webapps/16179.txt,"Rae Media Real Estate Multi Agent SQL Injection Vulnerability",2011-02-16,R4dc0re,asp,webapps,0
|
16179,platforms/asp/webapps/16179.txt,"Rae Media Real Estate Multi Agent SQL Injection Vulnerability",2011-02-16,R4dc0re,asp,webapps,0
|
||||||
16180,platforms/windows/dos/16180.py,"BWMeter 5.4.0 - (.csv) Denial of Service Vulnerability",2011-02-17,b0telh0,windows,dos,0
|
16180,platforms/windows/dos/16180.py,"BWMeter 5.4.0 - (.csv) Denial of Service Vulnerability",2011-02-17,b0telh0,windows,dos,0
|
||||||
16181,platforms/php/webapps/16181.txt,"WordPress User Photo Component - Remote File Upload Vulnerability",2011-02-17,ADVtools,php,webapps,0
|
16181,platforms/php/webapps/16181.txt,"WordPress User Photo Component - Remote File Upload Vulnerability",2011-02-17,ADVtools,php,webapps,0
|
||||||
16182,platforms/linux/dos/16182.txt,"PHP 5.3.5 grapheme_extract() NULL Pointer Dereference",2011-02-17,"Maksymilian Arciemowicz",linux,dos,0
|
16182,platforms/linux/dos/16182.txt,"PHP 5.3.5 - grapheme_extract() NULL Pointer Dereference",2011-02-17,"Maksymilian Arciemowicz",linux,dos,0
|
||||||
16193,platforms/windows/dos/16193.pl,"Avira AntiVir QUA file - (avcenter.exe) Local Crash PoC",2011-02-19,KedAns-Dz,windows,dos,0
|
16193,platforms/windows/dos/16193.pl,"Avira AntiVir QUA file - (avcenter.exe) Local Crash PoC",2011-02-19,KedAns-Dz,windows,dos,0
|
||||||
16204,platforms/windows/dos/16204.pl,"Solar FTP 2.1 - Denial of Service Exploit",2011-02-22,x000,windows,dos,0
|
16204,platforms/windows/dos/16204.pl,"Solar FTP 2.1 - Denial of Service Exploit",2011-02-22,x000,windows,dos,0
|
||||||
16190,platforms/windows/dos/16190.pl,"IBM Lotus Domino LDAP Bind Request Remote Code Execution Vulnerability",2011-02-18,"Francis Provencher",windows,dos,0
|
16190,platforms/windows/dos/16190.pl,"IBM Lotus Domino LDAP Bind Request Remote Code Execution Vulnerability",2011-02-18,"Francis Provencher",windows,dos,0
|
||||||
|
@ -14165,7 +14165,7 @@ id,file,description,date,author,platform,type,port
|
||||||
16359,platforms/windows/remote/16359.rb,"Microsoft WINS Service Memory Overwrite",2010-09-20,metasploit,windows,remote,0
|
16359,platforms/windows/remote/16359.rb,"Microsoft WINS Service Memory Overwrite",2010-09-20,metasploit,windows,remote,0
|
||||||
16360,platforms/windows/remote/16360.rb,"Microsoft Windows SMB Relay Code Execution",2010-09-21,metasploit,windows,remote,0
|
16360,platforms/windows/remote/16360.rb,"Microsoft Windows SMB Relay Code Execution",2010-09-21,metasploit,windows,remote,0
|
||||||
16361,platforms/windows/remote/16361.rb,"Microsoft Print Spooler Service - Impersonation Vulnerability (MS10-061)",2011-02-17,metasploit,windows,remote,0
|
16361,platforms/windows/remote/16361.rb,"Microsoft Print Spooler Service - Impersonation Vulnerability (MS10-061)",2011-02-17,metasploit,windows,remote,0
|
||||||
16362,platforms/windows/remote/16362.rb,"Microsoft Server Service Relative Path Stack Corruption",2011-01-21,metasploit,windows,remote,0
|
16362,platforms/windows/remote/16362.rb,"Microsoft Windows Server - Service Relative Path Stack Corruption (MS08-067)",2011-01-21,metasploit,windows,remote,0
|
||||||
16363,platforms/windows/remote/16363.rb,"Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference",2010-07-03,metasploit,windows,remote,0
|
16363,platforms/windows/remote/16363.rb,"Microsoft Windows SRV2.SYS SMB Negotiate ProcessID Function Table Dereference",2010-07-03,metasploit,windows,remote,0
|
||||||
16364,platforms/windows/remote/16364.rb,"Microsoft RRAS Service Overflow",2010-05-09,metasploit,windows,remote,0
|
16364,platforms/windows/remote/16364.rb,"Microsoft RRAS Service Overflow",2010-05-09,metasploit,windows,remote,0
|
||||||
16365,platforms/windows/dos/16365.rb,"Microsoft Plug and Play Service Overflow",2010-08-30,metasploit,windows,dos,0
|
16365,platforms/windows/dos/16365.rb,"Microsoft Plug and Play Service Overflow",2010-08-30,metasploit,windows,dos,0
|
||||||
|
@ -14764,7 +14764,7 @@ id,file,description,date,author,platform,type,port
|
||||||
16963,platforms/php/webapps/16963.txt,"Constructr CMS 3.03 Miltiple Remote Vulnerabilities",2011-03-11,LiquidWorm,php,webapps,0
|
16963,platforms/php/webapps/16963.txt,"Constructr CMS 3.03 Miltiple Remote Vulnerabilities",2011-03-11,LiquidWorm,php,webapps,0
|
||||||
16964,platforms/unix/remote/16964.rb,"Accellion File Transfer Appliance MPIPE2 Command Execution",2011-03-11,metasploit,unix,remote,8812
|
16964,platforms/unix/remote/16964.rb,"Accellion File Transfer Appliance MPIPE2 Command Execution",2011-03-11,metasploit,unix,remote,8812
|
||||||
16965,platforms/windows/local/16965.pl,"CoolZip 2.0 - zip Buffer Overflow Exploit",2011-03-12,"C4SS!0 G0M3S",windows,local,0
|
16965,platforms/windows/local/16965.pl,"CoolZip 2.0 - zip Buffer Overflow Exploit",2011-03-12,"C4SS!0 G0M3S",windows,local,0
|
||||||
16966,platforms/linux/dos/16966.php,"PHP <= 5.3.6 shmop_read() Integer Overflow DoS",2011-03-12,"Jose Carlos Norte",linux,dos,0
|
16966,platforms/linux/dos/16966.php,"PHP <= 5.3.6 - shmop_read() Integer Overflow DoS",2011-03-12,"Jose Carlos Norte",linux,dos,0
|
||||||
16968,platforms/php/webapps/16968.txt,"Cover Vision SQL Injection Vulnerability",2011-03-13,Egyptian.H4x0rz,php,webapps,0
|
16968,platforms/php/webapps/16968.txt,"Cover Vision SQL Injection Vulnerability",2011-03-13,Egyptian.H4x0rz,php,webapps,0
|
||||||
16969,platforms/php/webapps/16969.txt,"Log1 CMS 2.0 - Multiple Vulnerabilities",2011-03-14,Aodrulez,php,webapps,0
|
16969,platforms/php/webapps/16969.txt,"Log1 CMS 2.0 - Multiple Vulnerabilities",2011-03-14,Aodrulez,php,webapps,0
|
||||||
16970,platforms/windows/remote/16970.rb,"Kolibri <= 2.0 - HTTP Server HEAD Buffer Overflow",2011-08-03,metasploit,windows,remote,0
|
16970,platforms/windows/remote/16970.rb,"Kolibri <= 2.0 - HTTP Server HEAD Buffer Overflow",2011-08-03,metasploit,windows,remote,0
|
||||||
|
@ -14798,7 +14798,7 @@ id,file,description,date,author,platform,type,port
|
||||||
17001,platforms/windows/local/17001.pl,"CORE Multimedia Suite 2011 CORE Player 2.4 - Buffer Overflow (.m3u)",2011-03-18,Rh0,windows,local,0
|
17001,platforms/windows/local/17001.pl,"CORE Multimedia Suite 2011 CORE Player 2.4 - Buffer Overflow (.m3u)",2011-03-18,Rh0,windows,local,0
|
||||||
17002,platforms/php/webapps/17002.txt,"CMS Loko Media - Local File Download Vulnerability",2011-03-18,Xr0b0t,php,webapps,0
|
17002,platforms/php/webapps/17002.txt,"CMS Loko Media - Local File Download Vulnerability",2011-03-18,Xr0b0t,php,webapps,0
|
||||||
17003,platforms/php/webapps/17003.py,"iCMS 1.1 - Admin SQLi/Bruteforce Exploit",2011-03-18,TecR0c,php,webapps,0
|
17003,platforms/php/webapps/17003.py,"iCMS 1.1 - Admin SQLi/Bruteforce Exploit",2011-03-18,TecR0c,php,webapps,0
|
||||||
17004,platforms/linux/dos/17004.txt,"libzip 0.9.3 _zip_name_locate NULL Pointer Dereference (incl PHP 5.3.5)",2011-03-18,"Maksymilian Arciemowicz",linux,dos,0
|
17004,platforms/linux/dos/17004.txt,"(PHP 5.3.5) libzip 0.9.3 - _zip_name_locate NULL Pointer Dereference",2011-03-18,"Maksymilian Arciemowicz",linux,dos,0
|
||||||
17005,platforms/php/webapps/17005.txt,"Kleophatra 0.1.4 - Arbitrary Upload File Vulnerability (0day)",2011-03-19,Xr0b0t,php,webapps,0
|
17005,platforms/php/webapps/17005.txt,"Kleophatra 0.1.4 - Arbitrary Upload File Vulnerability (0day)",2011-03-19,Xr0b0t,php,webapps,0
|
||||||
17006,platforms/php/webapps/17006.txt,"balitbang CMS 3.3 - Multiple Vulnerabilities",2011-03-19,Xr0b0t,php,webapps,0
|
17006,platforms/php/webapps/17006.txt,"balitbang CMS 3.3 - Multiple Vulnerabilities",2011-03-19,Xr0b0t,php,webapps,0
|
||||||
17007,platforms/php/webapps/17007.txt,"Phpbuddies - Arbitrary Upload File Vulnerability",2011-03-19,Xr0b0t,php,webapps,0
|
17007,platforms/php/webapps/17007.txt,"Phpbuddies - Arbitrary Upload File Vulnerability",2011-03-19,Xr0b0t,php,webapps,0
|
||||||
|
@ -14976,7 +14976,7 @@ id,file,description,date,author,platform,type,port
|
||||||
17204,platforms/php/webapps/17204.txt,"DynMedia Pro Web CMS 4.0 - Local File Disclosure",2011-04-22,Mbah_Semar,php,webapps,0
|
17204,platforms/php/webapps/17204.txt,"DynMedia Pro Web CMS 4.0 - Local File Disclosure",2011-04-22,Mbah_Semar,php,webapps,0
|
||||||
17205,platforms/php/webapps/17205.txt,"4images 1.7.9 - Multiple Vulnerabilities",2011-04-22,"High-Tech Bridge SA",php,webapps,0
|
17205,platforms/php/webapps/17205.txt,"4images 1.7.9 - Multiple Vulnerabilities",2011-04-22,"High-Tech Bridge SA",php,webapps,0
|
||||||
17206,platforms/php/webapps/17206.txt,"Realmarketing CMS - Multiple SQL Injection Vulnerabilities",2011-04-22,^Xecuti0N3r,php,webapps,0
|
17206,platforms/php/webapps/17206.txt,"Realmarketing CMS - Multiple SQL Injection Vulnerabilities",2011-04-22,^Xecuti0N3r,php,webapps,0
|
||||||
17207,platforms/php/webapps/17207.txt,"ajax category dropdown wordpress plugin 0.1.5 - Multiple Vulnerabilities",2011-04-22,"High-Tech Bridge SA",php,webapps,0
|
17207,platforms/php/webapps/17207.txt,"WordPress Plugin ajax category dropdown 0.1.5 - Multiple Vulnerabilities",2011-04-22,"High-Tech Bridge SA",php,webapps,0
|
||||||
17211,platforms/php/webapps/17211.txt,"mySeatXT 0.1781 SQL Injection Vulnerability",2011-04-25,"AutoSec Tools",php,webapps,0
|
17211,platforms/php/webapps/17211.txt,"mySeatXT 0.1781 SQL Injection Vulnerability",2011-04-25,"AutoSec Tools",php,webapps,0
|
||||||
17212,platforms/php/webapps/17212.txt,"OrangeHRM 2.6.3 - (PluginController.php) Local File Inclusion Vulnerability",2011-04-25,"AutoSec Tools",php,webapps,0
|
17212,platforms/php/webapps/17212.txt,"OrangeHRM 2.6.3 - (PluginController.php) Local File Inclusion Vulnerability",2011-04-25,"AutoSec Tools",php,webapps,0
|
||||||
17213,platforms/php/webapps/17213.txt,"phpmychat plus 1.93 - Multiple Vulnerabilities",2011-04-25,"AutoSec Tools",php,webapps,0
|
17213,platforms/php/webapps/17213.txt,"phpmychat plus 1.93 - Multiple Vulnerabilities",2011-04-25,"AutoSec Tools",php,webapps,0
|
||||||
|
@ -15000,7 +15000,7 @@ id,file,description,date,author,platform,type,port
|
||||||
17231,platforms/php/webapps/17231.txt,"Parnian Opendata CMS SQL Injection Vulnerability",2011-05-02,Alexander,php,webapps,0
|
17231,platforms/php/webapps/17231.txt,"Parnian Opendata CMS SQL Injection Vulnerability",2011-05-02,Alexander,php,webapps,0
|
||||||
17243,platforms/windows/remote/17243.txt,"SPlayer <= 3.7 (build 2055) Buffer Overflow Exploit",2011-05-04,xsploitedsec,windows,remote,0
|
17243,platforms/windows/remote/17243.txt,"SPlayer <= 3.7 (build 2055) Buffer Overflow Exploit",2011-05-04,xsploitedsec,windows,remote,0
|
||||||
17317,platforms/windows/local/17317.rb,"VisiWave VWR File Parsing Trusted Pointer Vulnerability",2011-05-23,metasploit,windows,local,0
|
17317,platforms/windows/local/17317.rb,"VisiWave VWR File Parsing Trusted Pointer Vulnerability",2011-05-23,metasploit,windows,local,0
|
||||||
17318,platforms/multiple/local/17318.php,"PHP <= 5.3.5 socket_connect() Buffer Overflow Vulnerability",2011-05-25,"Marek Kroemeke",multiple,local,0
|
17318,platforms/multiple/local/17318.php,"PHP <= 5.3.5 - socket_connect() Buffer Overflow Vulnerability",2011-05-25,"Marek Kroemeke",multiple,local,0
|
||||||
17323,platforms/windows/shellcode/17323.c,"Allwin WinExec add new local administrator + ExitProcess Shellcode",2011-05-25,RubberDuck,windows,shellcode,0
|
17323,platforms/windows/shellcode/17323.c,"Allwin WinExec add new local administrator + ExitProcess Shellcode",2011-05-25,RubberDuck,windows,shellcode,0
|
||||||
17319,platforms/php/webapps/17319.txt,"Tickets 2.13 SQL Injection Vulnerability",2011-05-25,"AutoSec Tools",php,webapps,0
|
17319,platforms/php/webapps/17319.txt,"Tickets 2.13 SQL Injection Vulnerability",2011-05-25,"AutoSec Tools",php,webapps,0
|
||||||
17235,platforms/php/webapps/17235.html,"Exponent CMS 2.0 Beta 1.1 - CSRF Add Administrator Account PoC",2011-05-02,outlaw.dll,php,webapps,0
|
17235,platforms/php/webapps/17235.html,"Exponent CMS 2.0 Beta 1.1 - CSRF Add Administrator Account PoC",2011-05-02,outlaw.dll,php,webapps,0
|
||||||
|
@ -15428,7 +15428,7 @@ id,file,description,date,author,platform,type,port
|
||||||
17758,platforms/php/webapps/17758.txt,"WordPress PureHTML plugin <= 1.0.0 - SQL Injection",2011-08-30,"Miroslav Stampar",php,webapps,0
|
17758,platforms/php/webapps/17758.txt,"WordPress PureHTML plugin <= 1.0.0 - SQL Injection",2011-08-30,"Miroslav Stampar",php,webapps,0
|
||||||
17759,platforms/php/webapps/17759.txt,"WordPress Couponer plugin <= 1.2 - SQL Injection",2011-08-30,"Miroslav Stampar",php,webapps,0
|
17759,platforms/php/webapps/17759.txt,"WordPress Couponer plugin <= 1.2 - SQL Injection",2011-08-30,"Miroslav Stampar",php,webapps,0
|
||||||
17760,platforms/php/webapps/17760.txt,"Wordpress grapefile plugin <= 1.1 - Arbitrary File Upload",2011-08-31,"Hrvoje Spoljar",php,webapps,0
|
17760,platforms/php/webapps/17760.txt,"Wordpress grapefile plugin <= 1.1 - Arbitrary File Upload",2011-08-31,"Hrvoje Spoljar",php,webapps,0
|
||||||
17761,platforms/php/webapps/17761.txt,"wordpress image gallery with slideshow plugin <= 1.5 - Multiple Vulnerabilities",2011-08-31,"Hrvoje Spoljar",php,webapps,0
|
17761,platforms/php/webapps/17761.txt,"WordPress Plugin image gallery with slideshow <= 1.5 - Multiple Vulnerabilities",2011-08-31,"Hrvoje Spoljar",php,webapps,0
|
||||||
17762,platforms/windows/remote/17762.rb,"Citrix Gateway - ActiveX Control Stack Based Buffer Overflow Vulnerability",2011-08-31,metasploit,windows,remote,0
|
17762,platforms/windows/remote/17762.rb,"Citrix Gateway - ActiveX Control Stack Based Buffer Overflow Vulnerability",2011-08-31,metasploit,windows,remote,0
|
||||||
17763,platforms/php/webapps/17763.txt,"WordPress Donation plugin <= 1.0 - SQL Injection",2011-09-01,"Miroslav Stampar",php,webapps,0
|
17763,platforms/php/webapps/17763.txt,"WordPress Donation plugin <= 1.0 - SQL Injection",2011-09-01,"Miroslav Stampar",php,webapps,0
|
||||||
17764,platforms/php/webapps/17764.txt,"Wordpress Plugin Bannerize <= 2.8.6 - SQL Injection",2011-09-01,"Miroslav Stampar",php,webapps,0
|
17764,platforms/php/webapps/17764.txt,"Wordpress Plugin Bannerize <= 2.8.6 - SQL Injection",2011-09-01,"Miroslav Stampar",php,webapps,0
|
||||||
|
@ -15683,7 +15683,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18050,platforms/php/webapps/18050.txt,"Joomla HM-Community (com_hmcommunity) Multiple Vulnerabilities",2011-10-31,"599eme Man",php,webapps,0
|
18050,platforms/php/webapps/18050.txt,"Joomla HM-Community (com_hmcommunity) Multiple Vulnerabilities",2011-10-31,"599eme Man",php,webapps,0
|
||||||
18051,platforms/windows/remote/18051.txt,"BroadWin WebAccess SCADA/HMI Client Remote Code Execution",2011-10-31,Snake,windows,remote,0
|
18051,platforms/windows/remote/18051.txt,"BroadWin WebAccess SCADA/HMI Client Remote Code Execution",2011-10-31,Snake,windows,remote,0
|
||||||
18052,platforms/windows/dos/18052.php,"Oracle DataDirect ODBC Drivers HOST Attribute arsqls24.dll Stack Based Buffer Overflow PoC",2011-10-31,rgod,windows,dos,0
|
18052,platforms/windows/dos/18052.php,"Oracle DataDirect ODBC Drivers HOST Attribute arsqls24.dll Stack Based Buffer Overflow PoC",2011-10-31,rgod,windows,dos,0
|
||||||
18053,platforms/php/webapps/18053.txt,"wordpress classipress theme <= 3.1.4 - Stored XSS",2011-10-31,"Paul Loftness",php,webapps,0
|
18053,platforms/php/webapps/18053.txt,"WordPress Theme classipress <= 3.1.4 - Stored XSS",2011-10-31,"Paul Loftness",php,webapps,0
|
||||||
18055,platforms/php/webapps/18055.txt,"Wordpress Plugin Glossary - SQL Injection",2011-10-31,longrifle0x,php,webapps,0
|
18055,platforms/php/webapps/18055.txt,"Wordpress Plugin Glossary - SQL Injection",2011-10-31,longrifle0x,php,webapps,0
|
||||||
18056,platforms/php/webapps/18056.txt,"jbShop - e107 7 CMS Plugin - SQL Injection",2011-10-31,"Robert Cooper",php,webapps,0
|
18056,platforms/php/webapps/18056.txt,"jbShop - e107 7 CMS Plugin - SQL Injection",2011-10-31,"Robert Cooper",php,webapps,0
|
||||||
18057,platforms/windows/remote/18057.rb,"NJStar Communicator 3.00 MiniSMTP Server Remote Exploit",2011-10-31,"Dillon Beresford",windows,remote,0
|
18057,platforms/windows/remote/18057.rb,"NJStar Communicator 3.00 MiniSMTP Server Remote Exploit",2011-10-31,"Dillon Beresford",windows,remote,0
|
||||||
|
@ -15855,7 +15855,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18277,platforms/php/webapps/18277.txt,"Free Image Hosting Script Arbitrary File Upload Vulnerability",2011-12-26,ySecurity,php,webapps,0
|
18277,platforms/php/webapps/18277.txt,"Free Image Hosting Script Arbitrary File Upload Vulnerability",2011-12-26,ySecurity,php,webapps,0
|
||||||
18278,platforms/linux/dos/18278.txt,"Nagios Plugin check_ups Local Buffer Overflow PoC",2011-12-26,"Stefan Schurtz",linux,dos,0
|
18278,platforms/linux/dos/18278.txt,"Nagios Plugin check_ups Local Buffer Overflow PoC",2011-12-26,"Stefan Schurtz",linux,dos,0
|
||||||
18280,platforms/linux/remote/18280.c,"Telnetd encrypt_keyid - Remote Root Function Pointer Overwrite",2011-12-26,"NighterMan and BatchDrake",linux,remote,0
|
18280,platforms/linux/remote/18280.c,"Telnetd encrypt_keyid - Remote Root Function Pointer Overwrite",2011-12-26,"NighterMan and BatchDrake",linux,remote,0
|
||||||
18283,platforms/windows/remote/18283.rb,"CoCSoft Stream Down 6.8.0 - Universal Exploit metasploit",2011-12-27,"Fady Mohammed Osman",windows,remote,0
|
18283,platforms/windows/remote/18283.rb,"CoCSoft Stream Down 6.8.0 - Universal Exploit (Metasploit)",2011-12-27,"Fady Mohammed Osman",windows,remote,0
|
||||||
18412,platforms/php/webapps/18412.php,"Wordpress Kish Guest Posting Plugin 1.0 - Arbitrary File Upload",2012-01-23,EgiX,php,webapps,0
|
18412,platforms/php/webapps/18412.php,"Wordpress Kish Guest Posting Plugin 1.0 - Arbitrary File Upload",2012-01-23,EgiX,php,webapps,0
|
||||||
18287,platforms/php/webapps/18287.php,"Joomla Module Simple File Upload 1.3 - Remote Code Execution",2011-12-28,gmda,php,webapps,0
|
18287,platforms/php/webapps/18287.php,"Joomla Module Simple File Upload 1.3 - Remote Code Execution",2011-12-28,gmda,php,webapps,0
|
||||||
18285,platforms/windows/dos/18285.py,"VLC 1.1.11 (libav) libavcodec_plugin.dll DoS",2011-12-28,"Mitchell Adair",windows,dos,0
|
18285,platforms/windows/dos/18285.py,"VLC 1.1.11 (libav) libavcodec_plugin.dll DoS",2011-12-28,"Mitchell Adair",windows,dos,0
|
||||||
|
@ -15879,8 +15879,8 @@ id,file,description,date,author,platform,type,port
|
||||||
18983,platforms/php/webapps/18983.php,"Mnews <= 1.1 (view.php) SQL Injection",2012-06-04,WhiteCollarGroup,php,webapps,0
|
18983,platforms/php/webapps/18983.php,"Mnews <= 1.1 (view.php) SQL Injection",2012-06-04,WhiteCollarGroup,php,webapps,0
|
||||||
18984,platforms/multiple/remote/18984.rb,"Apache Struts <= 2.2.1.1 - Remote Command Execution",2012-06-05,metasploit,multiple,remote,0
|
18984,platforms/multiple/remote/18984.rb,"Apache Struts <= 2.2.1.1 - Remote Command Execution",2012-06-05,metasploit,multiple,remote,0
|
||||||
18318,platforms/windows/dos/18318.py,"Netcut 2.0 - Denial of Service Vulnerability",2012-01-04,MaYaSeVeN,windows,dos,0
|
18318,platforms/windows/dos/18318.py,"Netcut 2.0 - Denial of Service Vulnerability",2012-01-04,MaYaSeVeN,windows,dos,0
|
||||||
18977,platforms/php/dos/18977.php,"PHP 5.3.10 spl_autoload_register() Local Denial of Service",2012-06-03,"Yakir Wizman",php,dos,0
|
18977,platforms/php/dos/18977.php,"PHP 5.3.10 - spl_autoload_register() Local Denial of Service",2012-06-03,"Yakir Wizman",php,dos,0
|
||||||
18978,platforms/php/dos/18978.php,"PHP 5.3.10 spl_autoload_call() Local Denial of Service",2012-06-03,"Yakir Wizman",php,dos,0
|
18978,platforms/php/dos/18978.php,"PHP 5.3.10 - spl_autoload_call() Local Denial of Service",2012-06-03,"Yakir Wizman",php,dos,0
|
||||||
18979,platforms/php/webapps/18979.txt,"vanilla forums poll plugin 0.9 - Stored XSS",2012-06-03,"Henry Hoggard",php,webapps,0
|
18979,platforms/php/webapps/18979.txt,"vanilla forums poll plugin 0.9 - Stored XSS",2012-06-03,"Henry Hoggard",php,webapps,0
|
||||||
18980,platforms/php/webapps/18980.txt,"Vanilla Forums 2.0.18.4 Tagging Stored XSS",2012-06-03,"Henry Hoggard",php,webapps,0
|
18980,platforms/php/webapps/18980.txt,"Vanilla Forums 2.0.18.4 Tagging Stored XSS",2012-06-03,"Henry Hoggard",php,webapps,0
|
||||||
18320,platforms/php/webapps/18320.txt,"Posse Softball Director CMS (team.php) Blind SQL Injection Vulnerability",2012-01-04,"Easy Laster",php,webapps,0
|
18320,platforms/php/webapps/18320.txt,"Posse Softball Director CMS (team.php) Blind SQL Injection Vulnerability",2012-01-04,"Easy Laster",php,webapps,0
|
||||||
|
@ -15890,7 +15890,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18327,platforms/netware/dos/18327.txt,"Novell Netware XNFS.NLM NFS Rename Remote Code Execution",2012-01-06,"Francis Provencher",netware,dos,0
|
18327,platforms/netware/dos/18327.txt,"Novell Netware XNFS.NLM NFS Rename Remote Code Execution",2012-01-06,"Francis Provencher",netware,dos,0
|
||||||
18328,platforms/netware/dos/18328.txt,"Novell Netware XNFS.NLM STAT Notify Remote Code Execution",2012-01-06,"Francis Provencher",netware,dos,0
|
18328,platforms/netware/dos/18328.txt,"Novell Netware XNFS.NLM STAT Notify Remote Code Execution",2012-01-06,"Francis Provencher",netware,dos,0
|
||||||
18329,platforms/multiple/webapps/18329.txt,"Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities",2012-01-06,"SEC Consult",multiple,webapps,0
|
18329,platforms/multiple/webapps/18329.txt,"Apache Struts2 <= 2.3.1 - Multiple Vulnerabilities",2012-01-06,"SEC Consult",multiple,webapps,0
|
||||||
18330,platforms/php/webapps/18330.txt,"wordpress pay with tweet plugin <= 1.1 - Multiple Vulnerabilities",2012-01-06,"Gianluca Brindisi",php,webapps,0
|
18330,platforms/php/webapps/18330.txt,"WordPress Plugin pay with tweet <= 1.1 - Multiple Vulnerabilities",2012-01-06,"Gianluca Brindisi",php,webapps,0
|
||||||
18334,platforms/windows/local/18334.py,"Microsoft Office 2003 Home/Pro - Code Execution (0day)",2012-01-08,"b33f & g11tch",windows,local,0
|
18334,platforms/windows/local/18334.py,"Microsoft Office 2003 Home/Pro - Code Execution (0day)",2012-01-08,"b33f & g11tch",windows,local,0
|
||||||
18335,platforms/php/webapps/18335.txt,"MangosWeb SQL Injection Vulnerability",2012-01-08,Hood3dRob1n,php,webapps,0
|
18335,platforms/php/webapps/18335.txt,"MangosWeb SQL Injection Vulnerability",2012-01-08,Hood3dRob1n,php,webapps,0
|
||||||
18336,platforms/hardware/dos/18336.pl,"AirTies-4450 Unauthorized Remote Reboot",2012-01-08,rigan,hardware,dos,0
|
18336,platforms/hardware/dos/18336.pl,"AirTies-4450 Unauthorized Remote Reboot",2012-01-08,rigan,hardware,dos,0
|
||||||
|
@ -15931,7 +15931,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18379,platforms/lin_x86/shellcode/18379.c,"Linux/x86 Search For php/html Writable Files and Add Your Code",2012-01-17,rigan,lin_x86,shellcode,0
|
18379,platforms/lin_x86/shellcode/18379.c,"Linux/x86 Search For php/html Writable Files and Add Your Code",2012-01-17,rigan,lin_x86,shellcode,0
|
||||||
18380,platforms/php/webapps/18380.txt,"Joomla Discussions Component (com_discussions) SQL Injection",2012-01-17,"Red Security TEAM",php,webapps,0
|
18380,platforms/php/webapps/18380.txt,"Joomla Discussions Component (com_discussions) SQL Injection",2012-01-17,"Red Security TEAM",php,webapps,0
|
||||||
18975,platforms/php/webapps/18975.rb,"Log1 CMS writeInfo() PHP Code Injection",2012-06-03,metasploit,php,webapps,0
|
18975,platforms/php/webapps/18975.rb,"Log1 CMS writeInfo() PHP Code Injection",2012-06-03,metasploit,php,webapps,0
|
||||||
18976,platforms/php/dos/18976.php,"PHP 5.3.10 spl_autoload() Local Denial of Service",2012-06-03,"Yakir Wizman",php,dos,0
|
18976,platforms/php/dos/18976.php,"PHP 5.3.10 - spl_autoload() Local Denial of Service",2012-06-03,"Yakir Wizman",php,dos,0
|
||||||
18381,platforms/windows/remote/18381.rb,"HP Easy Printer Care XMLCacheMgr Class ActiveX Control Remote Code Execution",2012-01-18,metasploit,windows,remote,0
|
18381,platforms/windows/remote/18381.rb,"HP Easy Printer Care XMLCacheMgr Class ActiveX Control Remote Code Execution",2012-01-18,metasploit,windows,remote,0
|
||||||
18382,platforms/windows/remote/18382.py,"Sysax Multi Server 5.50 Create Folder BOF",2012-01-18,"Craig Freyman",windows,remote,0
|
18382,platforms/windows/remote/18382.py,"Sysax Multi Server 5.50 Create Folder BOF",2012-01-18,"Craig Freyman",windows,remote,0
|
||||||
18383,platforms/php/webapps/18383.txt,"pGB 2.12 kommentar.php SQL Injection Vulnerability",2012-01-18,3spi0n,php,webapps,0
|
18383,platforms/php/webapps/18383.txt,"pGB 2.12 kommentar.php SQL Injection Vulnerability",2012-01-18,3spi0n,php,webapps,0
|
||||||
|
@ -15940,7 +15940,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18386,platforms/php/webapps/18386.txt,"DZCP (deV!L_z Clanportal) 1.5.5 Moviebase Addon - Blind SQL Injection Vulnerability",2012-01-18,"Easy Laster",php,webapps,0
|
18386,platforms/php/webapps/18386.txt,"DZCP (deV!L_z Clanportal) 1.5.5 Moviebase Addon - Blind SQL Injection Vulnerability",2012-01-18,"Easy Laster",php,webapps,0
|
||||||
18388,platforms/windows/remote/18388.rb,"HP OpenView Network Node Manager ov.dll _OVBuildPath Buffer Overflow",2012-01-20,metasploit,windows,remote,0
|
18388,platforms/windows/remote/18388.rb,"HP OpenView Network Node Manager ov.dll _OVBuildPath Buffer Overflow",2012-01-20,metasploit,windows,remote,0
|
||||||
18389,platforms/php/webapps/18389.txt,"Drupal CKEditor 3.0 - 3.6.2 - Persistent EventHandler XSS",2012-01-19,MaXe,php,webapps,0
|
18389,platforms/php/webapps/18389.txt,"Drupal CKEditor 3.0 - 3.6.2 - Persistent EventHandler XSS",2012-01-19,MaXe,php,webapps,0
|
||||||
18390,platforms/php/webapps/18390.txt,"wordpress ucan post plugin <= 1.0.09 - Stored XSS",2012-01-19,"Gianluca Brindisi",php,webapps,0
|
18390,platforms/php/webapps/18390.txt,"WordPress Plugin ucan post <= 1.0.09 - Stored XSS",2012-01-19,"Gianluca Brindisi",php,webapps,0
|
||||||
18700,platforms/php/webapps/18700.txt,"e-ticketing - SQL Injection",2012-04-04,"Mark Stanislav",php,webapps,0
|
18700,platforms/php/webapps/18700.txt,"e-ticketing - SQL Injection",2012-04-04,"Mark Stanislav",php,webapps,0
|
||||||
18392,platforms/php/webapps/18392.php,"appRain CMF <= 0.1.5 (uploadify.php) Unrestricted File Upload Exploit",2012-01-19,EgiX,php,webapps,0
|
18392,platforms/php/webapps/18392.php,"appRain CMF <= 0.1.5 (uploadify.php) Unrestricted File Upload Exploit",2012-01-19,EgiX,php,webapps,0
|
||||||
18393,platforms/linux/remote/18393.rb,"Gitorious Arbitrary Command Execution",2012-01-20,metasploit,linux,remote,0
|
18393,platforms/linux/remote/18393.rb,"Gitorious Arbitrary Command Execution",2012-01-20,metasploit,linux,remote,0
|
||||||
|
@ -15998,7 +15998,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18455,platforms/php/webapps/18455.txt,"OSCommerce 3.0.2 - Persistent Cross-Site Vulnerability",2012-02-02,Vulnerability-Lab,php,webapps,0
|
18455,platforms/php/webapps/18455.txt,"OSCommerce 3.0.2 - Persistent Cross-Site Vulnerability",2012-02-02,Vulnerability-Lab,php,webapps,0
|
||||||
18456,platforms/php/webapps/18456.txt,"Achievo 1.4.3 - Multiple Web Vulnerabilities",2012-02-02,Vulnerability-Lab,php,webapps,0
|
18456,platforms/php/webapps/18456.txt,"Achievo 1.4.3 - Multiple Web Vulnerabilities",2012-02-02,Vulnerability-Lab,php,webapps,0
|
||||||
18457,platforms/linux/dos/18457.py,"torrent-stats httpd.c Denial of Service",2012-02-03,otr,linux,dos,0
|
18457,platforms/linux/dos/18457.py,"torrent-stats httpd.c Denial of Service",2012-02-03,otr,linux,dos,0
|
||||||
18458,platforms/php/dos/18458.txt,"PHP 5.4SVN-2012-02-03 htmlspecialchars/entities Buffer Overflow",2012-02-03,cataphract,php,dos,0
|
18458,platforms/php/dos/18458.txt,"PHP 5.4SVN-2012-02-03 - htmlspecialchars/entities Buffer Overflow",2012-02-03,cataphract,php,dos,0
|
||||||
18460,platforms/php/dos/18460.php,"PHP 5.4.0RC6 (64-bit) - Denial of Service",2012-02-04,"Stefan Esser",php,dos,0
|
18460,platforms/php/dos/18460.php,"PHP 5.4.0RC6 (64-bit) - Denial of Service",2012-02-04,"Stefan Esser",php,dos,0
|
||||||
18461,platforms/windows/dos/18461.html,"Edraw Diagram Component 5 - ActiveX Buffer Overflow DoS",2012-02-04,"Senator of Pirates",windows,dos,0
|
18461,platforms/windows/dos/18461.html,"Edraw Diagram Component 5 - ActiveX Buffer Overflow DoS",2012-02-04,"Senator of Pirates",windows,dos,0
|
||||||
18463,platforms/windows/dos/18463.html,"PDF Viewer Component ActiveX DoS",2012-02-05,"Senator of Pirates",windows,dos,0
|
18463,platforms/windows/dos/18463.html,"PDF Viewer Component ActiveX DoS",2012-02-05,"Senator of Pirates",windows,dos,0
|
||||||
|
@ -16172,7 +16172,7 @@ id,file,description,date,author,platform,type,port
|
||||||
18676,platforms/php/webapps/18676.txt,"boastMachine <= 3.1 - CSRF Add Admin Vulnerability",2012-03-28,Dr.NaNo,php,webapps,0
|
18676,platforms/php/webapps/18676.txt,"boastMachine <= 3.1 - CSRF Add Admin Vulnerability",2012-03-28,Dr.NaNo,php,webapps,0
|
||||||
18670,platforms/php/webapps/18670.txt,"PicoPublisher 2.0 - Remote SQL Injection",2012-03-28,ZeTH,php,webapps,0
|
18670,platforms/php/webapps/18670.txt,"PicoPublisher 2.0 - Remote SQL Injection",2012-03-28,ZeTH,php,webapps,0
|
||||||
18666,platforms/windows/remote/18666.rb,"UltraVNC 1.0.2 Client (vncviewer.exe) Buffer Overflow",2012-03-26,metasploit,windows,remote,0
|
18666,platforms/windows/remote/18666.rb,"UltraVNC 1.0.2 Client (vncviewer.exe) Buffer Overflow",2012-03-26,metasploit,windows,remote,0
|
||||||
18665,platforms/multiple/dos/18665.py,"PHP 5.4.0 Built-in Web Server DoS PoC",2012-03-25,ls,multiple,dos,0
|
18665,platforms/multiple/dos/18665.py,"PHP 5.4.0 Built-in Web Server - DoS PoC",2012-03-25,ls,multiple,dos,0
|
||||||
18667,platforms/php/webapps/18667.html,"Family CMS <= 2.9 - Multiple Vulnerabilities",2012-03-26,"Ahmed Elhady Mohamed",php,webapps,0
|
18667,platforms/php/webapps/18667.html,"Family CMS <= 2.9 - Multiple Vulnerabilities",2012-03-26,"Ahmed Elhady Mohamed",php,webapps,0
|
||||||
18668,platforms/php/webapps/18668.txt,"vBshop Multiple Persistent XSS Vulnerabilities",2012-03-26,ToiL,php,webapps,0
|
18668,platforms/php/webapps/18668.txt,"vBshop Multiple Persistent XSS Vulnerabilities",2012-03-26,ToiL,php,webapps,0
|
||||||
18671,platforms/windows/dos/18671.pl,"KnFTPd 1.0.0 - 'FEAT' DoS PoC-Exploit",2012-03-28,"Stefan Schurtz",windows,dos,0
|
18671,platforms/windows/dos/18671.pl,"KnFTPd 1.0.0 - 'FEAT' DoS PoC-Exploit",2012-03-28,"Stefan Schurtz",windows,dos,0
|
||||||
|
@ -16299,11 +16299,11 @@ id,file,description,date,author,platform,type,port
|
||||||
18832,platforms/php/webapps/18832.txt,"Symantec Web Gateway Cross-Site Scripting",2012-05-04,B00y@,php,webapps,0
|
18832,platforms/php/webapps/18832.txt,"Symantec Web Gateway Cross-Site Scripting",2012-05-04,B00y@,php,webapps,0
|
||||||
18834,platforms/php/remote/18834.rb,"PHP CGI Argument Injection",2012-05-04,metasploit,php,remote,0
|
18834,platforms/php/remote/18834.rb,"PHP CGI Argument Injection",2012-05-04,metasploit,php,remote,0
|
||||||
18871,platforms/php/webapps/18871.txt,"Travelon Express CMS 6.2.2 - Multiple Vulnerabilities",2012-05-13,Vulnerability-Lab,php,webapps,0
|
18871,platforms/php/webapps/18871.txt,"Travelon Express CMS 6.2.2 - Multiple Vulnerabilities",2012-05-13,Vulnerability-Lab,php,webapps,0
|
||||||
18861,platforms/windows/local/18861.php,"PHP 5.4 (5.4.3) Code Execution (Win32)",2012-05-11,0in,windows,local,0
|
18861,platforms/windows/local/18861.php,"PHP 5.4.3 - Code Execution (Win32)",2012-05-11,0in,windows,local,0
|
||||||
18862,platforms/windows/local/18862.php,"Adobe Photoshop CS5.1 U3D.8BI Collada Asset Elements Stack Overflow",2012-05-11,rgod,windows,local,0
|
18862,platforms/windows/local/18862.php,"Adobe Photoshop CS5.1 U3D.8BI Collada Asset Elements Stack Overflow",2012-05-11,rgod,windows,local,0
|
||||||
18885,platforms/linux/shellcode/18885.c,"linux/x86 execve(/bin/dash) 42 bytes",2012-05-16,X-h4ck,linux,shellcode,0
|
18885,platforms/linux/shellcode/18885.c,"linux/x86 execve(/bin/dash) 42 bytes",2012-05-16,X-h4ck,linux,shellcode,0
|
||||||
18864,platforms/windows/dos/18864.txt,"QNX phrelay/phindows/phditto Multiple Vulnerabilities",2012-05-11,"Luigi Auriemma",windows,dos,0
|
18864,platforms/windows/dos/18864.txt,"QNX phrelay/phindows/phditto Multiple Vulnerabilities",2012-05-11,"Luigi Auriemma",windows,dos,0
|
||||||
18836,platforms/php/remote/18836.py,"PHP CGI Argument Injection Exploit",2012-05-05,rayh4c,php,remote,0
|
18836,platforms/php/remote/18836.py,"PHP < 5.3.12 & < 5.4.2 - CGI Argument Injection Exploit",2012-05-05,rayh4c,php,remote,0
|
||||||
18859,platforms/hardware/webapps/18859.txt,"Belkin N150 Wireless Router Password Disclosure",2012-05-11,"Avinash Tangirala",hardware,webapps,0
|
