DB: 2017-12-04
This commit is contained in:
parent
bb8b231f69
commit
a595878586
1 changed files with 3 additions and 3 deletions
|
@ -15580,8 +15580,8 @@ id,file,description,date,author,type,platform,port
|
|||
38849,exploits/cgi/remote/38849.rb,"Advantech Switch - Bash Environment Variable Command Injection (Shellshock) (Metasploit)",2015-12-02,Metasploit,remote,cgi,
|
||||
38850,exploits/hardware/remote/38850.txt,"Thomson Reuters Velocity Analytics - Remote Code Injection",2013-11-22,"Eduardo Gonzalez",remote,hardware,
|
||||
38851,exploits/hardware/remote/38851.html,"LevelOne WBR-3406TX Router - Cross-Site Request Forgery",2013-11-15,"Yakir Wizman",remote,hardware,
|
||||
38859,exploits/windows/remote/38859.rb,"Oracle BeeHive 2 - voice-servlet processEvaluation() (Metasploit)",2015-12-03,Metasploit,remote,windows,7777
|
||||
38860,exploits/windows/remote/38860.rb,"Oracle BeeHive 2 - voice-servlet prepareAudioToPlay() Arbitrary File Upload (Metasploit)",2015-12-03,Metasploit,remote,windows,7777
|
||||
38859,exploits/windows/remote/38859.rb,"Oracle BeeHive 2 - 'voice-servlet processEvaluation()' Write File (Metasploit)",2015-12-03,Metasploit,remote,windows,7777
|
||||
38860,exploits/windows/remote/38860.rb,"Oracle BeeHive 2 - 'voice-servlet prepareAudioToPlay()' Arbitrary File Upload (Metasploit)",2015-12-03,Metasploit,remote,windows,7777
|
||||
38900,exploits/php/remote/38900.rb,"phpFileManager 0.9.8 - Remote Code Execution (Metasploit)",2015-12-08,Metasploit,remote,php,80
|
||||
38905,exploits/multiple/remote/38905.rb,"Atlassian HipChat for Jira Plugin - Velocity Template Injection (Metasploit)",2015-12-08,Metasploit,remote,multiple,8080
|
||||
38910,exploits/windows/remote/38910.txt,"Hancom Office - '.hml' File Processing Heap Buffer Overflow",2013-12-19,diroverflow,remote,windows,
|
||||
|
@ -34309,7 +34309,7 @@ id,file,description,date,author,type,platform,port
|
|||
35442,exploits/hardware/webapps/35442.txt,"EntryPass N5200 - Credentials Exposure",2014-12-02,"RedTeam Pentesting",webapps,hardware,
|
||||
35443,exploits/php/webapps/35443.txt,"TYPO3 Extension ke DomPDF - Remote Code Execution",2014-12-02,"RedTeam Pentesting",webapps,php,80
|
||||
35444,exploits/php/webapps/35444.txt,"Lms Web Ensino - Multiple Input Validation Vulnerabilities",2011-03-04,waKKu,webapps,php,
|
||||
35447,exploits/php/webapps/35447.txt,"WordPress Plugin Google Document Embedder 2.5.16 - mysql_real_escpae_string Bypass SQL Injection",2014-12-03,"Securely (Yoo Hee man)",webapps,php,
|
||||
35447,exploits/php/webapps/35447.txt,"WordPress Plugin Google Document Embedder 2.5.16 - 'mysql_real_escpae_string' Bypass SQL Injection",2014-12-03,"Securely (Yoo Hee man)",webapps,php,
|
||||
35451,exploits/php/webapps/35451.txt,"BoutikOne - 'categorie.php?path' SQL Injection",2011-03-14,cdx.security,webapps,php,
|
||||
35452,exploits/php/webapps/35452.txt,"BoutikOne - 'list.php?path' SQL Injection",2011-03-14,cdx.security,webapps,php,
|
||||
35453,exploits/php/webapps/35453.txt,"BoutikOne - 'search.php' Multiple SQL Injections",2011-03-14,cdx.security,webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue