DB: 2017-11-10
This commit is contained in:
parent
a699605cfa
commit
bf64c19b52
1 changed files with 10 additions and 10 deletions
20
files.csv
20
files.csv
|
@ -223,7 +223,7 @@ id,file,description,date,author,platform,type,port
|
|||
1204,platforms/multiple/dos/1204.html,"Mozilla Products - 'Host:' Buffer Overflow Denial of Service String",2005-09-09,"Tom Ferris",multiple,dos,0
|
||||
1212,platforms/windows/dos/1212.pl,"COOL! Remote Control 1.12 - Remote Denial of Service",2005-09-11,basher13,windows,dos,0
|
||||
1213,platforms/multiple/dos/1213.c,"Snort 2.4.0 - SACK TCP Option Error Handling Denial of Service",2005-09-12,nitr0us,multiple,dos,0
|
||||
1218,platforms/windows/dos/1218.c,"Stoney FTPd - 'rxBot mods ftpd' Denial of Service",2005-09-16,D-oNe,windows,dos,0
|
||||
1218,platforms/windows/dos/1218.c,"Stoney FTPd - 'rxBot mods ftpd' Denial of Service",2005-09-16,D-oNe,windows,dos,0
|
||||
1220,platforms/windows/dos/1220.pl,"Fastream NETFile Web Server 7.1.2 - 'HEAD' Denial of Service",2005-09-16,karak0rsan,windows,dos,0
|
||||
1222,platforms/windows/dos/1222.pl,"MCCS (Multi-Computer Control Systems) Command - Denial of Service",2005-09-19,basher13,windows,dos,0
|
||||
1233,platforms/multiple/dos/1233.html,"Mozilla Firefox 1.0.7 - Integer Overflow Denial of Service",2005-09-26,"Georgi Guninski",multiple,dos,0
|
||||
|
@ -5994,7 +5994,7 @@ id,file,description,date,author,platform,type,port
|
|||
1267,platforms/linux/local/1267.c,"XMail 1.21 - '-t' Command Line Option Buffer Overflow Privilege Escalation",2005-10-20,qaaz,linux,local,0
|
||||
1297,platforms/linux/local/1297.py,"F-Secure Internet GateKeeper for Linux < 2.15.484 / Gateway < 2.16 - Privilege Escalation",2005-11-07,"Xavier de Leon",linux,local,0
|
||||
1299,platforms/linux/local/1299.sh,"Linux chfn (SuSE 9.3/10) - Privilege Escalation",2005-11-08,Hunger,linux,local,0
|
||||
1300,platforms/linux/local/1300.sh,"Operator Shell (osh) 1.7-14 - Privilege Escalation",2005-11-09,"Charles Stevenson",linux,local,0
|
||||
1300,platforms/linux/local/1300.sh,"Operator Shell (OSH) 1.7-14 - Privilege Escalation",2005-11-09,"Charles Stevenson",linux,local,0
|
||||
1310,platforms/linux/local/1310.txt,"Sudo 1.6.8p9 - SHELLOPTS/PS4 Environment Variables Privilege Escalation",2005-11-09,"Breno Silva Pinto",linux,local,0
|
||||
1311,platforms/bsd/local/1311.c,"FreeBSD 4.x / < 5.4 - 'master.passwd' Disclosure",2005-11-09,kingcope,bsd,local,0
|
||||
1316,platforms/linux/local/1316.pl,"Veritas Storage Foundation 4.0 - VCSI18N_LANG Local Overflow",2005-11-12,"Kevin Finisterre",linux,local,0
|
||||
|
@ -6635,7 +6635,7 @@ id,file,description,date,author,platform,type,port
|
|||
9985,platforms/multiple/local/9985.txt,"Xpdf 3.01 - heap Overflow / Null Pointer Dereference",2009-10-17,"Adam Zabrocki",multiple,local,0
|
||||
14273,platforms/linux/local/14273.sh,"Linux PAM 1.1.0 (Ubuntu 9.10/10.04) - MOTD File Tampering Privilege Escalation (1)",2010-07-08,"Kristian Erik Hermansen",linux,local,0
|
||||
9988,platforms/windows/local/9988.txt,"Adobe Photoshop Elements - Active File Monitor Service Privilege Escalation",2009-10-29,bellick,windows,local,0
|
||||