18859,platforms/hardware/webapps/18859.txt,"Belkin N150 Wireless Router Password Disclosure",2012-05-11,"Avinash Tangirala",hardware,webapps,0
|
||||||
18840,platforms/asp/webapps/18840.txt,"Fortinet FortiWeb Web Application Firewall Policy Bypass",2012-05-07,"Geffrey Velasquez",asp,webapps,0
|
18840,platforms/asp/webapps/18840.txt,"Fortinet FortiWeb Web Application Firewall Policy Bypass",2012-05-07,"Geffrey Velasquez",asp,webapps,0
|
||||||
18841,platforms/cgi/webapps/18841.txt,"Lynx Message Server Multiple Vulnerabilities",2012-05-07,"Mark Lachniet",cgi,webapps,0
|
18841,platforms/cgi/webapps/18841.txt,"Lynx Message Server Multiple Vulnerabilities",2012-05-07,"Mark Lachniet",cgi,webapps,0
|
||||||
|
@ -17186,7 +17186,7 @@ id,file,description,date,author,platform,type,port
|
||||||
19823,platforms/unix/local/19823.txt,"Standard & Poors ComStock 4.2.4 Machine Vulnerabilities",2000-03-24,kadokev,unix,local,0
|
19823,platforms/unix/local/19823.txt,"Standard & Poors ComStock 4.2.4 Machine Vulnerabilities",2000-03-24,kadokev,unix,local,0
|
||||||
19824,platforms/multiple/remote/19824.txt,"Microsoft IIS 4.0 UNC Mapped Virtual Host Vulnerability",2000-03-30,"Adam Coyne",multiple,remote,0
|
19824,platforms/multiple/remote/19824.txt,"Microsoft IIS 4.0 UNC Mapped Virtual Host Vulnerability",2000-03-30,"Adam Coyne",multiple,remote,0
|
||||||
19825,platforms/php/webapps/19825.php,"Shopware 3.5 - SQL Injection",2012-07-14,Kataklysmos,php,webapps,0
|
19825,platforms/php/webapps/19825.php,"Shopware 3.5 - SQL Injection",2012-07-14,Kataklysmos,php,webapps,0
|
||||||
19964,platforms/php/webapps/19964.txt,"PHP-Nuke module(SPChat) SQL Injection Vulnerability",2012-07-20,"Yakir Wizman",php,webapps,0
|
19964,platforms/php/webapps/19964.txt,"PHP-Nuke module (SPChat) - SQL Injection Vulnerability",2012-07-20,"Yakir Wizman",php,webapps,0
|
||||||
19827,platforms/windows/dos/19827.txt,"NT 4.0 / Windows 2000 TCP/IP Printing Service DoS Vulnerability",2000-03-30,"Ussr Labs",windows,dos,0
|
19827,platforms/windows/dos/19827.txt,"NT 4.0 / Windows 2000 TCP/IP Printing Service DoS Vulnerability",2000-03-30,"Ussr Labs",windows,dos,0
|
||||||
19963,platforms/windows/dos/19963.txt,"PHP 6.0 openssl_verify() Local Buffer Overflow PoC",2012-07-20,"Yakir Wizman",windows,dos,0
|
19963,platforms/windows/dos/19963.txt,"PHP 6.0 openssl_verify() Local Buffer Overflow PoC",2012-07-20,"Yakir Wizman",windows,dos,0
|
||||||
19828,platforms/multiple/remote/19828.txt,"Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability",2000-03-31,"Paul Schreiber",multiple,remote,0
|
19828,platforms/multiple/remote/19828.txt,"Cobalt RaQ 2.0/3.0 Apache .htaccess Disclosure Vulnerability",2000-03-31,"Paul Schreiber",multiple,remote,0
|
||||||
|
@ -17688,10 +17688,10 @@ id,file,description,date,author,platform,type,port
|
||||||
20355,platforms/windows/remote/20355.rb,"Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential",2012-08-08,metasploit,windows,remote,0
|
20355,platforms/windows/remote/20355.rb,"Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential",2012-08-08,metasploit,windows,remote,0
|
||||||
20356,platforms/windows/webapps/20356.py,"ManageEngine ServiceDesk Plus 8.1 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
20356,platforms/windows/webapps/20356.py,"ManageEngine ServiceDesk Plus 8.1 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
||||||
20357,platforms/windows/webapps/20357.py,"alt-n mdaemon free 12.5.4 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
20357,platforms/windows/webapps/20357.py,"alt-n mdaemon free 12.5.4 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
||||||
20358,platforms/php/webapps/20358.py,"wordpress mini mail dashboard widget 1.42 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
20358,platforms/php/webapps/20358.py,"WordPress mini mail dashboard widget 1.42 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
||||||
20359,platforms/windows/webapps/20359.py,"OTRS Open Technology Real Services 3.1.4 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
20359,platforms/windows/webapps/20359.py,"OTRS Open Technology Real Services 3.1.4 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
||||||
20360,platforms/php/webapps/20360.py,"wordpress postie plugin 1.4.3 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
20360,platforms/php/webapps/20360.py,"WordPress Plugin postie 1.4.3 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
||||||
20361,platforms/php/webapps/20361.py,"wordpress simplemail plugin 1.0.6 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
20361,platforms/php/webapps/20361.py,"WordPress Plugin simplemail 1.0.6 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
||||||
20362,platforms/windows/webapps/20362.py,"smartermail free 9.2 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
20362,platforms/windows/webapps/20362.py,"smartermail free 9.2 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
||||||
20363,platforms/windows/webapps/20363.py,"surgemail 6.0a4 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
20363,platforms/windows/webapps/20363.py,"surgemail 6.0a4 - Stored XSS",2012-08-08,loneferret,windows,webapps,0
|
||||||
20364,platforms/php/webapps/20364.py,"t-dah webmail client 3.2.0-2.3 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
20364,platforms/php/webapps/20364.py,"t-dah webmail client 3.2.0-2.3 - Stored XSS",2012-08-08,loneferret,php,webapps,0
|
||||||
|
@ -18442,7 +18442,7 @@ id,file,description,date,author,platform,type,port
|
||||||
21152,platforms/linux/remote/21152.c,"ActivePerl 5.6.1 perlIIS.dll Buffer Overflow Vulnerability (1)",2001-11-15,Indigo,linux,remote,0
|
21152,platforms/linux/remote/21152.c,"ActivePerl 5.6.1 perlIIS.dll Buffer Overflow Vulnerability (1)",2001-11-15,Indigo,linux,remote,0
|
||||||
21153,platforms/windows/remote/21153.c,"ActivePerl 5.6.1 perlIIS.dll Buffer Overflow Vulnerability (2)",2001-11-15,Indigo,windows,remote,0
|
21153,platforms/windows/remote/21153.c,"ActivePerl 5.6.1 perlIIS.dll Buffer Overflow Vulnerability (2)",2001-11-15,Indigo,windows,remote,0
|
||||||
21154,platforms/multiple/remote/21154.pl,"ActivePerl 5.6.1 perlIIS.dll Buffer Overflow Vulnerability (3)",2001-11-15,Sapient2003,multiple,remote,0
|
21154,platforms/multiple/remote/21154.pl,"ActivePerl 5.6.1 perlIIS.dll Buffer Overflow Vulnerability (3)",2001-11-15,Sapient2003,multiple,remote,0
|
||||||
21155,platforms/php/remote/21155.txt,"Network Tool 0.2 PHPNuke Addon Metacharacter Filtering Command Execution Vulnerability",2001-11-16,"Cabezon Aurélien",php,remote,0
|
21155,platforms/php/remote/21155.txt,"Network Tool 0.2 PHP-Nuke Addon - Metacharacter Filtering Command Execution Vulnerability",2001-11-16,"Cabezon Aurélien",php,remote,0
|
||||||
21156,platforms/windows/remote/21156.txt,"Opera 5.0/5.1 Same Origin Policy Circumvention Vulnerability",2001-11-15,"Georgi Guninski",windows,remote,0
|
21156,platforms/windows/remote/21156.txt,"Opera 5.0/5.1 Same Origin Policy Circumvention Vulnerability",2001-11-15,"Georgi Guninski",windows,remote,0
|
||||||
21157,platforms/php/webapps/21157.txt,"bharat mediratta gallery 1.1/1.2 - Directory Traversal Vulnerability",2001-11-19,"Cabezon Aurelien",php,webapps,0
|
21157,platforms/php/webapps/21157.txt,"bharat mediratta gallery 1.1/1.2 - Directory Traversal Vulnerability",2001-11-19,"Cabezon Aurelien",php,webapps,0
|
||||||
21158,platforms/linux/local/21158.c,"S.u.S.E 6.4/7.0/7.1/7.2 Berkeley Parallel Make Shell Definition Format String Vulnerability",2001-11-21,IhaQueR@IRCnet,linux,local,0
|
21158,platforms/linux/local/21158.c,"S.u.S.E 6.4/7.0/7.1/7.2 Berkeley Parallel Make Shell Definition Format String Vulnerability",2001-11-21,IhaQueR@IRCnet,linux,local,0
|
||||||
|
@ -18452,8 +18452,8 @@ id,file,description,date,author,platform,type,port
|
||||||
21162,platforms/windows/dos/21162.pl,"Cooolsoft PowerFTP Server 2.0 3/2.10 - Multiple Denial of Service Vulnerability (1)",2001-11-29,"Alex Hernandez",windows,dos,0
|
21162,platforms/windows/dos/21162.pl,"Cooolsoft PowerFTP Server 2.0 3/2.10 - Multiple Denial of Service Vulnerability (1)",2001-11-29,"Alex Hernandez",windows,dos,0
|
||||||
21163,platforms/windows/dos/21163.pl,"Cooolsoft PowerFTP Server 2.0 3/2.10 - Multiple Denial of Service Vulnerability (2)",2001-11-29,"Alex Hernandez",windows,dos,0
|
21163,platforms/windows/dos/21163.pl,"Cooolsoft PowerFTP Server 2.0 3/2.10 - Multiple Denial of Service Vulnerability (2)",2001-11-29,"Alex Hernandez",windows,dos,0
|
||||||
21164,platforms/windows/remote/21164.txt,"Microsoft Internet Explorer 5.5/6.0 Spoofable File Extensions Vulnerability",2001-11-26,StatiC,windows,remote,0
|
21164,platforms/windows/remote/21164.txt,"Microsoft Internet Explorer 5.5/6.0 Spoofable File Extensions Vulnerability",2001-11-26,StatiC,windows,remote,0
|
||||||
21165,platforms/php/webapps/21165.txt,"PHPNuke 1.0/2.5/3.0/4.x/5.x/6.x/7.x user.php uname Parameter XSS Vulnerability",2001-12-03,"Cabezon Aurélien",php,webapps,0
|
21165,platforms/php/webapps/21165.txt,"PHP-Nuke 1.0/2.5/3.0/4.x/5.x/6.x/7.x - user.php uname Parameter XSS Vulnerability",2001-12-03,"Cabezon Aurélien",php,webapps,0
|
||||||
21166,platforms/php/webapps/21166.txt,"PHPNuke 1.0/2.5/3.0/4.x/5.x/6.x/7.x modules.php Multiple Parameter XSS Vulnerability",2001-12-03,"Cabezon Aurélien",php,webapps,0
|
21166,platforms/php/webapps/21166.txt,"PHP-Nuke 1.0/2.5/3.0/4.x/5.x/6.x/7.x modules.php - Multiple Parameter XSS Vulnerability",2001-12-03,"Cabezon Aurélien",php,webapps,0
|
||||||
21167,platforms/openbsd/dos/21167.c,"OpenBSD 2.x/3.0 - User Mode Return Value Denial of Service Vulnerability",2001-12-03,"Marco Peereboom",openbsd,dos,0
|
21167,platforms/openbsd/dos/21167.c,"OpenBSD 2.x/3.0 - User Mode Return Value Denial of Service Vulnerability",2001-12-03,"Marco Peereboom",openbsd,dos,0
|
||||||
21168,platforms/php/webapps/21168.txt,"EasyNews 1.5 NewsDatabase/Template Modification Vulnerability",2001-12-01,"markus arndt",php,webapps,0
|
21168,platforms/php/webapps/21168.txt,"EasyNews 1.5 NewsDatabase/Template Modification Vulnerability",2001-12-01,"markus arndt",php,webapps,0
|
||||||
21169,platforms/windows/remote/21169.txt,"ZoneAlarm Pro 1.0/2.x Outbound Packet Bypass Vulnerability",2001-12-06,"Tom Liston",windows,remote,0
|
21169,platforms/windows/remote/21169.txt,"ZoneAlarm Pro 1.0/2.x Outbound Packet Bypass Vulnerability",2001-12-06,"Tom Liston",windows,remote,0
|
||||||
|
@ -18494,7 +18494,7 @@ id,file,description,date,author,platform,type,port
|
||||||
21203,platforms/windows/remote/21203.txt,"Lucent 8.x VitalNet Password Authentication Bypass Vulnerability",2002-01-16,"Mark Cooper",windows,remote,0
|
21203,platforms/windows/remote/21203.txt,"Lucent 8.x VitalNet Password Authentication Bypass Vulnerability",2002-01-16,"Mark Cooper",windows,remote,0
|
||||||
21204,platforms/windows/remote/21204.txt,"Apache 1.3.20 - Win32 PHP.EXE Remote File Disclosure Vulnerability",2002-01-04,"Paul Brereton",windows,remote,0
|
21204,platforms/windows/remote/21204.txt,"Apache 1.3.20 - Win32 PHP.EXE Remote File Disclosure Vulnerability",2002-01-04,"Paul Brereton",windows,remote,0
|
||||||
21205,platforms/linux/remote/21205.c,"Boozt 0.9.8 - Buffer Overflow Vulnerability",2002-01-07,"Rafael San Miguel Carrasco",linux,remote,0
|
21205,platforms/linux/remote/21205.c,"Boozt 0.9.8 - Buffer Overflow Vulnerability",2002-01-07,"Rafael San Miguel Carrasco",linux,remote,0
|
||||||
21206,platforms/php/webapps/21206.txt,"PHPNuke AddOn PHPToNuke.PHP 1.0 - Cross-Site Scripting Vulnerability",2002-01-06,frog,php,webapps,0
|
21206,platforms/php/webapps/21206.txt,"PHP-Nuke AddOn PHPToNuke.PHP 1.0 - Cross-Site Scripting Vulnerability",2002-01-06,frog,php,webapps,0
|
||||||
21207,platforms/windows/remote/21207.c,"RealPlayer 7.0/8.0 Media File Buffer Overflow Vulnerability",2002-01-05,UNYUN,windows,remote,0
|
21207,platforms/windows/remote/21207.c,"RealPlayer 7.0/8.0 Media File Buffer Overflow Vulnerability",2002-01-05,UNYUN,windows,remote,0
|
||||||
21208,platforms/cgi/webapps/21208.txt,"YaBB 9.1.2000 - Cross-Agent Scripting Vulnerability",2002-01-09,Obscure,cgi,webapps,0
|
21208,platforms/cgi/webapps/21208.txt,"YaBB 9.1.2000 - Cross-Agent Scripting Vulnerability",2002-01-09,Obscure,cgi,webapps,0
|
||||||
21209,platforms/cgi/webapps/21209.txt,"Ultimate Bulletin Board 5.4/6.0/6.2 - Cross-Agent Scripting Vulnerability",2002-01-09,Obscure,cgi,webapps,0
|
21209,platforms/cgi/webapps/21209.txt,"Ultimate Bulletin Board 5.4/6.0/6.2 - Cross-Agent Scripting Vulnerability",2002-01-09,Obscure,cgi,webapps,0
|
||||||
|
@ -18517,10 +18517,10 @@ id,file,description,date,author,platform,type,port
|
||||||
21227,platforms/linux/local/21227.sh,"Sudo 1.6.3 - Unclean Environment Variable Root Program Execution Vulnerability",2002-01-14,"Charles Stevenson",linux,local,0
|
21227,platforms/linux/local/21227.sh,"Sudo 1.6.3 - Unclean Environment Variable Root Program Execution Vulnerability",2002-01-14,"Charles Stevenson",linux,local,0
|
||||||
21228,platforms/windows/dos/21228.c,"Sambar Server 5.1 - Sample Script Denial of Service Vulnerability",2002-02-06,"Tamer Sahin",windows,dos,0
|
21228,platforms/windows/dos/21228.c,"Sambar Server 5.1 - Sample Script Denial of Service Vulnerability",2002-02-06,"Tamer Sahin",windows,dos,0
|
||||||
21229,platforms/linux/local/21229.txt,"AT 3.1.8 - Formatted Time Heap Overflow Vulnerability",2002-01-16,"SuSE Security",linux,local,0
|
21229,platforms/linux/local/21229.txt,"AT 3.1.8 - Formatted Time Heap Overflow Vulnerability",2002-01-16,"SuSE Security",linux,local,0
|
||||||
21230,platforms/php/webapps/21230.txt,"PHPNuke 4.x/5.x - Remote Arbitrary File Include Vulnerability",2002-01-16,"Handle Nopman",php,webapps,0
|
21230,platforms/php/webapps/21230.txt,"PHP-Nuke 4.x/5.x - Remote Arbitrary File Include Vulnerability",2002-01-16,"Handle Nopman",php,webapps,0
|
||||||
21231,platforms/linux/local/21231.c,"Chinput 3.0 Environment Variable Buffer Overflow Vulnerability",2002-01-16,xperc,linux,local,0
|
21231,platforms/linux/local/21231.c,"Chinput 3.0 Environment Variable Buffer Overflow Vulnerability",2002-01-16,xperc,linux,local,0
|
||||||
21232,platforms/multiple/dos/21232.c,"Oracle 8i dbsnmp Command Remote Denial of Service Vulnerability",2002-01-17,benjurry,multiple,dos,0
|
21232,platforms/multiple/dos/21232.c,"Oracle 8i dbsnmp Command Remote Denial of Service Vulnerability",2002-01-17,benjurry,multiple,dos,0
|
||||||
21233,platforms/php/webapps/21233.txt,"PHPNuke 4.x/5.x SQL_Debug Information Disclosure Vulnerability",2002-01-18,zataz.com,php,webapps,0
|
21233,platforms/php/webapps/21233.txt,"PHP-Nuke 4.x/5.x - SQL_Debug Information Disclosure Vulnerability",2002-01-18,zataz.com,php,webapps,0
|
||||||
21234,platforms/osx/dos/21234.sh,"Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service Vulnerability",2002-01-18,"Tekno pHReak",osx,dos,0
|
21234,platforms/osx/dos/21234.sh,"Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service Vulnerability",2002-01-18,"Tekno pHReak",osx,dos,0
|
||||||
21235,platforms/windows/remote/21235.pl,"Citrix Nfuse 1.6 - Published Applications Information Leak Vulnerability",2002-01-22,"Ian Vitek",windows,remote,0
|
21235,platforms/windows/remote/21235.pl,"Citrix Nfuse 1.6 - Published Applications Information Leak Vulnerability",2002-01-22,"Ian Vitek",windows,remote,0
|
||||||
21236,platforms/unix/dos/21236.txt,"DNRD 1.x/2.x DNS Request/Reply Denial of Service Vulnerability",2002-01-20,"Andrew Griffiths",unix,dos,0
|
21236,platforms/unix/dos/21236.txt,"DNRD 1.x/2.x DNS Request/Reply Denial of Service Vulnerability",2002-01-20,"Andrew Griffiths",unix,dos,0
|
||||||
|
@ -18673,7 +18673,7 @@ id,file,description,date,author,platform,type,port
|
||||||
21390,platforms/cgi/remote/21390.txt,"Sambar Server 5.1 Script Source Disclosure Vulnerability",2002-04-17,pgrundl,cgi,remote,0
|
21390,platforms/cgi/remote/21390.txt,"Sambar Server 5.1 Script Source Disclosure Vulnerability",2002-04-17,pgrundl,cgi,remote,0
|
||||||
21391,platforms/php/webapps/21391.txt,"PVote 1.0/1.5 Poll Content Manipulation Vulnerability",2002-04-18,"Daniel Nyström",php,webapps,0
|
21391,platforms/php/webapps/21391.txt,"PVote 1.0/1.5 Poll Content Manipulation Vulnerability",2002-04-18,"Daniel Nyström",php,webapps,0
|
||||||
21392,platforms/windows/webapps/21392.txt,"Spiceworks 6.0.00993 - Multiple Script Injection Vulnerabilities",2012-09-19,LiquidWorm,windows,webapps,0
|
21392,platforms/windows/webapps/21392.txt,"Spiceworks 6.0.00993 - Multiple Script Injection Vulnerabilities",2012-09-19,LiquidWorm,windows,webapps,0
|
||||||
21393,platforms/php/webapps/21393.txt,"wordpress wp-topbar 4.02 - Multiple Vulnerabilities",2012-09-19,"Blake Entrekin",php,webapps,0
|
21393,platforms/php/webapps/21393.txt,"WordPress Plugin wp-topbar 4.02 - Multiple Vulnerabilities",2012-09-19,"Blake Entrekin",php,webapps,0
|
||||||
21394,platforms/windows/webapps/21394.txt,"sonicwall email security 7.3.5 - Multiple Vulnerabilities",2012-09-19,Vulnerability-Lab,windows,webapps,0
|
21394,platforms/windows/webapps/21394.txt,"sonicwall email security 7.3.5 - Multiple Vulnerabilities",2012-09-19,Vulnerability-Lab,windows,webapps,0
|
||||||
21395,platforms/hardware/webapps/21395.txt,"Fortigate UTM WAF Appliance Multiple Vulnerabilities",2012-09-19,Vulnerability-Lab,hardware,webapps,0
|
21395,platforms/hardware/webapps/21395.txt,"Fortigate UTM WAF Appliance Multiple Vulnerabilities",2012-09-19,Vulnerability-Lab,hardware,webapps,0
|
||||||
21396,platforms/php/webapps/21396.txt,"torrenttrader 2.08 - Multiple Vulnerabilities",2012-09-19,waraxe,php,webapps,0
|
21396,platforms/php/webapps/21396.txt,"torrenttrader 2.08 - Multiple Vulnerabilities",2012-09-19,waraxe,php,webapps,0
|
||||||
|
@ -19118,7 +19118,7 @@ id,file,description,date,author,platform,type,port
|
||||||
21841,platforms/windows/remote/21841.rb,"NTR ActiveX Control Check() Method Buffer Overflow",2012-10-10,metasploit,windows,remote,0
|
21841,platforms/windows/remote/21841.rb,"NTR ActiveX Control Check() Method Buffer Overflow",2012-10-10,metasploit,windows,remote,0
|
||||||
21842,platforms/windows/remote/21842.rb,"HP Application Lifecycle Management - XGO.ocx ActiveX SetShapeNodeType() Remote Code Execution",2012-10-10,metasploit,windows,remote,0
|
21842,platforms/windows/remote/21842.rb,"HP Application Lifecycle Management - XGO.ocx ActiveX SetShapeNodeType() Remote Code Execution",2012-10-10,metasploit,windows,remote,0
|
||||||
21843,platforms/windows/local/21843.rb,"Windows Escalate UAC Execute RunAs",2012-10-10,metasploit,windows,local,0
|
21843,platforms/windows/local/21843.rb,"Windows Escalate UAC Execute RunAs",2012-10-10,metasploit,windows,local,0
|
||||||
21844,platforms/windows/local/21844.rb,"Windows - AfdJoinLeaf Privilege Escalation (MS11-080)",2012-10-10,metasploit,windows,local,0
|
21844,platforms/windows/local/21844.rb,"Microsoft Windows - AfdJoinLeaf Privilege Escalation (MS11-080)",2012-10-10,metasploit,windows,local,0
|
||||||
21845,platforms/windows/local/21845.rb,"Windows Escalate UAC Protection Bypass",2012-10-10,metasploit,windows,local,0
|
21845,platforms/windows/local/21845.rb,"Windows Escalate UAC Protection Bypass",2012-10-10,metasploit,windows,local,0
|
||||||
21846,platforms/java/remote/21846.rb,"Oracle Business Transaction Management FlashTunnelService Remote Code Execution",2012-10-10,metasploit,java,remote,7001
|
21846,platforms/java/remote/21846.rb,"Oracle Business Transaction Management FlashTunnelService Remote Code Execution",2012-10-10,metasploit,java,remote,7001
|
||||||
21847,platforms/windows/remote/21847.rb,"Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution",2012-10-10,metasploit,windows,remote,0
|
21847,platforms/windows/remote/21847.rb,"Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command Execution",2012-10-10,metasploit,windows,remote,0
|
||||||
|
@ -19129,14 +19129,14 @@ id,file,description,date,author,platform,type,port
|
||||||
21852,platforms/unix/remote/21852.rb,"QNX QCONN Remote Command Execution Vulnerability",2012-10-10,metasploit,unix,remote,0
|
21852,platforms/unix/remote/21852.rb,"QNX QCONN Remote Command Execution Vulnerability",2012-10-10,metasploit,unix,remote,0
|
||||||
21853,platforms/unix/remote/21853.txt,"Apache Tomcat 3/4 - DefaultServlet File Disclosure Vulnerability",2002-09-24,"Rossen Raykov",unix,remote,0
|
21853,platforms/unix/remote/21853.txt,"Apache Tomcat 3/4 - DefaultServlet File Disclosure Vulnerability",2002-09-24,"Rossen Raykov",unix,remote,0
|
||||||
21854,platforms/linux/dos/21854.c,"Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability",2002-09-24,"K.C. Wong",linux,dos,0
|
21854,platforms/linux/dos/21854.c,"Apache 2.0.39/40 Oversized STDERR Buffer Denial of Service Vulnerability",2002-09-24,"K.C. Wong",linux,dos,0
|
||||||
21855,platforms/php/webapps/21855.txt,"PHPNuke 6.0/6.5 - Search Form Cross-Site Scripting Vulnerability",2002-09-24,"Mark Grimes",php,webapps,0
|
21855,platforms/php/webapps/21855.txt,"PHP-Nuke 6.0/6.5 - Search Form Cross-Site Scripting Vulnerability",2002-09-24,"Mark Grimes",php,webapps,0
|
||||||
21856,platforms/multiple/local/21856.txt,"OpenVms 5.3/6.2/7.x UCX POP Server Arbitrary File Modification Vulnerability",2002-09-25,"Mike Riley",multiple,local,0
|
21856,platforms/multiple/local/21856.txt,"OpenVms 5.3/6.2/7.x UCX POP Server Arbitrary File Modification Vulnerability",2002-09-25,"Mike Riley",multiple,local,0
|
||||||
21857,platforms/linux/remote/21857.pl,"Monkey HTTP Server 0.1.4 File Disclosure Vulnerability",2002-09-25,DownBload,linux,remote,0
|
21857,platforms/linux/remote/21857.pl,"Monkey HTTP Server 0.1.4 File Disclosure Vulnerability",2002-09-25,DownBload,linux,remote,0
|
||||||
21858,platforms/linux/remote/21858.txt,"ACWeb 1.14/1.8 - Cross-Site Scripting Vulnerability",2002-09-25,DownBload,linux,remote,0
|
21858,platforms/linux/remote/21858.txt,"ACWeb 1.14/1.8 - Cross-Site Scripting Vulnerability",2002-09-25,DownBload,linux,remote,0
|
||||||
21859,platforms/php/webapps/21859.txt,"PHPNuke 6.0 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
21859,platforms/php/webapps/21859.txt,"PHP-Nuke 6.0 - News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
||||||
21860,platforms/php/webapps/21860.txt,"NPDS 4.8 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
21860,platforms/php/webapps/21860.txt,"NPDS 4.8 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
||||||
21861,platforms/php/webapps/21861.txt,"DaCode 1.2 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
21861,platforms/php/webapps/21861.txt,"DaCode 1.2 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
||||||
21862,platforms/php/webapps/21862.txt,"PHPNuke 6.0 Modules.PHP SQL Injection Vulnerability",2002-09-25,"Pedro Inacio",php,webapps,0
|
21862,platforms/php/webapps/21862.txt,"PHP-Nuke 6.0 - Modules.PHP SQL Injection Vulnerability",2002-09-25,"Pedro Inacio",php,webapps,0
|
||||||
21863,platforms/php/webapps/21863.txt,"Drupal 4.0 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
21863,platforms/php/webapps/21863.txt,"Drupal 4.0 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
||||||
21864,platforms/php/webapps/21864.txt,"PHPWebSite 0.8.3 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
21864,platforms/php/webapps/21864.txt,"PHPWebSite 0.8.3 News Message HTML Injection Vulnerability",2002-09-25,das@hush.com,php,webapps,0
|
||||||
21865,platforms/linux/local/21865.c,"Interbase 5/6 GDS_Lock_MGR UMask File Permission Changing Vulnerability",2002-09-25,grazer,linux,local,0
|
21865,platforms/linux/local/21865.c,"Interbase 5/6 GDS_Lock_MGR UMask File Permission Changing Vulnerability",2002-09-25,grazer,linux,local,0
|
||||||
|
@ -19155,7 +19155,7 @@ id,file,description,date,author,platform,type,port
|
||||||
21878,platforms/cgi/webapps/21878.txt,"EmuMail 5.0 Email Form Script Injection Vulnerability",2002-09-29,FVS,cgi,webapps,0
|
21878,platforms/cgi/webapps/21878.txt,"EmuMail 5.0 Email Form Script Injection Vulnerability",2002-09-29,FVS,cgi,webapps,0
|
||||||
21879,platforms/java/webapps/21879.txt,"Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal Vulnerability",2002-09-30,"ET LoWNOISE",java,webapps,0
|
21879,platforms/java/webapps/21879.txt,"Sun ONE Starter Kit 2.0 / ASTAware SearchDisc 3.1 - Search Engine Directory Traversal Vulnerability",2002-09-30,"ET LoWNOISE",java,webapps,0
|
||||||
21880,platforms/multiple/remote/21880.txt,"Monkey HTTP Server 0.1/0.4/0.5 - Multiple Cross-Site Scripting Vulnerabilities",2002-09-30,DownBload,multiple,remote,0
|
21880,platforms/multiple/remote/21880.txt,"Monkey HTTP Server 0.1/0.4/0.5 - Multiple Cross-Site Scripting Vulnerabilities",2002-09-30,DownBload,multiple,remote,0
|
||||||
21887,platforms/windows/local/21887.php,"PHP 5.3.4 Win Com Module Com_sink Exploit",2012-10-11,fb1h2s,windows,local,0
|
21887,platforms/windows/local/21887.php,"PHP 5.3.4 Win Com Module - Com_sink Exploit",2012-10-11,fb1h2s,windows,local,0
|
||||||
21888,platforms/windows/remote/21888.rb,"KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability",2012-10-11,metasploit,windows,remote,0
|
21888,platforms/windows/remote/21888.rb,"KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability",2012-10-11,metasploit,windows,remote,0
|
||||||
21889,platforms/windows/dos/21889.pl,"VLC Player <= 2.0.3 - (.png) ReadAV Crash PoC",2012-10-11,"Jean Pascal Pereira",windows,dos,0
|
21889,platforms/windows/dos/21889.pl,"VLC Player <= 2.0.3 - (.png) ReadAV Crash PoC",2012-10-11,"Jean Pascal Pereira",windows,dos,0
|
||||||
21890,platforms/php/webapps/21890.txt,"Omnistar Document Manager 8.0 - Multiple Vulnerabilities",2012-10-11,Vulnerability-Lab,php,webapps,0
|
21890,platforms/php/webapps/21890.txt,"Omnistar Document Manager 8.0 - Multiple Vulnerabilities",2012-10-11,Vulnerability-Lab,php,webapps,0
|
||||||
|
@ -19392,7 +19392,7 @@ id,file,description,date,author,platform,type,port
|
||||||
22130,platforms/multiple/remote/22130.txt,"AN HTTPD 1.41 e Cross-Site Scripting Vulnerability",2003-01-06,D4rkGr3y,multiple,remote,0
|
22130,platforms/multiple/remote/22130.txt,"AN HTTPD 1.41 e Cross-Site Scripting Vulnerability",2003-01-06,D4rkGr3y,multiple,remote,0
|
||||||
22131,platforms/unix/remote/22131.pl,"Linux Kernel 2.0.x/2.2.x/2.4.x_FreeBSD 4.x Network Device Driver Frame Padding Information Disclosure",2007-03-23,"Jon Hart",unix,remote,0
|
22131,platforms/unix/remote/22131.pl,"Linux Kernel 2.0.x/2.2.x/2.4.x_FreeBSD 4.x Network Device Driver Frame Padding Information Disclosure",2007-03-23,"Jon Hart",unix,remote,0
|
||||||
22132,platforms/windows/dos/22132.txt,"Microsoft Windows XP/2000 Fontview Denial of Service Vulnerability",2003-01-06,andrew,windows,dos,0
|
22132,platforms/windows/dos/22132.txt,"Microsoft Windows XP/2000 Fontview Denial of Service Vulnerability",2003-01-06,andrew,windows,dos,0
|
||||||
22133,platforms/php/webapps/22133.txt,"myPHPNuke 1.8.8 Default_Theme Cross-Site Scripting Vulnerability",2003-01-06,Mindwarper,php,webapps,0
|
22133,platforms/php/webapps/22133.txt,"myPHPNuke 1.8.8 - Default_Theme Cross-Site Scripting Vulnerability",2003-01-06,Mindwarper,php,webapps,0
|
||||||
22134,platforms/php/webapps/22134.txt,"S8Forum 3.0 - Remote Command Execution Vulnerability",2003-01-06,nmsh_sa,php,webapps,0
|
22134,platforms/php/webapps/22134.txt,"S8Forum 3.0 - Remote Command Execution Vulnerability",2003-01-06,nmsh_sa,php,webapps,0
|
||||||
22135,platforms/linux/remote/22135.c,"TANne 0.6.17 Session Manager SysLog Format String Vulnerability",2003-01-07,"dong-h0un yoU",linux,remote,0
|
22135,platforms/linux/remote/22135.c,"TANne 0.6.17 Session Manager SysLog Format String Vulnerability",2003-01-07,"dong-h0un yoU",linux,remote,0
|
||||||
22136,platforms/windows/remote/22136.txt,"PlatinumFTPServer 1.0.6 Dot-Dot-Slash Directory Traversal Vulnerability",2003-01-07,"Dennis Rand",windows,remote,0
|
22136,platforms/windows/remote/22136.txt,"PlatinumFTPServer 1.0.6 Dot-Dot-Slash Directory Traversal Vulnerability",2003-01-07,"Dennis Rand",windows,remote,0
|
||||||
|
@ -19417,7 +19417,7 @@ id,file,description,date,author,platform,type,port
|
||||||
22154,platforms/windows/dos/22154.pl,"RealPlayer 15.0.6.14.3gp - Crash PoC",2012-10-22,coolkaveh,windows,dos,0
|
22154,platforms/windows/dos/22154.pl,"RealPlayer 15.0.6.14.3gp - Crash PoC",2012-10-22,coolkaveh,windows,dos,0
|
||||||
22156,platforms/php/webapps/22156.txt,"White Label CMS 1.5 - CSRF & Persistent XSS",2012-10-22,pcsjj,php,webapps,0
|
22156,platforms/php/webapps/22156.txt,"White Label CMS 1.5 - CSRF & Persistent XSS",2012-10-22,pcsjj,php,webapps,0
|
||||||
22157,platforms/php/webapps/22157.txt,"Schoolhos CMS Beta 2.29 (index.php id parameter) SQL Injection",2012-10-22,Cumi,php,webapps,0
|
22157,platforms/php/webapps/22157.txt,"Schoolhos CMS Beta 2.29 (index.php id parameter) SQL Injection",2012-10-22,Cumi,php,webapps,0
|
||||||
22158,platforms/php/webapps/22158.txt,"wordpress social discussions plugin 6.1.1 - Multiple Vulnerabilities",2012-10-22,waraxe,php,webapps,0
|
22158,platforms/php/webapps/22158.txt,"WordPress Plugin social discussions 6.1.1 - Multiple Vulnerabilities",2012-10-22,waraxe,php,webapps,0
|
||||||
22159,platforms/php/webapps/22159.txt,"subrion CMS 2.2.1 - Multiple Vulnerabilities",2012-10-22,"High-Tech Bridge SA",php,webapps,0
|
22159,platforms/php/webapps/22159.txt,"subrion CMS 2.2.1 - Multiple Vulnerabilities",2012-10-22,"High-Tech Bridge SA",php,webapps,0
|
||||||
22160,platforms/php/webapps/22160.txt,"atutor 1.2 - Multiple Vulnerabilities",2012-10-22,"High-Tech Bridge SA",php,webapps,0
|
22160,platforms/php/webapps/22160.txt,"atutor 1.2 - Multiple Vulnerabilities",2012-10-22,"High-Tech Bridge SA",php,webapps,0
|
||||||
22161,platforms/windows/remote/22161.rb,"Turbo FTP Server 1.30.823 PORT Overflow",2012-10-23,metasploit,windows,remote,21
|
22161,platforms/windows/remote/22161.rb,"Turbo FTP Server 1.30.823 PORT Overflow",2012-10-23,metasploit,windows,remote,21
|
||||||
|
@ -19523,7 +19523,7 @@ id,file,description,date,author,platform,type,port
|
||||||
22263,platforms/cgi/webapps/22263.pl,"cPanel 5.0 Guestbook.cgi Remote Command Execution Vulnerability (4)",2003-02-19,pokleyzz,cgi,webapps,0
|
22263,platforms/cgi/webapps/22263.pl,"cPanel 5.0 Guestbook.cgi Remote Command Execution Vulnerability (4)",2003-02-19,pokleyzz,cgi,webapps,0
|
||||||
22264,platforms/linux/remote/22264.txt,"OpenSSL 0.9.x CBC Error Information Leakage Weakness",2003-02-19,"Martin Vuagnoux",linux,remote,0
|
22264,platforms/linux/remote/22264.txt,"OpenSSL 0.9.x CBC Error Information Leakage Weakness",2003-02-19,"Martin Vuagnoux",linux,remote,0
|
||||||
22265,platforms/linux/local/22265.pl,"cPanel 5.0 - Openwebmail Local Privileges Escalation Vulnerability",2003-02-19,deadbeat,linux,local,0
|
22265,platforms/linux/local/22265.pl,"cPanel 5.0 - Openwebmail Local Privileges Escalation Vulnerability",2003-02-19,deadbeat,linux,local,0
|
||||||
22266,platforms/php/webapps/22266.php,"PHPNuke 5.6/6.0 - Search Engine SQL Injection Vulnerability",2003-02-19,"David Zentner",php,webapps,0
|
22266,platforms/php/webapps/22266.php,"PHP-Nuke 5.6/6.0 - Search Engine SQL Injection Vulnerability",2003-02-19,"David Zentner",php,webapps,0
|
||||||
22267,platforms/php/webapps/22267.php,"PHPBB2 Page_Header.PHP SQL Injection Vulnerability",2003-02-19,"David Zentner",php,webapps,0
|
22267,platforms/php/webapps/22267.php,"PHPBB2 Page_Header.PHP SQL Injection Vulnerability",2003-02-19,"David Zentner",php,webapps,0
|
||||||
22268,platforms/php/webapps/22268.txt,"myPHPNuke 1.8.8 Links.php Cross-Site Scripting Vulnerability",2003-02-20,"Tacettin Karadeniz",php,webapps,0
|
22268,platforms/php/webapps/22268.txt,"myPHPNuke 1.8.8 Links.php Cross-Site Scripting Vulnerability",2003-02-20,"Tacettin Karadeniz",php,webapps,0
|
||||||
22269,platforms/windows/remote/22269.txt,"Sage 1.0 beta 3 Content Management System Path Disclosure Vulnerability",2003-02-20,euronymous,windows,remote,0
|
22269,platforms/windows/remote/22269.txt,"Sage 1.0 beta 3 Content Management System Path Disclosure Vulnerability",2003-02-20,euronymous,windows,remote,0
|
||||||
|
@ -19599,9 +19599,9 @@ id,file,description,date,author,platform,type,port
|
||||||
22344,platforms/linux/local/22344.txt,"Man Program 1.5 Unsafe Return Value Command Execution Vulnerability",2003-03-11,"Jack Lloyd",linux,local,0
|
22344,platforms/linux/local/22344.txt,"Man Program 1.5 Unsafe Return Value Command Execution Vulnerability",2003-03-11,"Jack Lloyd",linux,local,0
|
||||||
22345,platforms/multiple/dos/22345.txt,"Multitech RouteFinder 550 - Remote Memory Corruption Vulnerability",2003-03-11,"Peter Kruse",multiple,dos,0
|
22345,platforms/multiple/dos/22345.txt,"Multitech RouteFinder 550 - Remote Memory Corruption Vulnerability",2003-03-11,"Peter Kruse",multiple,dos,0