9990,platforms/multiple/local/9990.txt,"Adobe Reader and Acrobat - '.U3D' File Invalid Array Index Remote",2009-11-09,"Felipe Andres Manzano",multiple,local,0
|
||||
9990,platforms/multiple/local/9990.txt,"Adobe Reader / Acrobat - '.U3D' File Invalid Array Index Remote",2009-11-09,"Felipe Andres Manzano",multiple,local,0
|
||||
9991,platforms/windows/local/9991.txt,"Alleycode 2.21 - Overflow (SEH) (PoC)",2009-10-05,"Rafael Sousa",windows,local,0
|
||||
10009,platforms/windows/local/10009.txt,"Free Download Manager - Torrent File Parsing Multiple Remote Buffer Overflow Vulnerabilities (Metasploit)",2009-11-11,"Carsten Eiram",windows,local,0
|
||||
10010,platforms/windows/local/10010.txt,"Free WMA MP3 Converter 1.1 - '.wav' Local Buffer Overflow",2009-10-09,KriPpLer,windows,local,0
|
||||
|
@ -9681,7 +9681,7 @@ id,file,description,date,author,platform,type,port
|
|||
1178,platforms/windows/remote/1178.c,"Microsoft IIS 5.0 - '500-100.asp' Server Name Spoof Exploit",2005-08-25,Lympex,windows,remote,0
|
||||
1179,platforms/windows/remote/1179.c,"Microsoft Windows Plug-and-Play Service - Remote Universal Exploit (Spanish) (MS05-039)",2005-08-25,RoMaNSoFt,windows,remote,445
|
||||
1180,platforms/windows/remote/1180.c,"Microsoft Windows Plug-and-Play Service (French) - Remote Universal Exploit (MS05-039)",2005-08-25,"Fabrice Mourron",windows,remote,445
|
||||
1183,platforms/windows/remote/1183.c,"Battlefield (BFCC < 1.22_A /BFVCC < 2.14_B / BF2CC) - Authentication Bypass / Password Stealer / Denial of Service",2005-08-29,"Luigi Auriemma",windows,remote,0
|
||||
1183,platforms/windows/remote/1183.c,"Battlefield (BFCC < 1.22_A /BFVCC < 2.14_B / BF2CC) - Authentication Bypass / Password Stealer / Denial of Service",2005-08-29,"Luigi Auriemma",windows,remote,0
|
||||
1184,platforms/windows/remote/1184.c,"Savant Web Server 3.1 - Remote Buffer Overflow (2)",2005-08-30,basher13,windows,remote,80
|
||||
1188,platforms/multiple/remote/1188.c,"HP OpenView Network Node Manager 7.50 - Remote Exploit",2005-08-30,Lympex,multiple,remote,0
|
||||
1190,platforms/windows/remote/1190.c,"DameWare Mini Remote Control 4.0 < 4.9 - Client Agent Remote Exploit",2005-08-31,jpno5,windows,remote,6129
|
||||
|
@ -11722,7 +11722,7 @@ id,file,description,date,author,platform,type,port
|
|||
18089,platforms/windows/remote/18089.rb,"KnFTP 1.0 - Buffer Overflow (DEP Bypass) (Metasploit)",2011-11-07,pasta,windows,remote,0
|
||||
18092,platforms/windows/remote/18092.html,"Oracle Hyperion Strategic Finance 12.x - Tidestone Formula One WorkBook OLE Control TTF16.ocx Remote Heap Overflow",2011-11-07,rgod,windows,remote,0
|
||||
18093,platforms/windows/remote/18093.txt,"Oracle - xdb.xdb_pitrig_pkg.PITRIG_DROPMETADATA procedure Exploit",2011-11-07,"David Maman",windows,remote,0
|
||||
18102,platforms/windows/remote/18102.rb,"AbsoluteFTP 1.9.6 < 2.2.10 - Remote Buffer Overflow (LIST) (Metasploit)",2011-11-09,Node,windows,remote,0
|
||||
18102,platforms/windows/remote/18102.rb,"AbsoluteFTP 1.9.6 < 2.2.10 - 'LIST' Remote Buffer Overflow (Metasploit)",2011-11-09,Node,windows,remote,0
|
||||
18123,platforms/windows/remote/18123.rb,"Viscom Image Viewer CP Pro 8.0/Gold 6.0 - ActiveX Control (Metasploit)",2011-11-17,Metasploit,windows,remote,0
|
||||