|
||||||
22346,platforms/linux/remote/22346.c,"PGP4Pine 1.75.6/1.76 Long Message Line Buffer Overflow Vulnerability",2003-03-12,"Eric AUGE",linux,remote,0
|
22346,platforms/linux/remote/22346.c,"PGP4Pine 1.75.6/1.76 Long Message Line Buffer Overflow Vulnerability",2003-03-12,"Eric AUGE",linux,remote,0
|
||||||
22347,platforms/php/webapps/22347.txt,"PHPNuke 5.5/6.0 AvantGo Module Path Disclosure Vulnerability",2003-03-12,"Rynho Zeros Web",php,webapps,0
|
22347,platforms/php/webapps/22347.txt,"PHP-Nuke 5.5/6.0 AvantGo Module - Path Disclosure Vulnerability",2003-03-12,"Rynho Zeros Web",php,webapps,0
|
||||||
22348,platforms/php/webapps/22348.txt,"PHPNuke 5.5/6.0 News Module Path Disclosure Vulnerability",2003-03-12,"Rynho Zeros Web",php,webapps,0
|
22348,platforms/php/webapps/22348.txt,"PHP-Nuke 5.5/6.0 News Module - Path Disclosure Vulnerability",2003-03-12,"Rynho Zeros Web",php,webapps,0
|
||||||
22349,platforms/php/webapps/22349.txt,"PHPNuke Splatt Forum 3.2 Module Path Disclosure Vulnerability",2003-03-12,"Rynho Zeros Web",php,webapps,0
|
22349,platforms/php/webapps/22349.txt,"PHP-Nuke Splatt Forum 3.2 Module - Path Disclosure Vulnerability",2003-03-12,"Rynho Zeros Web",php,webapps,0
|
||||||
22350,platforms/hardware/remote/22350.txt,"Nokia SGSN DX200 - Remote SNMP Information Disclosure Vulnerability",2003-03-13,"Ollie Whitehouse",hardware,remote,0
|
22350,platforms/hardware/remote/22350.txt,"Nokia SGSN DX200 - Remote SNMP Information Disclosure Vulnerability",2003-03-13,"Ollie Whitehouse",hardware,remote,0
|
||||||
22351,platforms/windows/remote/22351.py,"Freefloat FTP Server PUT Command Buffer Overflow",2012-10-30,"Jacob Holcomb",windows,remote,0
|
22351,platforms/windows/remote/22351.py,"Freefloat FTP Server PUT Command Buffer Overflow",2012-10-30,"Jacob Holcomb",windows,remote,0
|
||||||
22352,platforms/linux/dos/22352.txt,"TCPDump 3.6/3.7 Malformed RADIUS Packet Denial of Service Vulnerability",2003-03-14,"Bill Ralph",linux,dos,0
|
22352,platforms/linux/dos/22352.txt,"TCPDump 3.6/3.7 Malformed RADIUS Packet Denial of Service Vulnerability",2003-03-14,"Bill Ralph",linux,dos,0
|
||||||
|
@ -19626,7 +19626,7 @@ id,file,description,date,author,platform,type,port
|
||||||
22371,platforms/linux/remote/22371.txt,"Ximian Evolution 1.x - MIME image/* Content-Type Data Inclusion Vulnerability",2003-03-19,"Core Security",linux,remote,0
|
22371,platforms/linux/remote/22371.txt,"Ximian Evolution 1.x - MIME image/* Content-Type Data Inclusion Vulnerability",2003-03-19,"Core Security",linux,remote,0
|
||||||
22372,platforms/php/webapps/22372.txt,"vam shop 1.69 - Multiple Vulnerabilities",2012-10-31,"Security Effect Team",php,webapps,0
|
22372,platforms/php/webapps/22372.txt,"vam shop 1.69 - Multiple Vulnerabilities",2012-10-31,"Security Effect Team",php,webapps,0
|
||||||
22373,platforms/php/webapps/22373.txt,"PG Dating Pro 1.0 CMS - Multiple Vulnerabilities",2012-10-31,Vulnerability-Lab,php,webapps,0
|
22373,platforms/php/webapps/22373.txt,"PG Dating Pro 1.0 CMS - Multiple Vulnerabilities",2012-10-31,Vulnerability-Lab,php,webapps,0
|
||||||
22374,platforms/php/webapps/22374.txt,"wordpress foxypress plugin 0.4.2.5 - Multiple Vulnerabilities",2012-10-31,waraxe,php,webapps,0
|
22374,platforms/php/webapps/22374.txt,"WordPress Plugin foxypress 0.4.2.5 - Multiple Vulnerabilities",2012-10-31,waraxe,php,webapps,0
|
||||||
22375,platforms/windows/remote/22375.rb,"Aladdin Knowledge System Ltd ChooseFilePath Buffer Overflow",2012-11-01,metasploit,windows,remote,0
|
22375,platforms/windows/remote/22375.rb,"Aladdin Knowledge System Ltd ChooseFilePath Buffer Overflow",2012-11-01,metasploit,windows,remote,0
|
||||||
22376,platforms/linux/local/22376.txt,"GNOME Eye Of Gnome 1.0.x/1.1.x/2.2 Format String Vulnerability",2003-03-28,"Core Security",linux,local,0
|
22376,platforms/linux/local/22376.txt,"GNOME Eye Of Gnome 1.0.x/1.1.x/2.2 Format String Vulnerability",2003-03-28,"Core Security",linux,local,0
|
||||||
22377,platforms/cgi/webapps/22377.txt,"Kebi Academy 2001 Input Validation Vulnerability",2003-03-17,"dong-h0un U",cgi,webapps,0
|
22377,platforms/cgi/webapps/22377.txt,"Kebi Academy 2001 Input Validation Vulnerability",2003-03-17,"dong-h0un U",cgi,webapps,0
|
||||||
|
@ -19661,10 +19661,10 @@ id,file,description,date,author,platform,type,port
|
||||||
22408,platforms/cgi/webapps/22408.txt,"Planetmoon Guestbook Clear Text Password Retrieval Vulnerability",2003-03-21,subj,cgi,webapps,0
|
22408,platforms/cgi/webapps/22408.txt,"Planetmoon Guestbook Clear Text Password Retrieval Vulnerability",2003-03-21,subj,cgi,webapps,0
|
||||||
22409,platforms/multiple/remote/22409.txt,"Simple Chat 1.x User Information Disclosure Vulnerability",2003-03-21,subj,multiple,remote,0
|
22409,platforms/multiple/remote/22409.txt,"Simple Chat 1.x User Information Disclosure Vulnerability",2003-03-21,subj,multiple,remote,0
|
||||||
22410,platforms/multiple/remote/22410.pl,"ProtWare HTML Guardian 6.x Encryption Weakness",2003-03-21,rain_song,multiple,remote,0
|
22410,platforms/multiple/remote/22410.pl,"ProtWare HTML Guardian 6.x Encryption Weakness",2003-03-21,rain_song,multiple,remote,0
|
||||||
22411,platforms/php/webapps/22411.txt,"PHPNuke 5.6/6.x Banners.PHP Banner Manager Password Disclosure Vulnerability",2003-03-22,frog,php,webapps,0
|
22411,platforms/php/webapps/22411.txt,"PHP-Nuke 5.6/6.x Banners.PHP Banner Manager - Password Disclosure Vulnerability",2003-03-22,frog,php,webapps,0
|
||||||
22412,platforms/php/webapps/22412.txt,"Advanced Poll 2.0 - Remote Information Disclosure Vulnerability",2003-03-22,subj,php,webapps,0
|
22412,platforms/php/webapps/22412.txt,"Advanced Poll 2.0 - Remote Information Disclosure Vulnerability",2003-03-22,subj,php,webapps,0
|
||||||
22413,platforms/php/webapps/22413.txt,"PHPNuke 5.6/6.x News Module Article.PHP SQL Injection Vulnerability",2003-03-22,frog,php,webapps,0
|
22413,platforms/php/webapps/22413.txt,"PHP-Nuke 5.6/6.x News Module - Article.PHP SQL Injection Vulnerability",2003-03-22,frog,php,webapps,0
|
||||||
22414,platforms/php/webapps/22414.php,"PHPNuke 5.6/6.x News Module Index.PHP SQL Injection Vulnerability",2003-03-23,frog,php,webapps,0
|
22414,platforms/php/webapps/22414.php,"PHP-Nuke 5.6/6.x News Module - Index.PHP SQL Injection Vulnerability",2003-03-23,frog,php,webapps,0
|
||||||
22415,platforms/hardware/dos/22415.c,"3Com SuperStack II RAS 1500 - IP Header Denial of Service Vulnerability",2003-03-24,"Piotr Chytla",hardware,dos,0
|
22415,platforms/hardware/dos/22415.c,"3Com SuperStack II RAS 1500 - IP Header Denial of Service Vulnerability",2003-03-24,"Piotr Chytla",hardware,dos,0
|
||||||
22416,platforms/hardware/remote/22416.txt,"3Com SuperStack II RAS 1500 Unauthorized Access Vulnerability",2003-03-24,"Piotr Chytla",hardware,remote,0
|
22416,platforms/hardware/remote/22416.txt,"3Com SuperStack II RAS 1500 Unauthorized Access Vulnerability",2003-03-24,"Piotr Chytla",hardware,remote,0
|
||||||
22417,platforms/windows/dos/22417.py,"Kerio Personal Firewall 2.1.x - Remote Authentication Packet Buffer Overflow Vulnerability (1)",2003-04-28,"Core Security",windows,dos,0
|
22417,platforms/windows/dos/22417.py,"Kerio Personal Firewall 2.1.x - Remote Authentication Packet Buffer Overflow Vulnerability (1)",2003-04-28,"Core Security",windows,dos,0
|
||||||
|
@ -19673,8 +19673,8 @@ id,file,description,date,author,platform,type,port
|
||||||
22420,platforms/windows/dos/22420.txt,"Emule 0.27 b Empty Nickname Chat Request Denial of Service Vulnerability",2003-03-25,"Auriemma Luigi",windows,dos,0
|
22420,platforms/windows/dos/22420.txt,"Emule 0.27 b Empty Nickname Chat Request Denial of Service Vulnerability",2003-03-25,"Auriemma Luigi",windows,dos,0
|
||||||
22421,platforms/php/webapps/22421.txt,"Web Chat Manager 2.0 HTML Code Injection Vulnerability",2003-03-25,Over_G,php,webapps,0
|
22421,platforms/php/webapps/22421.txt,"Web Chat Manager 2.0 HTML Code Injection Vulnerability",2003-03-25,Over_G,php,webapps,0
|
||||||
22422,platforms/php/webapps/22422.txt,"PHP-Nuke 6.5 Addon Viewpage.PHP File Disclosure Vulnerability",2003-03-25,"Zero-X www.lobnan.de Team",php,webapps,0
|
22422,platforms/php/webapps/22422.txt,"PHP-Nuke 6.5 Addon Viewpage.PHP File Disclosure Vulnerability",2003-03-25,"Zero-X www.lobnan.de Team",php,webapps,0
|
||||||
22423,platforms/php/webapps/22423.txt,"PHPNuke 6.0/6.5 Forum Module Viewtopic.php SQL Injection Vulnerability",2003-03-25,frog,php,webapps,0
|
22423,platforms/php/webapps/22423.txt,"PHP-Nuke 6.0/6.5 Forum Module - Viewtopic.php SQL Injection Vulnerability",2003-03-25,frog,php,webapps,0
|
||||||
22424,platforms/php/webapps/22424.txt,"PHPNuke 6.0/6.5 Forum Module Viewforum.PHP SQL Injection Vulnerability",2003-03-25,frog,php,webapps,0
|
22424,platforms/php/webapps/22424.txt,"PHP-Nuke 6.0/6.5 Forum Module - Viewforum.PHP SQL Injection Vulnerability",2003-03-25,frog,php,webapps,0
|
||||||
22425,platforms/php/dos/22425.php,"PHP 4.x socket_recv() Signed Integer Memory Corruption Vulnerability",2003-03-26,"Sir Mordred",php,dos,0
|
22425,platforms/php/dos/22425.php,"PHP 4.x socket_recv() Signed Integer Memory Corruption Vulnerability",2003-03-26,"Sir Mordred",php,dos,0
|
||||||
22426,platforms/php/dos/22426.php,"PHP 4.x socket_recvfrom() Signed Integer Memory Corruption Vulnerability",2003-03-26,"Sir Mordred",php,dos,0
|
22426,platforms/php/dos/22426.php,"PHP 4.x socket_recvfrom() Signed Integer Memory Corruption Vulnerability",2003-03-26,"Sir Mordred",php,dos,0
|
||||||
22427,platforms/php/webapps/22427.txt,"Wordpress All Video Gallery 1.1 - SQL Injection Vulnerability",2012-11-02,"Ashiyane Digital Security Team",php,webapps,0
|
22427,platforms/php/webapps/22427.txt,"Wordpress All Video Gallery 1.1 - SQL Injection Vulnerability",2012-11-02,"Ashiyane Digital Security Team",php,webapps,0
|
||||||
|
@ -19805,8 +19805,8 @@ id,file,description,date,author,platform,type,port
|
||||||
22554,platforms/asp/webapps/22554.txt,"Microsoft BizTalk Server 2000/2002 DTA rawdocdata.asp SQL Injection Vulnerability",2003-04-30,"Cesar Cerrudo",asp,webapps,0
|
22554,platforms/asp/webapps/22554.txt,"Microsoft BizTalk Server 2000/2002 DTA rawdocdata.asp SQL Injection Vulnerability",2003-04-30,"Cesar Cerrudo",asp,webapps,0
|
||||||
22555,platforms/asp/webapps/22555.txt,"Microsoft BizTalk Server 2000/2002 DTA RawCustomSearchField.asp SQL Injection",2003-04-30,"Cesar Cerrudo",asp,webapps,0
|
22555,platforms/asp/webapps/22555.txt,"Microsoft BizTalk Server 2000/2002 DTA RawCustomSearchField.asp SQL Injection",2003-04-30,"Cesar Cerrudo",asp,webapps,0
|
||||||
22556,platforms/windows/remote/22556.c,"MDG Web Server 4D 3.6 HTTP Command Buffer Overflow Vulnerability",2003-04-29,badpack3t,windows,remote,0
|
22556,platforms/windows/remote/22556.c,"MDG Web Server 4D 3.6 HTTP Command Buffer Overflow Vulnerability",2003-04-29,badpack3t,windows,remote,0
|
||||||
22557,platforms/php/webapps/22557.txt,"PHPNuke Splatt Forum 4.0 Module Cross-Site Scripting Vulnerability",2003-05-01,"Morning Wood",php,webapps,0
|
22557,platforms/php/webapps/22557.txt,"PHP-Nuke Splatt Forum 4.0 Module - Cross-Site Scripting Vulnerability",2003-05-01,"Morning Wood",php,webapps,0
|
||||||
22558,platforms/php/webapps/22558.txt,"PHPNuke Splatt Forum 4.0 Module HTML Injection Vulnerability",2003-05-01,"Morning Wood",php,webapps,0
|
22558,platforms/php/webapps/22558.txt,"PHP-Nuke Splatt Forum 4.0 Module - HTML Injection Vulnerability",2003-05-01,"Morning Wood",php,webapps,0
|
||||||
22559,platforms/cgi/webapps/22559.pl,"Stockman Shopping Cart 7.8 - Arbitrary Command Execution Vulnerability",2003-05-01,"Aleksey Sintsov",cgi,webapps,0
|
22559,platforms/cgi/webapps/22559.pl,"Stockman Shopping Cart 7.8 - Arbitrary Command Execution Vulnerability",2003-05-01,"Aleksey Sintsov",cgi,webapps,0
|
||||||
22560,platforms/linux/dos/22560.txt,"KDE Konqueror 3.0.3 Malformed HTML Page Denial of Service Vulnerability",2003-05-02,Joachim_Strombergson,linux,dos,0
|
22560,platforms/linux/dos/22560.txt,"KDE Konqueror 3.0.3 Malformed HTML Page Denial of Service Vulnerability",2003-05-02,Joachim_Strombergson,linux,dos,0
|
||||||
22561,platforms/hp-ux/dos/22561.txt,"HP-UX 11 RWrite Buffer Overflow Vulnerability",2003-05-02,bt@delfi.lt,hp-ux,dos,0
|
22561,platforms/hp-ux/dos/22561.txt,"HP-UX 11 RWrite Buffer Overflow Vulnerability",2003-05-02,bt@delfi.lt,hp-ux,dos,0
|
||||||
|
@ -19835,7 +19835,7 @@ id,file,description,date,author,platform,type,port
|
||||||
22586,platforms/windows/dos/22586.c,"EType EServ 2.98/2.99/3.0 Resource Exhaustion Denial of Service Vulnerability (2)",2003-05-11,rash,windows,dos,0
|
22586,platforms/windows/dos/22586.c,"EType EServ 2.98/2.99/3.0 Resource Exhaustion Denial of Service Vulnerability (2)",2003-05-11,rash,windows,dos,0
|
||||||
22587,platforms/windows/dos/22587.c,"Pi3Web 2.0.1 Malformed GET Request Denial of Service Vulnerability",2003-04-26,"Angelo Rosiello",windows,dos,0
|
22587,platforms/windows/dos/22587.c,"Pi3Web 2.0.1 Malformed GET Request Denial of Service Vulnerability",2003-04-26,"Angelo Rosiello",windows,dos,0
|
||||||
22588,platforms/cgi/webapps/22588.txt,"Happymall E-Commerce Software 4.3/4.4 Normal_HTML.CGI Cross-Site Scripting Vulnerability",2003-05-12,"Julio Cesar",cgi,webapps,0
|
22588,platforms/cgi/webapps/22588.txt,"Happymall E-Commerce Software 4.3/4.4 Normal_HTML.CGI Cross-Site Scripting Vulnerability",2003-05-12,"Julio Cesar",cgi,webapps,0
|
||||||
22589,platforms/php/webapps/22589.txt,"PHPNuke 5.x/6.x Web_Links Module Remote SQL Injection Vulnerability",2003-05-12,"Albert Puigsech Galicia",php,webapps,0
|
22589,platforms/php/webapps/22589.txt,"PHP-Nuke 5.x/6.x Web_Links Module - Remote SQL Injection Vulnerability",2003-05-12,"Albert Puigsech Galicia",php,webapps,0
|
||||||
22590,platforms/php/webapps/22590.txt,"netOffice Dwins <= 1.4p3 SQL Injection Vulnerability",2012-11-09,dun,php,webapps,0
|
22590,platforms/php/webapps/22590.txt,"netOffice Dwins <= 1.4p3 SQL Injection Vulnerability",2012-11-09,dun,php,webapps,0
|
||||||
22591,platforms/windows/dos/22591.txt,"Microsoft Office Excel 2007 - WriteAV Crash PoC",2012-11-09,coolkaveh,windows,dos,0
|
22591,platforms/windows/dos/22591.txt,"Microsoft Office Excel 2007 - WriteAV Crash PoC",2012-11-09,coolkaveh,windows,dos,0
|
||||||
22592,platforms/cgi/webapps/22592.txt,"Happymall E-Commerce Software 4.3/4.4 Normal_HTML.CGI File Disclosure Vulnerability",2003-05-12,"Julio Cesar",cgi,webapps,0
|
22592,platforms/cgi/webapps/22592.txt,"Happymall E-Commerce Software 4.3/4.4 Normal_HTML.CGI File Disclosure Vulnerability",2003-05-12,"Julio Cesar",cgi,webapps,0
|
||||||
|
@ -20898,7 +20898,7 @@ id,file,description,date,author,platform,type,port
|
||||||
23677,platforms/asp/webapps/23677.txt,"MaxWebPortal 1.3x Personal Message SendTo Parameter XSS",2004-02-10,"Manuel Lopez",asp,webapps,0
|
23677,platforms/asp/webapps/23677.txt,"MaxWebPortal 1.3x Personal Message SendTo Parameter XSS",2004-02-10,"Manuel Lopez",asp,webapps,0
|
||||||
23678,platforms/windows/remote/23678.html,"Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (1)",2004-02-10,"Cheng Peng Su",windows,remote,0
|
23678,platforms/windows/remote/23678.html,"Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (1)",2004-02-10,"Cheng Peng Su",windows,remote,0
|
||||||
23679,platforms/windows/remote/23679.html,"Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (2)",2004-02-10,"Cheng Peng Su",windows,remote,0
|
23679,platforms/windows/remote/23679.html,"Microsoft Internet Explorer 5 Shell: IFrame Cross-Zone Scripting Vulnerability (2)",2004-02-10,"Cheng Peng Su",windows,remote,0
|
||||||
23680,platforms/php/webapps/23680.php,"PHPNuke 6.x Category Parameter SQL Injection Vulnerability",2003-12-23,pokleyzz,php,webapps,0
|
23680,platforms/php/webapps/23680.php,"PHP-Nuke 6.x - Category Parameter SQL Injection Vulnerability",2003-12-23,pokleyzz,php,webapps,0
|
||||||
23681,platforms/windows/dos/23681.pl,"EvolutionX Multiple Remote Buffer Overflow Vulnerabilities",2004-02-10,Moth7,windows,dos,0
|
23681,platforms/windows/dos/23681.pl,"EvolutionX Multiple Remote Buffer Overflow Vulnerabilities",2004-02-10,Moth7,windows,dos,0
|
||||||
23682,platforms/linux/local/23682.c,"XFree86 4.3 Font Information File Buffer Overflow Vulnerability",2004-11-10,bender2@lonestar.org,linux,local,0
|
23682,platforms/linux/local/23682.c,"XFree86 4.3 Font Information File Buffer Overflow Vulnerability",2004-11-10,bender2@lonestar.org,linux,local,0
|
||||||
23683,platforms/php/webapps/23683.txt,"VisualShapers ezContents 1.x/2.0 db.php Arbitrary File Inclusion",2004-02-11,"Cedric Cochin",php,webapps,0
|
23683,platforms/php/webapps/23683.txt,"VisualShapers ezContents 1.x/2.0 db.php Arbitrary File Inclusion",2004-02-11,"Cedric Cochin",php,webapps,0
|
||||||
|
@ -23486,7 +23486,7 @@ id,file,description,date,author,platform,type,port
|
||||||
26349,platforms/php/webapps/26349.txt,"Complete PHP Counter Cross-Site Scripting Vulnerability",2005-10-14,BiPi_HaCk,php,webapps,0
|
26349,platforms/php/webapps/26349.txt,"Complete PHP Counter Cross-Site Scripting Vulnerability",2005-10-14,BiPi_HaCk,php,webapps,0
|
||||||
26350,platforms/php/webapps/26350.txt,"PunBB 1.2.x Search.PHP SQL Injection Vulnerability",2005-10-15,Devil_box,php,webapps,0
|
26350,platforms/php/webapps/26350.txt,"PunBB 1.2.x Search.PHP SQL Injection Vulnerability",2005-10-15,Devil_box,php,webapps,0
|
||||||
26351,platforms/asp/webapps/26351.txt,"Comersus BackOffice Plus Multiple Cross-Site Scripting Vulnerabilities",2005-10-17,Lostmon,asp,webapps,0
|
26351,platforms/asp/webapps/26351.txt,"Comersus BackOffice Plus Multiple Cross-Site Scripting Vulnerabilities",2005-10-17,Lostmon,asp,webapps,0
|
||||||
26352,platforms/php/local/26352.php,"PHP 5.0.5 Safedir Restriction Bypass Vulnerabilities",2005-10-17,anonymous,php,local,0
|
26352,platforms/php/local/26352.php,"PHP 5.0.5 - Safedir Restriction Bypass Vulnerabilities",2005-10-17,anonymous,php,local,0
|
||||||
26353,platforms/linux/local/26353.txt,"Linux Kernel <= 2.6 - Console Keymap Local Command Injection Vulnerability",2005-10-17,"Rudolf Polzer",linux,local,0
|
26353,platforms/linux/local/26353.txt,"Linux Kernel <= 2.6 - Console Keymap Local Command Injection Vulnerability",2005-10-17,"Rudolf Polzer",linux,local,0
|
||||||
26354,platforms/jsp/webapps/26354.txt,"NetFlow Analyzer 4 - Cross-Site Scripting Vulnerability",2005-10-18,why@nsfocus.com,jsp,webapps,0
|
26354,platforms/jsp/webapps/26354.txt,"NetFlow Analyzer 4 - Cross-Site Scripting Vulnerability",2005-10-18,why@nsfocus.com,jsp,webapps,0
|
||||||
26355,platforms/php/webapps/26355.txt,"MySource 2.14 upgrade_in_progress_backend.php target_url Parameter XSS",2005-10-18,"Secunia Research",php,webapps,0
|
26355,platforms/php/webapps/26355.txt,"MySource 2.14 upgrade_in_progress_backend.php target_url Parameter XSS",2005-10-18,"Secunia Research",php,webapps,0
|
||||||
|
@ -23511,7 +23511,7 @@ id,file,description,date,author,platform,type,port
|
||||||
26374,platforms/windows/remote/26374.txt,"Xerver 4.17 Single Dot File Request Source Disclosure",2005-10-19,"Ziv Kamir",windows,remote,0
|
26374,platforms/windows/remote/26374.txt,"Xerver 4.17 Single Dot File Request Source Disclosure",2005-10-19,"Ziv Kamir",windows,remote,0
|
||||||
26375,platforms/windows/remote/26375.txt,"Xerver 4.17 - Forced Directory Listing",2005-10-19,"Ziv Kamir",windows,remote,0
|
26375,platforms/windows/remote/26375.txt,"Xerver 4.17 - Forced Directory Listing",2005-10-19,"Ziv Kamir",windows,remote,0
|
||||||
26376,platforms/windows/remote/26376.txt,"Xerver 4.17 Server URI Null Character XSS",2005-10-19,"Ziv Kamir",windows,remote,0
|
26376,platforms/windows/remote/26376.txt,"Xerver 4.17 Server URI Null Character XSS",2005-10-19,"Ziv Kamir",windows,remote,0
|
||||||
26377,platforms/php/webapps/26377.txt,"PHPNuke Modules.PHP Search Module Remote Directory Traversal Vulnerability",2005-10-19,sp3x@securityreason.com,php,webapps,0
|
26377,platforms/php/webapps/26377.txt,"PHP-Nuke Search Module - Modules.PHP Remote Directory Traversal Vulnerability",2005-10-19,sp3x@securityreason.com,php,webapps,0
|
||||||
26378,platforms/php/webapps/26378.txt,"Chipmunk Forum newtopic.php forumID Parameter XSS",2005-10-20,"Alireza Hassani",php,webapps,0
|
26378,platforms/php/webapps/26378.txt,"Chipmunk Forum newtopic.php forumID Parameter XSS",2005-10-20,"Alireza Hassani",php,webapps,0
|
||||||
26379,platforms/php/webapps/26379.txt,"Chipmunk Forum quote.php forumID Parameter XSS",2005-10-20,"Alireza Hassani",php,webapps,0
|
26379,platforms/php/webapps/26379.txt,"Chipmunk Forum quote.php forumID Parameter XSS",2005-10-20,"Alireza Hassani",php,webapps,0
|
||||||
26380,platforms/php/webapps/26380.txt,"Chipmunk Forum recommend.php ID Parameter XSS",2005-10-20,"Alireza Hassani",php,webapps,0
|
26380,platforms/php/webapps/26380.txt,"Chipmunk Forum recommend.php ID Parameter XSS",2005-10-20,"Alireza Hassani",php,webapps,0
|
||||||
|
@ -23946,7 +23946,7 @@ id,file,description,date,author,platform,type,port
|
||||||
26814,platforms/php/webapps/26814.txt,"DreamLevels Dream Poll 3.0 View_Results.PHP SQL Injection Vulnerability",2005-12-14,r0t3d3Vil,php,webapps,0
|
26814,platforms/php/webapps/26814.txt,"DreamLevels Dream Poll 3.0 View_Results.PHP SQL Injection Vulnerability",2005-12-14,r0t3d3Vil,php,webapps,0
|
||||||
26815,platforms/php/webapps/26815.txt,"CourseForum Technologies ProjectForum 4.7 - Multiple Cross-Site Scripting Vulnerabilities",2005-12-14,r0t3d3Vil,php,webapps,0
|
26815,platforms/php/webapps/26815.txt,"CourseForum Technologies ProjectForum 4.7 - Multiple Cross-Site Scripting Vulnerabilities",2005-12-14,r0t3d3Vil,php,webapps,0
|
||||||
26816,platforms/windows/dos/26816.pl,"AppServ Open Project 2.5.3 - Remote Denial of Service Vulnerability",2005-12-14,Rozor,windows,dos,0
|
26816,platforms/windows/dos/26816.pl,"AppServ Open Project 2.5.3 - Remote Denial of Service Vulnerability",2005-12-14,Rozor,windows,dos,0
|
||||||
26817,platforms/php/webapps/26817.txt,"PHPNuke 7.x Content Filtering Byapss Vulnerability",2005-12-14,"Maksymilian Arciemowicz",php,webapps,0
|
26817,platforms/php/webapps/26817.txt,"PHP-Nuke 7.x - Content Filtering Byapss Vulnerability",2005-12-14,"Maksymilian Arciemowicz",php,webapps,0
|
||||||
26818,platforms/php/webapps/26818.txt,"News Module for Envolution modules.php Multiple Parameter XSS",2005-12-14,X1ngBox,php,webapps,0
|
26818,platforms/php/webapps/26818.txt,"News Module for Envolution modules.php Multiple Parameter XSS",2005-12-14,X1ngBox,php,webapps,0
|
||||||
26819,platforms/php/webapps/26819.txt,"News Module for Envolution modules.php Multiple Parameter SQL Injection",2005-12-14,X1ngBox,php,webapps,0
|
26819,platforms/php/webapps/26819.txt,"News Module for Envolution modules.php Multiple Parameter SQL Injection",2005-12-14,X1ngBox,php,webapps,0
|
||||||
26820,platforms/asp/webapps/26820.txt,"ASP-DEV XM Forum Forum.ASP Cross-Site Scripting Vulnerability",2005-12-14,Dj_Eyes,asp,webapps,0
|
26820,platforms/asp/webapps/26820.txt,"ASP-DEV XM Forum Forum.ASP Cross-Site Scripting Vulnerability",2005-12-14,Dj_Eyes,asp,webapps,0
|
||||||
|
@ -24190,7 +24190,7 @@ id,file,description,date,author,platform,type,port
|
||||||
27055,platforms/windows/dos/27055.txt,"Microsoft Excel 95-2004 Malformed Graphic File Code Execution Vulnerability",2006-01-09,ad@heapoverflow.com,windows,dos,0
|
27055,platforms/windows/dos/27055.txt,"Microsoft Excel 95-2004 Malformed Graphic File Code Execution Vulnerability",2006-01-09,ad@heapoverflow.com,windows,dos,0
|
||||||
27056,platforms/linux/local/27056.pl,"Sudo 1.6.x - Environment Variable Handling Security Bypass Vulnerability (1)",2006-01-09,"Breno Silva Pinto",linux,local,0
|
27056,platforms/linux/local/27056.pl,"Sudo 1.6.x - Environment Variable Handling Security Bypass Vulnerability (1)",2006-01-09,"Breno Silva Pinto",linux,local,0
|
||||||
27057,platforms/linux/local/27057.py,"Sudo 1.6.x Environment Variable Handling Security Bypass Vulnerability (2)",2006-01-09,"Breno Silva Pinto",linux,local,0
|
27057,platforms/linux/local/27057.py,"Sudo 1.6.x Environment Variable Handling Security Bypass Vulnerability (2)",2006-01-09,"Breno Silva Pinto",linux,local,0
|
||||||
27058,platforms/php/webapps/27058.txt,"PHPNuke 7.7 EV Search Module SQL Injection Vulnerability",2006-01-09,Lostmon,php,webapps,0
|
27058,platforms/php/webapps/27058.txt,"PHP-Nuke 7.7 EV Search Module - SQL Injection Vulnerability",2006-01-09,Lostmon,php,webapps,0
|
||||||
27059,platforms/php/webapps/27059.txt,"Xoops Pool Module IMG Tag HTML Injection Vulnerability",2006-01-09,night_warrior771,php,webapps,0
|
27059,platforms/php/webapps/27059.txt,"Xoops Pool Module IMG Tag HTML Injection Vulnerability",2006-01-09,night_warrior771,php,webapps,0
|
||||||
27060,platforms/php/webapps/27060.txt,"PHP-Nuke News Submission Story Text Field XSS",2006-01-09,night_warrior771,php,webapps,0
|
27060,platforms/php/webapps/27060.txt,"PHP-Nuke News Submission Story Text Field XSS",2006-01-09,night_warrior771,php,webapps,0
|
||||||
27061,platforms/cgi/webapps/27061.txt,"Hummingbird Collaboration - Crafted URL File Property Obscuration Download",2006-01-10,"Luca Carettoni",cgi,webapps,0
|
27061,platforms/cgi/webapps/27061.txt,"Hummingbird Collaboration - Crafted URL File Property Obscuration Download",2006-01-10,"Luca Carettoni",cgi,webapps,0
|
||||||
|
@ -24338,7 +24338,7 @@ id,file,description,date,author,platform,type,port
|
||||||
27205,platforms/php/webapps/27205.html,"Virtual Hosting Control System 2.2/2.4 login.php check_login() Function Authentication Bypass",2006-02-13,"Roman Medina-Heigl Hernandez",php,webapps,0
|
27205,platforms/php/webapps/27205.html,"Virtual Hosting Control System 2.2/2.4 login.php check_login() Function Authentication Bypass",2006-02-13,"Roman Medina-Heigl Hernandez",php,webapps,0
|
||||||
27206,platforms/php/webapps/27206.txt,"XMB Forum 1.8/1.9 u2u.php username Parameter XSS",2006-02-13,"James Bercegay",php,webapps,0
|
27206,platforms/php/webapps/27206.txt,"XMB Forum 1.8/1.9 u2u.php username Parameter XSS",2006-02-13,"James Bercegay",php,webapps,0
|
||||||
27207,platforms/php/webapps/27207.txt,"Clever Copy 2.0/3.0 - Multiple HTML Injection Vulnerabilities",2006-02-13,"Aliaksandr Hartsuyeu",php,webapps,0
|
27207,platforms/php/webapps/27207.txt,"Clever Copy 2.0/3.0 - Multiple HTML Injection Vulnerabilities",2006-02-13,"Aliaksandr Hartsuyeu",php,webapps,0
|
||||||
27208,platforms/php/webapps/27208.txt,"PHPNuke 6.x/7.x Header.PHP Pagetitle Parameter Cross-Site Scripting Vulnerability",2006-02-13,"Janek Vind",php,webapps,0
|
27208,platforms/php/webapps/27208.txt,"PHP-Nuke 6.x/7.x - Header.PHP Pagetitle Parameter Cross-Site Scripting Vulnerability",2006-02-13,"Janek Vind",php,webapps,0
|
||||||
27209,platforms/php/webapps/27209.txt,"Gastebuch 1.3.2 - Cross-Site Scripting Vulnerability",2006-02-13,"Micha Borrmann",php,webapps,0
|
27209,platforms/php/webapps/27209.txt,"Gastebuch 1.3.2 - Cross-Site Scripting Vulnerability",2006-02-13,"Micha Borrmann",php,webapps,0
|
||||||
27210,platforms/multiple/dos/27210.txt,"eStara SoftPhone 3.0.1 - SIP SDP Message Handling Format String DoS",2006-02-14,ZwelL,multiple,dos,0
|
27210,platforms/multiple/dos/27210.txt,"eStara SoftPhone 3.0.1 - SIP SDP Message Handling Format String DoS",2006-02-14,ZwelL,multiple,dos,0
|
||||||
27211,platforms/multiple/dos/27211.txt,"eStara SoftPhone 3.0.1 SIP Packet Multiple Malformed Field DoS",2006-02-14,ZwelL,multiple,dos,0
|
27211,platforms/multiple/dos/27211.txt,"eStara SoftPhone 3.0.1 SIP Packet Multiple Malformed Field DoS",2006-02-14,ZwelL,multiple,dos,0
|
||||||
|
@ -24379,7 +24379,7 @@ id,file,description,date,author,platform,type,port
|
||||||
27246,platforms/linux/dos/27246.txt,"Mozilla Thunderbird 1.5 Address Book Import Remote Denial of Service Vulnerability",2006-02-17,DrFrancky,linux,dos,0
|
27246,platforms/linux/dos/27246.txt,"Mozilla Thunderbird 1.5 Address Book Import Remote Denial of Service Vulnerability",2006-02-17,DrFrancky,linux,dos,0
|
||||||
27247,platforms/php/webapps/27247.txt,"E107 Website System 0.7.2 Chatbox Plugin HTML Injection Vulnerability",2006-02-18,"marc & shb",php,webapps,0
|
27247,platforms/php/webapps/27247.txt,"E107 Website System 0.7.2 Chatbox Plugin HTML Injection Vulnerability",2006-02-18,"marc & shb",php,webapps,0
|
||||||
27248,platforms/php/webapps/27248.txt,"Webpagecity WPC easy - SQL Injection Vulnerability",2006-02-18,murfie,php,webapps,0
|
27248,platforms/php/webapps/27248.txt,"Webpagecity WPC easy - SQL Injection Vulnerability",2006-02-18,murfie,php,webapps,0
|
||||||
27249,platforms/php/webapps/27249.html,"PHPNuke 7.x CAPTCHA Bypass Weakness",2006-02-18,waraxe,php,webapps,0
|
27249,platforms/php/webapps/27249.html,"PHP-Nuke 7.x - CAPTCHA Bypass Weakness",2006-02-18,waraxe,php,webapps,0
|
||||||
27250,platforms/php/webapps/27250.txt,"TTS Software Time Tracking Software 3.0 Edituser.PHP Access Validation Vulnerability",2006-02-20,"Aliaksandr Hartsuyeu",php,webapps,0
|
27250,platforms/php/webapps/27250.txt,"TTS Software Time Tracking Software 3.0 Edituser.PHP Access Validation Vulnerability",2006-02-20,"Aliaksandr Hartsuyeu",php,webapps,0
|
||||||
27251,platforms/php/webapps/27251.txt,"Magic Calendar Lite 1.02 Index.PHP SQL Injection Vulnerability",2006-02-20,"Aliaksandr Hartsuyeu",php,webapps,0
|
27251,platforms/php/webapps/27251.txt,"Magic Calendar Lite 1.02 Index.PHP SQL Injection Vulnerability",2006-02-20,"Aliaksandr Hartsuyeu",php,webapps,0
|
||||||
27252,platforms/php/webapps/27252.txt,"CuteNews 1.4.1 Show_News.PHP Cross-Site Scripting Vulnerability",2006-02-20,imei,php,webapps,0
|
27252,platforms/php/webapps/27252.txt,"CuteNews 1.4.1 Show_News.PHP Cross-Site Scripting Vulnerability",2006-02-20,imei,php,webapps,0
|
||||||
|
@ -24439,8 +24439,8 @@ id,file,description,date,author,platform,type,port
|
||||||
27305,platforms/php/webapps/27305.txt,"PHPX 3.5.9 XCode Tag HTML Injection Vulnerability",2006-02-23,"Thomas Pollet",php,webapps,0
|
27305,platforms/php/webapps/27305.txt,"PHPX 3.5.9 XCode Tag HTML Injection Vulnerability",2006-02-23,"Thomas Pollet",php,webapps,0
|
||||||
27306,platforms/php/webapps/27306.txt,"JGS-Gallery 4.0 jgs_galerie_slideshow.php Multiple Parameter XSS",2006-02-23,nuker,php,webapps,0
|
27306,platforms/php/webapps/27306.txt,"JGS-Gallery 4.0 jgs_galerie_slideshow.php Multiple Parameter XSS",2006-02-23,nuker,php,webapps,0
|
||||||
27307,platforms/php/webapps/27307.txt,"JGS-Gallery 4.0 Board jgs_galerie_scroll.php userid Parameter XSS",2006-02-23,nuker,php,webapps,0
|
27307,platforms/php/webapps/27307.txt,"JGS-Gallery 4.0 Board jgs_galerie_scroll.php userid Parameter XSS",2006-02-23,nuker,php,webapps,0
|
||||||
27308,platforms/php/webapps/27308.txt,"myPHPNuke 1.8.8 reviews.php letter Parameter XSS",2006-02-22,"Mustafa Can Bjorn",php,webapps,0
|
27308,platforms/php/webapps/27308.txt,"myPHPNuke 1.8.8 - reviews.php letter Parameter XSS",2006-02-22,"Mustafa Can Bjorn",php,webapps,0
|
||||||
27309,platforms/php/webapps/27309.txt,"myPHPNuke 1.8.8 download.php dcategory Parameter XSS",2006-02-22,"Mustafa Can Bjorn",php,webapps,0
|
27309,platforms/php/webapps/27309.txt,"myPHPNuke 1.8.8 - download.php dcategory Parameter XSS",2006-02-22,"Mustafa Can Bjorn",php,webapps,0
|
||||||
27310,platforms/asp/webapps/27310.txt,"Battleaxe Software BttlxeForum 2.0 Failure.ASP Cross-Site Scripting Vulnerability",2006-02-25,rUnViRuS,asp,webapps,0
|
27310,platforms/asp/webapps/27310.txt,"Battleaxe Software BttlxeForum 2.0 Failure.ASP Cross-Site Scripting Vulnerability",2006-02-25,rUnViRuS,asp,webapps,0
|
||||||
27311,platforms/php/webapps/27311.txt,"SPiD 1.3.1 Scan_Lang_Insert.PHP Local File Include Vulnerability",2006-02-25,"NSA Group",php,webapps,0
|
27311,platforms/php/webapps/27311.txt,"SPiD 1.3.1 Scan_Lang_Insert.PHP Local File Include Vulnerability",2006-02-25,"NSA Group",php,webapps,0
|
||||||
27312,platforms/php/webapps/27312.txt,"FreeHostShop Website Generator 3.3 - Arbitrary File Upload Vulnerability",2006-02-25,"NSA Group",php,webapps,0
|
27312,platforms/php/webapps/27312.txt,"FreeHostShop Website Generator 3.3 - Arbitrary File Upload Vulnerability",2006-02-25,"NSA Group",php,webapps,0
|
||||||
|
@ -25358,7 +25358,7 @@ id,file,description,date,author,platform,type,port
|
||||||
28291,platforms/php/webapps/28291.txt,"MyBulletinBoard 1.x UserCP.PHP Directory Traversal Vulnerability",2006-07-27,"Roozbeh Afrasiabi",php,webapps,0
|
28291,platforms/php/webapps/28291.txt,"MyBulletinBoard 1.x UserCP.PHP Directory Traversal Vulnerability",2006-07-27,"Roozbeh Afrasiabi",php,webapps,0
|
||||||
28292,platforms/php/webapps/28292.txt,"GeoClassifieds Enterprise 2.0.5.x Index.PHP Multiple Cross-Site Scripting Vulnerabilities",2006-07-27,"EllipSiS Security",php,webapps,0
|
28292,platforms/php/webapps/28292.txt,"GeoClassifieds Enterprise 2.0.5.x Index.PHP Multiple Cross-Site Scripting Vulnerabilities",2006-07-27,"EllipSiS Security",php,webapps,0
|
||||||
28293,platforms/multiple/dos/28293.txt,"Oracle 10g Alter Session Integer Overflow Vulnerability",2006-07-27,"putosoft softputo",multiple,dos,0
|
28293,platforms/multiple/dos/28293.txt,"Oracle 10g Alter Session Integer Overflow Vulnerability",2006-07-27,"putosoft softputo",multiple,dos,0
|
||||||
28294,platforms/php/webapps/28294.txt,"PHPNuke INP Modules.PHP Cross-Site Scripting Vulnerability",2006-07-28,l2odon,php,webapps,0
|
28294,platforms/php/webapps/28294.txt,"PHP-Nuke - INP Modules.PHP Cross-Site Scripting Vulnerability",2006-07-28,l2odon,php,webapps,0
|
||||||
28295,platforms/php/webapps/28295.txt,"JD-WordPress 2.0-1.0 RC 2 for Joomla wp-comments-post.php - Remote File Inclusion",2006-07-28,Drago84,php,webapps,0
|
28295,platforms/php/webapps/28295.txt,"JD-WordPress 2.0-1.0 RC 2 for Joomla wp-comments-post.php - Remote File Inclusion",2006-07-28,Drago84,php,webapps,0
|
||||||
28296,platforms/php/webapps/28296.txt,"JD-WordPress 2.0-1.0 RC 2 for Joomla wp-feed.php - Remote File Inclusion",2006-07-28,Drago84,php,webapps,0
|
28296,platforms/php/webapps/28296.txt,"JD-WordPress 2.0-1.0 RC 2 for Joomla wp-feed.php - Remote File Inclusion",2006-07-28,Drago84,php,webapps,0
|
||||||
28297,platforms/php/webapps/28297.txt,"JD-WordPress 2.0-1.0 RC 2 for Joomla wp-trackback.php - Remote File Inclusion",2006-07-28,Drago84,php,webapps,0
|
28297,platforms/php/webapps/28297.txt,"JD-WordPress 2.0-1.0 RC 2 for Joomla wp-trackback.php - Remote File Inclusion",2006-07-28,Drago84,php,webapps,0
|
||||||
|
@ -26265,7 +26265,7 @@ id,file,description,date,author,platform,type,port
|
||||||
29236,platforms/windows/dos/29236.html,"Microsoft Internet Explorer 7.0 CSS Width Element Denial of Service Vulnerability",2006-12-06,xiam.core,windows,dos,0
|
29236,platforms/windows/dos/29236.html,"Microsoft Internet Explorer 7.0 CSS Width Element Denial of Service Vulnerability",2006-12-06,xiam.core,windows,dos,0
|
||||||
29237,platforms/php/webapps/29237.txt,"CPanel 11 BoxTrapper Manage.HTML Cross-Site Scripting Vulnerability",2006-12-08,"Aria-Security Team",php,webapps,0
|
29237,platforms/php/webapps/29237.txt,"CPanel 11 BoxTrapper Manage.HTML Cross-Site Scripting Vulnerability",2006-12-08,"Aria-Security Team",php,webapps,0
|
||||||
29238,platforms/php/webapps/29238.txt,"cPanel Web Hosting Manager 3.1 - Multiple Cross-Site Scripting Vulnerabilities",2006-12-08,"Aria-Security Team",php,webapps,0
|
29238,platforms/php/webapps/29238.txt,"cPanel Web Hosting Manager 3.1 - Multiple Cross-Site Scripting Vulnerabilities",2006-12-08,"Aria-Security Team",php,webapps,0
|
||||||
29239,platforms/php/local/29239.txt,"PHP 5.2 Session.Save_Path() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability",2006-12-08,"Maksymilian Arciemowicz",php,local,0
|
29239,platforms/php/local/29239.txt,"PHP 5.2 - Session.Save_Path() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability",2006-12-08,"Maksymilian Arciemowicz",php,local,0
|
||||||
29240,platforms/asp/webapps/29240.txt,"Cilem Haber Free Edition hata.asp hata Parameter XSS",2006-12-08,ShaFuck31,asp,webapps,0
|
29240,platforms/asp/webapps/29240.txt,"Cilem Haber Free Edition hata.asp hata Parameter XSS",2006-12-08,ShaFuck31,asp,webapps,0
|
||||||
29241,platforms/asp/webapps/29241.txt,"MaviPortal Arama.ASP Cross-Site Scripting Vulnerability",2006-12-09,St@rExT,asp,webapps,0
|
29241,platforms/asp/webapps/29241.txt,"MaviPortal Arama.ASP Cross-Site Scripting Vulnerability",2006-12-09,St@rExT,asp,webapps,0
|
||||||
29242,platforms/php/webapps/29242.txt,"Messageriescripthp 2.0 lire-avis.php aa Parameter SQL Injection",2006-12-09,Mr_KaLiMaN,php,webapps,0
|
29242,platforms/php/webapps/29242.txt,"Messageriescripthp 2.0 lire-avis.php aa Parameter SQL Injection",2006-12-09,Mr_KaLiMaN,php,webapps,0
|
||||||
|
@ -26305,7 +26305,7 @@ id,file,description,date,author,platform,type,port
|
||||||
29287,platforms/windows/dos/29287.txt,"Multiple Vendor Firewall HIPS Process Spoofing Vulnerability",2006-12-15,"Matousec Transparent security",windows,dos,0
|
29287,platforms/windows/dos/29287.txt,"Multiple Vendor Firewall HIPS Process Spoofing Vulnerability",2006-12-15,"Matousec Transparent security",windows,dos,0
|
||||||
29288,platforms/asp/webapps/29288.txt,"Omniture SiteCatalyst Multiple Cross-Site Scripting Vulnerabilities",2006-12-16,"Hackers Center Security",asp,webapps,0
|
29288,platforms/asp/webapps/29288.txt,"Omniture SiteCatalyst Multiple Cross-Site Scripting Vulnerabilities",2006-12-16,"Hackers Center Security",asp,webapps,0
|
||||||
29289,platforms/php/webapps/29289.php,"eXtreme-fusion 4.02 Fusion_Forum_View.PHP Local File Include Vulnerability",2006-12-16,Kacper,php,webapps,0
|
29289,platforms/php/webapps/29289.php,"eXtreme-fusion 4.02 Fusion_Forum_View.PHP Local File Include Vulnerability",2006-12-16,Kacper,php,webapps,0
|
||||||
29290,platforms/linux/remote/29290.c,"Apache / PHP 5.x - cgi-bin Remote Code Execution Exploit",2013-10-29,kingcope,linux,remote,80
|
29290,platforms/linux/remote/29290.c,"Apache + PHP 5.x (< 5.3.12 & < 5.4.2) - cgi-bin Remote Code Execution Exploit",2013-10-29,kingcope,linux,remote,80
|
||||||
29293,platforms/asp/webapps/29293.txt,"Contra Haber Sistemi 1.0 Haber.ASP SQL Injection Vulnerability",2006-12-16,ShaFuck31,asp,webapps,0
|
29293,platforms/asp/webapps/29293.txt,"Contra Haber Sistemi 1.0 Haber.ASP SQL Injection Vulnerability",2006-12-16,ShaFuck31,asp,webapps,0
|
||||||
29294,platforms/php/webapps/29294.html,"Knusperleicht Shoutbox 2.6 Shout.php HTML Injection Vulnerability",2006-12-18,IMHOT3B,php,webapps,0
|
29294,platforms/php/webapps/29294.html,"Knusperleicht Shoutbox 2.6 Shout.php HTML Injection Vulnerability",2006-12-18,IMHOT3B,php,webapps,0
|
||||||
29295,platforms/windows/dos/29295.html,"Microsoft Outlook ActiveX Control Remote Internet Explorer Denial of Service Vulnerability",2006-12-18,shinnai,windows,dos,0
|
29295,platforms/windows/dos/29295.html,"Microsoft Outlook ActiveX Control Remote Internet Explorer Denial of Service Vulnerability",2006-12-18,shinnai,windows,dos,0
|
||||||
|
@ -26329,7 +26329,7 @@ id,file,description,date,author,platform,type,port
|
||||||
29312,platforms/hardware/webapps/29312.txt,"Unicorn Router WB-3300NR CSRF (Factory Reset/DNS Change)",2013-10-30,absane,hardware,webapps,0
|
29312,platforms/hardware/webapps/29312.txt,"Unicorn Router WB-3300NR CSRF (Factory Reset/DNS Change)",2013-10-30,absane,hardware,webapps,0
|
||||||
29313,platforms/php/webapps/29313.txt,"Xt-News 0.1 show_news.php id_news Parameter XSS",2006-12-22,Mr_KaLiMaN,php,webapps,0
|
29313,platforms/php/webapps/29313.txt,"Xt-News 0.1 show_news.php id_news Parameter XSS",2006-12-22,Mr_KaLiMaN,php,webapps,0
|
||||||
29314,platforms/php/webapps/29314.txt,"Xt-News 0.1 show_news.php id_news Parameter SQL Injection",2006-12-22,Mr_KaLiMaN,php,webapps,0
|
29314,platforms/php/webapps/29314.txt,"Xt-News 0.1 show_news.php id_news Parameter SQL Injection",2006-12-22,Mr_KaLiMaN,php,webapps,0
|
||||||
29316,platforms/php/remote/29316.py,"Apache + PHP 5.x - Remote Code Execution (Multithreaded Scanner) (2)",2013-10-31,noptrix,php,remote,0
|
29316,platforms/php/remote/29316.py,"Apache + PHP 5.x (< 5.3.12 / < 5.4.2) - Remote Code Execution (Multithreaded Scanner)",2013-10-31,noptrix,php,remote,0
|
||||||
29994,platforms/php/webapps/29994.txt,"Campsite 2.6.1 Template.php g_documentRoot Parameter Remote File Inclusion",2007-05-08,anonymous,php,webapps,0
|
29994,platforms/php/webapps/29994.txt,"Campsite 2.6.1 Template.php g_documentRoot Parameter Remote File Inclusion",2007-05-08,anonymous,php,webapps,0
|
||||||
29995,platforms/php/webapps/29995.txt,"Campsite 2.6.1 TimeUnit.php g_documentRoot Parameter Remote File Inclusion",2007-05-08,anonymous,php,webapps,0
|
29995,platforms/php/webapps/29995.txt,"Campsite 2.6.1 TimeUnit.php g_documentRoot Parameter Remote File Inclusion",2007-05-08,anonymous,php,webapps,0
|
||||||
29318,platforms/php/webapps/29318.txt,"ImpressPages CMS 3.6 - Multiple XSS/SQLi Vulnerabilities",2013-10-31,LiquidWorm,php,webapps,0
|
29318,platforms/php/webapps/29318.txt,"ImpressPages CMS 3.6 - Multiple XSS/SQLi Vulnerabilities",2013-10-31,LiquidWorm,php,webapps,0
|
||||||
|
@ -26573,7 +26573,7 @@ id,file,description,date,author,platform,type,port
|
||||||
29525,platforms/php/webapps/29525.txt,"Wordpress Highlight Premium Theme - CSRF File Upload Vulnerability",2013-11-10,DevilScreaM,php,webapps,0
|
29525,platforms/php/webapps/29525.txt,"Wordpress Highlight Premium Theme - CSRF File Upload Vulnerability",2013-11-10,DevilScreaM,php,webapps,0
|
||||||
29547,platforms/windows/local/29547.rb,"VideoSpirit Pro 1.90 - (SEH) Buffer Overflow",2013-11-12,metacom,windows,local,0
|
29547,platforms/windows/local/29547.rb,"VideoSpirit Pro 1.90 - (SEH) Buffer Overflow",2013-11-12,metacom,windows,local,0
|
||||||
29527,platforms/linux/remote/29527.pl,"Xine 0.99.4 M3U Remote Format String Vulnerability",2007-01-03,"Kevin Finisterre",linux,remote,0
|
29527,platforms/linux/remote/29527.pl,"Xine 0.99.4 M3U Remote Format String Vulnerability",2007-01-03,"Kevin Finisterre",linux,remote,0
|
||||||
29528,platforms/php/local/29528.txt,"PHP 5.2 FOpen Safe_Mode Restriction-Bypass Vulnerability",2007-01-26,"Maksymilian Arciemowicz",php,local,0
|
29528,platforms/php/local/29528.txt,"PHP 5.2 - FOpen Safe_Mode Restriction-Bypass Vulnerability",2007-01-26,"Maksymilian Arciemowicz",php,local,0
|
||||||
29529,platforms/php/webapps/29529.txt,"PHP Membership Manager 1.5 Admin.PHP Cross-Site Scripting Vulnerability",2007-01-26,Doz,php,webapps,0
|
29529,platforms/php/webapps/29529.txt,"PHP Membership Manager 1.5 Admin.PHP Cross-Site Scripting Vulnerability",2007-01-26,Doz,php,webapps,0
|
||||||
29530,platforms/php/webapps/29530.txt,"FD Script 1.3.x FName Parameter Information Disclosure Vulnerability",2007-01-26,ajann,php,webapps,0
|
29530,platforms/php/webapps/29530.txt,"FD Script 1.3.x FName Parameter Information Disclosure Vulnerability",2007-01-26,ajann,php,webapps,0
|
||||||
29531,platforms/windows/dos/29531.txt,"Yahoo! Messenger <= 8.0 Notification Message HTML Injection Vulnerability",2007-01-26,"Hai Nam Luke",windows,dos,0
|
29531,platforms/windows/dos/29531.txt,"Yahoo! Messenger <= 8.0 Notification Message HTML Injection Vulnerability",2007-01-26,"Hai Nam Luke",windows,dos,0
|
||||||
|
@ -26781,7 +26781,7 @@ id,file,description,date,author,platform,type,port
|
||||||
29729,platforms/php/webapps/29729.txt,"Premod SubDog 2 includes/logger_engine.php phpbb_root_path Parameter Remote File Inclusion",2007-03-10,"Hasadya Raed",php,webapps,0
|
29729,platforms/php/webapps/29729.txt,"Premod SubDog 2 includes/logger_engine.php phpbb_root_path Parameter Remote File Inclusion",2007-03-10,"Hasadya Raed",php,webapps,0
|
||||||
29730,platforms/php/webapps/29730.txt,"SoftNews 4.1/5.5 engine/init.php root_dir Parameter Remote File Inclusion",2007-03-10,"Hasadya Raed",php,webapps,0
|
29730,platforms/php/webapps/29730.txt,"SoftNews 4.1/5.5 engine/init.php root_dir Parameter Remote File Inclusion",2007-03-10,"Hasadya Raed",php,webapps,0
|
||||||
29731,platforms/php/webapps/29731.txt,"SoftNews 4.1/5.5 engine/Ajax/editnews.php root_dir Parameter Remote File Inclusion",2007-03-10,"Hasadya Raed",php,webapps,0
|
29731,platforms/php/webapps/29731.txt,"SoftNews 4.1/5.5 engine/Ajax/editnews.php root_dir Parameter Remote File Inclusion",2007-03-10,"Hasadya Raed",php,webapps,0
|
||||||
29732,platforms/php/remote/29732.php,"PHP 5.2 EXT/Filter Function Remote Buffer Overflow Vulnerability",2007-03-12,"Stefan Esser",php,remote,0
|
29732,platforms/php/remote/29732.php,"PHP 5.2 - EXT/Filter Function Remote Buffer Overflow Vulnerability",2007-03-12,"Stefan Esser",php,remote,0
|
||||||
29733,platforms/php/webapps/29733.txt,"PHP-Nuke 8.2.4 - Multiple Vulnerabilities",2013-11-20,"Sojobo dev team",php,webapps,80
|
29733,platforms/php/webapps/29733.txt,"PHP-Nuke 8.2.4 - Multiple Vulnerabilities",2013-11-20,"Sojobo dev team",php,webapps,80
|
||||||
29734,platforms/linux/remote/29734.txt,"PineApp MailSecure - Remote Command Execution",2013-11-20,"Ruben Garrote García",linux,remote,7443
|
29734,platforms/linux/remote/29734.txt,"PineApp MailSecure - Remote Command Execution",2013-11-20,"Ruben Garrote García",linux,remote,7443
|
||||||
29735,platforms/hardware/remote/29735.rb,"D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow Vulnerability",2007-03-12,LSO,hardware,remote,0
|
29735,platforms/hardware/remote/29735.rb,"D-Link TFTP 1.0 - Transporting Mode Remote Buffer Overflow Vulnerability",2007-03-12,LSO,hardware,remote,0
|
||||||
|
@ -30420,7 +30420,7 @@ id,file,description,date,author,platform,type,port
|
||||||
33752,platforms/linux/remote/33752.html,"WebKit 1.2.x Right-to-Left Displayed Text Handling Memory Corruption Vulnerability",2010-03-11,wushi,linux,remote,0
|
33752,platforms/linux/remote/33752.html,"WebKit 1.2.x Right-to-Left Displayed Text Handling Memory Corruption Vulnerability",2010-03-11,wushi,linux,remote,0
|
||||||
33753,platforms/php/webapps/33753.txt,"Easynet4u Forum Host 'topic.php' SQL Injection Vulnerability",2010-03-12,Pr0T3cT10n,php,webapps,0
|
33753,platforms/php/webapps/33753.txt,"Easynet4u Forum Host 'topic.php' SQL Injection Vulnerability",2010-03-12,Pr0T3cT10n,php,webapps,0
|
||||||
33754,platforms/php/webapps/33754.txt,"pMyAdmin 3.3.5.1 - 'db_create.php' Cross-Site Scripting Vulnerability",2010-03-12,Liscker,php,webapps,0
|
33754,platforms/php/webapps/33754.txt,"pMyAdmin 3.3.5.1 - 'db_create.php' Cross-Site Scripting Vulnerability",2010-03-12,Liscker,php,webapps,0
|
||||||
33755,platforms/php/dos/33755.php,"PHP <= 5.3.2 xmlrpc Extension Multiple Remote Denial of Service Vulnerabilities",2010-03-12,"Auke van Slooten",php,dos,0
|
33755,platforms/php/dos/33755.php,"PHP <= 5.3.2 xmlrpc Extension - Multiple Remote Denial of Service Vulnerabilities",2010-03-12,"Auke van Slooten",php,dos,0
|
||||||
33756,platforms/php/webapps/33756.txt,"Joomla! 'com_seek' Component - 'id' Parameter SQL Injection Vulnerability",2010-03-13,"DevilZ TM",php,webapps,0
|
33756,platforms/php/webapps/33756.txt,"Joomla! 'com_seek' Component - 'id' Parameter SQL Injection Vulnerability",2010-03-13,"DevilZ TM",php,webapps,0
|
||||||
33757,platforms/php/webapps/33757.txt,"Joomla! 'com_d-greinar' Component - 'maintree' Parameter Cross-Site Scripting Vulnerability",2010-03-13,"DevilZ TM",php,webapps,0
|
33757,platforms/php/webapps/33757.txt,"Joomla! 'com_d-greinar' Component - 'maintree' Parameter Cross-Site Scripting Vulnerability",2010-03-13,"DevilZ TM",php,webapps,0
|
||||||
33758,platforms/asp/webapps/33758.txt,"Zigurrat Farsi CMS 'manager/textbox.asp' SQL Injection Vulnerability",2010-03-15,Isfahan,asp,webapps,0
|
33758,platforms/asp/webapps/33758.txt,"Zigurrat Farsi CMS 'manager/textbox.asp' SQL Injection Vulnerability",2010-03-15,Isfahan,asp,webapps,0
|
||||||
|
@ -30592,7 +30592,7 @@ id,file,description,date,author,platform,type,port
|
||||||
33925,platforms/php/webapps/33925.txt,"ecoCMS 18.4.2010 - 'admin.php' Cross-Site Scripting Vulnerability",2010-05-18,"High-Tech Bridge SA",php,webapps,0
|
33925,platforms/php/webapps/33925.txt,"ecoCMS 18.4.2010 - 'admin.php' Cross-Site Scripting Vulnerability",2010-05-18,"High-Tech Bridge SA",php,webapps,0
|
||||||
33926,platforms/windows/dos/33926.py,"ddrLPD 1.0 - Remote Denial of Service Vulnerability",2010-04-29,"Bisphemol A",windows,dos,0
|
33926,platforms/windows/dos/33926.py,"ddrLPD 1.0 - Remote Denial of Service Vulnerability",2010-04-29,"Bisphemol A",windows,dos,0
|
||||||
33927,platforms/php/webapps/33927.txt,"eZoneScripts Apartment Search Script 'listtest.php' SQL Injection Vulnerability",2010-02-09,JIKO,php,webapps,0
|
33927,platforms/php/webapps/33927.txt,"eZoneScripts Apartment Search Script 'listtest.php' SQL Injection Vulnerability",2010-02-09,JIKO,php,webapps,0
|
||||||
33988,platforms/php/remote/33988.txt,"PHP 5.x - 'ext/phar/stream.c' and 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities",2010-05-14,"Stefan Esser",php,remote,0
|
33988,platforms/php/remote/33988.txt,"PHP 5.x (5.3.x <= 5.3.2) - 'ext/phar/stream.c' and 'ext/phar/dirstream.c' Multiple Format String Vulnerabilities",2010-05-14,"Stefan Esser",php,remote,0
|
||||||
33989,platforms/windows/remote/33989.rb,"Oracle Event Processing FileUploadServlet Arbitrary File Upload",2014-07-07,metasploit,windows,remote,9002
|
33989,platforms/windows/remote/33989.rb,"Oracle Event Processing FileUploadServlet Arbitrary File Upload",2014-07-07,metasploit,windows,remote,9002
|
||||||
33929,platforms/multiple/remote/33929.py,"Gitlist <= 0.4.0 - Remote Code Execution",2014-06-30,drone,multiple,remote,0
|
33929,platforms/multiple/remote/33929.py,"Gitlist <= 0.4.0 - Remote Code Execution",2014-06-30,drone,multiple,remote,0
|
||||||
33953,platforms/php/webapps/33953.txt,"Zurmo CRM - Persistent XSS Vulnerability",2014-07-02,Provensec,php,webapps,80
|
33953,platforms/php/webapps/33953.txt,"Zurmo CRM - Persistent XSS Vulnerability",2014-07-02,Provensec,php,webapps,80
|
||||||
|
@ -31676,7 +31676,7 @@ id,file,description,date,author,platform,type,port
|
||||||
35143,platforms/php/webapps/35143.txt,"HotWeb Scripts HotWeb Rentals 'PageId' Parameter SQL Injection Vulnerability",2010-12-28,"non customers",php,webapps,0
|
35143,platforms/php/webapps/35143.txt,"HotWeb Scripts HotWeb Rentals 'PageId' Parameter SQL Injection Vulnerability",2010-12-28,"non customers",php,webapps,0
|
||||||
35144,platforms/multiple/remote/35144.txt,"Appweb Web Server 3.2.2-1 - Cross-Site Scripting Vulnerability",2010-12-23,"Gjoko Krstic",multiple,remote,0
|
35144,platforms/multiple/remote/35144.txt,"Appweb Web Server 3.2.2-1 - Cross-Site Scripting Vulnerability",2010-12-23,"Gjoko Krstic",multiple,remote,0
|
||||||
35145,platforms/php/webapps/35145.txt,"Pligg CMS 1.1.3 - 'range' Parameter SQL Injection Vulnerability",2010-12-27,Dr.NeT,php,webapps,0
|
35145,platforms/php/webapps/35145.txt,"Pligg CMS 1.1.3 - 'range' Parameter SQL Injection Vulnerability",2010-12-27,Dr.NeT,php,webapps,0
|
||||||
35146,platforms/php/webapps/35146.txt,"PHP 5.x Shellshock Exploit (bypass disable_functions)",2014-11-03,"Ryan King (Starfall)",php,webapps,0
|
35146,platforms/php/webapps/35146.txt,"PHP 5.x (< 5.6.2) - Shellshock Exploit (Bypass disable_functions)",2014-11-03,"Ryan King (Starfall)",php,webapps,0
|
||||||
35148,platforms/linux/remote/35148.txt,"IBM Tivoli Access Manager 6.1.1 for e-business Directory Traversal Vulnerability",2010-12-24,anonymous,linux,remote,0
|
35148,platforms/linux/remote/35148.txt,"IBM Tivoli Access Manager 6.1.1 for e-business Directory Traversal Vulnerability",2010-12-24,anonymous,linux,remote,0
|
||||||
35149,platforms/php/webapps/35149.txt,"LiveZilla 3.2.0.2 - 'Track' Module 'server.php' Cross-Site Scripting Vulnerability",2010-12-27,"Ulisses Castro",php,webapps,0
|
35149,platforms/php/webapps/35149.txt,"LiveZilla 3.2.0.2 - 'Track' Module 'server.php' Cross-Site Scripting Vulnerability",2010-12-27,"Ulisses Castro",php,webapps,0
|
||||||
35150,platforms/php/webapps/35150.php,"Drupal < 7.32 Pre Auth SQL Injection",2014-11-03,"Stefan Horst",php,webapps,443
|
35150,platforms/php/webapps/35150.php,"Drupal < 7.32 Pre Auth SQL Injection",2014-11-03,"Stefan Horst",php,webapps,443
|
||||||
|
@ -31863,7 +31863,7 @@ id,file,description,date,author,platform,type,port
|
||||||
35354,platforms/php/dos/35354.txt,"PHP 5.3.5 - 'grapheme_extract()' NULL Pointer Dereference Denial Of Service Vulnerability",2011-02-17,"Maksymilian Arciemowicz",php,dos,0
|
35354,platforms/php/dos/35354.txt,"PHP 5.3.5 - 'grapheme_extract()' NULL Pointer Dereference Denial Of Service Vulnerability",2011-02-17,"Maksymilian Arciemowicz",php,dos,0
|
||||||
35356,platforms/linux/remote/35356.rb,"Hikvision DVR RTSP Request Remote Code Execution",2014-11-24,metasploit,linux,remote,554
|
35356,platforms/linux/remote/35356.rb,"Hikvision DVR RTSP Request Remote Code Execution",2014-11-24,metasploit,linux,remote,554
|
||||||
35357,platforms/cgi/webapps/35357.txt,"Advantech EKI-6340 Command Injection",2014-11-24,"Core Security",cgi,webapps,80
|
35357,platforms/cgi/webapps/35357.txt,"Advantech EKI-6340 Command Injection",2014-11-24,"Core Security",cgi,webapps,80
|
||||||
35358,platforms/php/dos/35358.txt,"PHP 5.5.12 Locale::parseLocale Memory Corruption",2014-11-24,"John Leitch",php,dos,0
|
35358,platforms/php/dos/35358.txt,"PHP 5.5.12 - Locale::parseLocale Memory Corruption",2014-11-24,"John Leitch",php,dos,0
|
||||||
35359,platforms/multiple/dos/35359.txt,"tcpdump 4.6.2 Geonet Decoder Denial of Service",2014-11-24,"Steffen Bauch",multiple,dos,0
|
35359,platforms/multiple/dos/35359.txt,"tcpdump 4.6.2 Geonet Decoder Denial of Service",2014-11-24,"Steffen Bauch",multiple,dos,0
|
||||||
35360,platforms/php/webapps/35360.txt,"WSN Guest 1.24 - 'wsnuser' Cookie Parameter SQL Injection Vulnerability",2011-02-18,"Aliaksandr Hartsuyeu",php,webapps,0
|
35360,platforms/php/webapps/35360.txt,"WSN Guest 1.24 - 'wsnuser' Cookie Parameter SQL Injection Vulnerability",2011-02-18,"Aliaksandr Hartsuyeu",php,webapps,0
|
||||||
35361,platforms/php/webapps/35361.txt,"Escort Directory CMS SQL Injection Vulnerability",2011-02-19,NoNameMT,php,webapps,0
|
35361,platforms/php/webapps/35361.txt,"Escort Directory CMS SQL Injection Vulnerability",2011-02-19,NoNameMT,php,webapps,0
|
||||||
|
@ -31981,9 +31981,9 @@ id,file,description,date,author,platform,type,port
|
||||||
35482,platforms/php/webapps/35482.txt,"PluggedOut Blog 1.9.9 - 'year' Parameter Cross-Site Scripting Vulnerability",2011-03-21,"kurdish hackers team",php,webapps,0
|
35482,platforms/php/webapps/35482.txt,"PluggedOut Blog 1.9.9 - 'year' Parameter Cross-Site Scripting Vulnerability",2011-03-21,"kurdish hackers team",php,webapps,0
|
||||||
35483,platforms/php/dos/35483.txt,"PHP 5.3.x - 'Intl' Extension 'NumberFormatter::setSymbol()' Function Denial of Service Vulnerability",2011-03-10,thoger,php,dos,0
|
35483,platforms/php/dos/35483.txt,"PHP 5.3.x - 'Intl' Extension 'NumberFormatter::setSymbol()' Function Denial of Service Vulnerability",2011-03-10,thoger,php,dos,0
|
||||||
35484,platforms/php/dos/35484.php,"PHP 5.3.x - 'Zip' Extension 'stream_get_contents()' Function Denial of Service Vulnerability",2011-03-10,paulgao,php,dos,0
|
35484,platforms/php/dos/35484.php,"PHP 5.3.x - 'Zip' Extension 'stream_get_contents()' Function Denial of Service Vulnerability",2011-03-10,paulgao,php,dos,0
|
||||||
35485,platforms/php/dos/35485.php,"PHP 5.x - 'Zip' Extension 'zip_fread()' Function Denial of Service Vulnerability",2011-03-10,TorokAlpar,php,dos,0
|
35485,platforms/php/dos/35485.php,"PHP 5.x (< 5.3.6) 'Zip' Extension - 'zip_fread()' Function Denial of Service Vulnerability",2011-03-10,TorokAlpar,php,dos,0
|
||||||
35486,platforms/php/dos/35486.php,"PHP 5.x OpenSSL Extension openssl_encrypt Function Plaintext Data Memory Leak DoS",2011-03-08,dovbysh,php,dos,0
|
35486,platforms/php/dos/35486.php,"PHP 5.x (< 5.3.6) OpenSSL Extension - openssl_encrypt Function Plaintext Data Memory Leak DoS",2011-03-08,dovbysh,php,dos,0
|
||||||
35487,platforms/php/dos/35487.php,"PHP 5.x OpenSSL Extension x Function openssl_decrypt Ciphertext Data Memory Leak DoS",2011-03-08,dovbysh,php,dos,0
|
35487,platforms/php/dos/35487.php,"PHP 5.x (< 5.3.6) OpenSSL Extension - openssl_decrypt Function Ciphertext Data Memory Leak DoS",2011-03-08,dovbysh,php,dos,0
|
||||||
35488,platforms/osx/local/35488.c,"Apple Mac OS X 10.6.x HFS Subsystem Information Disclosure Vulnerability",2011-03-21,"Dan Rosenberg",osx,local,0
|
35488,platforms/osx/local/35488.c,"Apple Mac OS X 10.6.x HFS Subsystem Information Disclosure Vulnerability",2011-03-21,"Dan Rosenberg",osx,local,0
|
||||||
35489,platforms/multiple/dos/35489.pl,"Perl 5.x - 'Perl_reg_numbered_buff_fetch()' Function Remote Denial of Service Vulnerability",2011-03-23,"Vladimir Perepelitsa",multiple,dos,0
|
35489,platforms/multiple/dos/35489.pl,"Perl 5.x - 'Perl_reg_numbered_buff_fetch()' Function Remote Denial of Service Vulnerability",2011-03-23,"Vladimir Perepelitsa",multiple,dos,0
|
||||||
35490,platforms/php/webapps/35490.txt,"IceHrm 7.1 - Multiple Vulnerabilities",2014-12-08,LiquidWorm,php,webapps,0
|
35490,platforms/php/webapps/35490.txt,"IceHrm 7.1 - Multiple Vulnerabilities",2014-12-08,LiquidWorm,php,webapps,0
|
||||||
|
@ -32321,9 +32321,9 @@ id,file,description,date,author,platform,type,port
|
||||||
35850,platforms/windows/local/35850.bat,"Microsoft Windows XP - 'tskill' Local Privilege Escalation Vulnerability",2011-06-13,"Todor Donev",windows,local,0
|
35850,platforms/windows/local/35850.bat,"Microsoft Windows XP - 'tskill' Local Privilege Escalation Vulnerability",2011-06-13,"Todor Donev",windows,local,0
|
||||||
35851,platforms/php/webapps/35851.txt,"WebFileExplorer 3.6 'user' and 'pass' SQL Injection Vulnerabilities",2011-06-13,pentesters.ir,php,webapps,0
|
35851,platforms/php/webapps/35851.txt,"WebFileExplorer 3.6 'user' and 'pass' SQL Injection Vulnerabilities",2011-06-13,pentesters.ir,php,webapps,0
|
||||||
35852,platforms/asp/webapps/35852.txt,"Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection Vulnerability",2011-06-13,"Mark Lachniet",asp,webapps,0
|
35852,platforms/asp/webapps/35852.txt,"Microsoft Lync Server 2010 - 'ReachJoin.aspx' Remote Command Injection Vulnerability",2011-06-13,"Mark Lachniet",asp,webapps,0
|
||||||
35853,platforms/php/webapps/35853.php,"Phpnuke 8.3 'upload.php' Arbitrary File Upload Vulnerability (1)",2011-06-13,pentesters.ir,php,webapps,0
|
35853,platforms/php/webapps/35853.php,"PHP-Nuke 8.3 - 'upload.php' Arbitrary File Upload Vulnerability (1)",2011-06-13,pentesters.ir,php,webapps,0
|
||||||
35854,platforms/php/webapps/35854.pl,"Phpnuke 8.3 'upload.php' Arbitrary File Upload Vulnerability (2)",2011-06-13,pentesters.ir,php,webapps,0
|
35854,platforms/php/webapps/35854.pl,"PHP-Nuke 8.3 - 'upload.php' Arbitrary File Upload Vulnerability (2)",2011-06-13,pentesters.ir,php,webapps,0
|
||||||
35855,platforms/php/remote/35855.txt,"PHP <= 5.3.6 Security Bypass Vulnerability",2011-06-14,"Krzysztof Kotowicz",php,remote,0
|
35855,platforms/php/remote/35855.txt,"PHP <= 5.3.6 - Security Bypass Vulnerability",2011-06-14,"Krzysztof Kotowicz",php,remote,0
|
||||||
35856,platforms/multiple/dos/35856.html,"Opera Web Browser 11.11 Denial of Service Vulnerability",2011-06-14,echo,multiple,dos,0
|
35856,platforms/multiple/dos/35856.html,"Opera Web Browser 11.11 Denial of Service Vulnerability",2011-06-14,echo,multiple,dos,0
|
||||||
35857,platforms/php/webapps/35857.txt,"ArticleFR CMS 3.0.5 - SQL Injection Vulnerability",2015-01-21,TranDinhTien,php,webapps,0
|
35857,platforms/php/webapps/35857.txt,"ArticleFR CMS 3.0.5 - SQL Injection Vulnerability",2015-01-21,TranDinhTien,php,webapps,0
|
||||||
35858,platforms/php/webapps/35858.txt,"ArticleFR CMS 3.0.5 - Arbitrary File Upload",2015-01-21,TranDinhTien,php,webapps,0
|
35858,platforms/php/webapps/35858.txt,"ArticleFR CMS 3.0.5 - Arbitrary File Upload",2015-01-21,TranDinhTien,php,webapps,0
|
||||||
|
@ -33601,7 +33601,7 @@ id,file,description,date,author,platform,type,port
|
||||||
37214,platforms/hardware/webapps/37214.txt,"Broadlight Residential Gateway DI3124 - Unauthenticated Remote DNS Change",2015-06-06,"Todor Donev",hardware,webapps,0
|
37214,platforms/hardware/webapps/37214.txt,"Broadlight Residential Gateway DI3124 - Unauthenticated Remote DNS Change",2015-06-06,"Todor Donev",hardware,webapps,0
|
||||||
37252,platforms/php/webapps/37252.txt,"Wordpress RobotCPA Plugin V5 - Local File Inclusion",2015-06-10,T3N38R15,php,webapps,80
|
37252,platforms/php/webapps/37252.txt,"Wordpress RobotCPA Plugin V5 - Local File Inclusion",2015-06-10,T3N38R15,php,webapps,80
|
||||||
37216,platforms/php/webapps/37216.txt,"Unijimpe Captcha 'captchademo.php' Cross Site Scripting Vulnerability",2012-05-16,"Daniel Godoy",php,webapps,0
|
37216,platforms/php/webapps/37216.txt,"Unijimpe Captcha 'captchademo.php' Cross Site Scripting Vulnerability",2012-05-16,"Daniel Godoy",php,webapps,0
|
||||||
37217,platforms/php/webapps/37217.txt,"Artiphp 5.5.0 Neo 'index.php' Multiple Cross Site Scripting Vulnerabilities",2012-05-17,"Gjoko Krstic",php,webapps,0
|
37217,platforms/php/webapps/37217.txt,"Artiphp 5.5.0 Neo - 'index.php' Multiple Cross Site Scripting Vulnerabilities",2012-05-17,"Gjoko Krstic",php,webapps,0
|
||||||
37218,platforms/jsp/dos/37218.txt,"Atlassian Tempo 6.4.3_ JIRA 5.0 0_ Gliffy 3.7.0 - XML Parsing Denial of Service Vulnerability",2012-05-17,anonymous,jsp,dos,0
|
37218,platforms/jsp/dos/37218.txt,"Atlassian Tempo 6.4.3_ JIRA 5.0 0_ Gliffy 3.7.0 - XML Parsing Denial of Service Vulnerability",2012-05-17,anonymous,jsp,dos,0
|
||||||
37219,platforms/php/webapps/37219.txt,"PHP Address Book 7.0 Multiple Cross Site Scripting Vulnerabilities",2012-05-17,"Stefan Schurtz",php,webapps,0
|
37219,platforms/php/webapps/37219.txt,"PHP Address Book 7.0 Multiple Cross Site Scripting Vulnerabilities",2012-05-17,"Stefan Schurtz",php,webapps,0
|
||||||
37220,platforms/jsp/webapps/37220.txt,"OpenKM 5.1.7 Cross Site Request Forgery Vulnerability",2012-05-03,"Cyrill Brunschwiler",jsp,webapps,0
|
37220,platforms/jsp/webapps/37220.txt,"OpenKM 5.1.7 Cross Site Request Forgery Vulnerability",2012-05-03,"Cyrill Brunschwiler",jsp,webapps,0
|
||||||
|
@ -35764,7 +35764,7 @@ id,file,description,date,author,platform,type,port
|
||||||
39522,platforms/hardware/remote/39522.txt,"Schneider Electric SBO / AS - Multiple Vulnerabilities",2016-03-03,"Karn Ganeshen",hardware,remote,0
|
39522,platforms/hardware/remote/39522.txt,"Schneider Electric SBO / AS - Multiple Vulnerabilities",2016-03-03,"Karn Ganeshen",hardware,remote,0
|
||||||
39523,platforms/windows/local/39523.rb,"AppLocker Execution Prevention Bypass",2016-03-03,metasploit,windows,local,0
|
39523,platforms/windows/local/39523.rb,"AppLocker Execution Prevention Bypass",2016-03-03,metasploit,windows,local,0
|
||||||
39524,platforms/php/webapps/39524.js,"ATutor LMS install_modules.php CSRF Remote Code Execution Vulnerability",2016-03-07,mr_me,php,webapps,0
|
39524,platforms/php/webapps/39524.js,"ATutor LMS install_modules.php CSRF Remote Code Execution Vulnerability",2016-03-07,mr_me,php,webapps,0
|
||||||
39525,platforms/win64/local/39525.py,"Microsoft Windows - AFD.SYS Privilege Escalation (MS14-040) Win7x64",2016-03-07,"Rick Larabee",win64,local,0
|
39525,platforms/win64/local/39525.py,"Microsoft Windows 7 x64 - AFD.SYS Privilege Escalation (MS14-040)",2016-03-07,"Rick Larabee",win64,local,0
|
||||||
39526,platforms/php/webapps/39526.sh,"Cerberus Helpdesk (Cerb5) 5 - 6.7 - Password Hash Disclosure",2016-03-07,asdizzle_,php,webapps,80
|
39526,platforms/php/webapps/39526.sh,"Cerberus Helpdesk (Cerb5) 5 - 6.7 - Password Hash Disclosure",2016-03-07,asdizzle_,php,webapps,80
|
||||||
39529,platforms/multiple/dos/39529.txt,"Wireshark - wtap_optionblock_free Use-After-Free",2016-03-07,"Google Security Research",multiple,dos,0
|
39529,platforms/multiple/dos/39529.txt,"Wireshark - wtap_optionblock_free Use-After-Free",2016-03-07,"Google Security Research",multiple,dos,0
|
||||||
39530,platforms/windows/dos/39530.txt,"Avast - Authenticode Parsing Memory Corruption",2016-03-07,"Google Security Research",windows,dos,0
|
39530,platforms/windows/dos/39530.txt,"Avast - Authenticode Parsing Memory Corruption",2016-03-07,"Google Security Research",windows,dos,0
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -1,4 +1,3 @@
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Android sensord 0day root exploit by s0m3b0dy
|
* Android sensord 0day root exploit by s0m3b0dy
|
||||||
* tested on LG L7 (PL)
|
* tested on LG L7 (PL)
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
|
|
||||||
Vulnerability title: Multiple Instances Of Cross-site Scripting In Viprinet Multichannel VPN Router 300
|
Vulnerability title: Multiple Instances Of Cross-site Scripting In Viprinet Multichannel VPN Router 300
|
||||||
|
|
||||||
CVE: CVE-2014-2045
|
CVE: CVE-2014-2045
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
|
|
||||||
/* == virtfshell ==
|
/* == virtfshell ==
|
||||||
*
|
*
|
||||||
* Some distributions make virtfs-proxy-helper from QEMU either SUID or
|
* Some distributions make virtfs-proxy-helper from QEMU either SUID or
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
|
||||||
Exploit Title - AVG Internet Security 2015 Arbitrary Write Privilege Escalation
|
Exploit Title - AVG Internet Security 2015 Arbitrary Write Privilege Escalation
|
||||||
|
|
Loading…
Add table
Reference in a new issue