18125,platforms/windows/remote/18125.rb,"Wireshark - console.lua pre-loading (Metasploit)",2011-11-19,Metasploit,windows,remote,0
|
||||
18134,platforms/windows/remote/18134.rb,"Viscom Software Movie Player Pro SDK ActiveX 6.8 - Exploit (Metasploit)",2011-11-20,Metasploit,windows,remote,0
|
||||
|
@ -12982,7 +12982,7 @@ id,file,description,date,author,platform,type,port
|
|||
22058,platforms/linux/remote/22058.c,"Pserv 2.0 - User-Agent HTTP Header Buffer Overflow (2)",2002-11-30,jsk,linux,remote,0
|
||||
22063,platforms/linux/remote/22063.c,"Zeroo HTTP Server 1.5 - Directory Traversal (1)",2002-11-22,mikecc,linux,remote,0
|
||||
22064,platforms/linux/remote/22064.pl,"Zeroo HTTP Server 1.5 - Directory Traversal (2)",2002-11-22,mattmurphy,linux,remote,0
|
||||
22078,platforms/windows/remote/22078.txt,"Mollensoft software Enceladus server suite 2.6.1/3.9 - Directory Traversal",2002-11-09,luca.ercoli@inwind.it,windows,remote,0
|
||||
22078,platforms/windows/remote/22078.txt,"Mollensoft Software Enceladus Server Suite 2.6.1/3.9 - Directory Traversal",2002-11-09,luca.ercoli@inwind.it,windows,remote,0
|
||||
22082,platforms/windows/remote/22082.pl,"Trend Micro PC-cillin 2000/2002/2003 - Mail Scanner Buffer Overflow",2002-12-10,"Joel Soderberg",windows,remote,0
|
||||
22084,platforms/unix/remote/22084.c,"MySQL 3.23.x/4.0.x - 'COM_CHANGE_USER' Password Length Account",2002-12-16,Andi,unix,remote,0
|
||||
22085,platforms/unix/remote/22085.txt,"MySQL 3.23.x/4.0.x - COM_CHANGE_USER Password Memory Corruption",2002-12-12,"Stefan Esser",unix,remote,0
|
||||
|
@ -22233,7 +22233,7 @@ id,file,description,date,author,platform,type,port
|
|||
9387,platforms/php/webapps/9387.txt,"Banner Exchange Script 1.0 - 'targetid' Blind SQL Injection",2009-08-07,"599eme Man",php,webapps,0
|
||||
9389,platforms/php/webapps/9389.txt,"Logoshows BBS 2.0 - 'forumid' SQL Injection",2009-08-07,Ruzgarin_Oglu,php,webapps,0
|
||||
9390,platforms/php/webapps/9390.txt,"Typing Pal 1.0 - 'idTableProduit' SQL Injection",2009-08-07,Red-D3v1L,php,webapps,0
|
||||
9394,platforms/php/webapps/9394.pl,"Arab Portal 2.2 - Blind Cookie Authentication Bypass",2009-08-07,"Jafer Al Zidjali",php,webapps,0
|
||||
9394,platforms/php/webapps/9394.pl,"Arab Portal 2.2 - Blind Cookie Authentication Bypass",2009-08-07,"Jafer Al Zidjali",php,webapps,0
|
||||
9395,platforms/php/webapps/9395.txt,"PHPCityPortal - Authentication Bypass",2009-08-07,CoBRa_21,php,webapps,0
|
||||
9396,platforms/php/webapps/9396.txt,"Facil Helpdesk - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting",2009-08-07,Moudi,php,webapps,0
|
||||
9397,platforms/php/webapps/9397.txt,"IsolSoft Support Center 2.5 - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting",2009-08-07,Moudi,php,webapps,0
|
||||
|
@ -24257,7 +24257,7 @@ id,file,description,date,author,platform,type,port
|
|||
13931,platforms/php/webapps/13931.txt,"KubeLance 1.7.6 - 'profile.php' SQL Injection",2010-06-18,"L0rd CrusAd3r",php,webapps,0
|
||||
13933,platforms/php/webapps/13933.txt,"UK One Media CMS - 'id' Error-Based SQL Injection",2010-06-19,LiquidWorm,php,webapps,0
|
||||
13935,platforms/php/webapps/13935.txt,"Joomla! Component RSComments 1.0.0 - Persistent Cross-Site Scripting",2010-06-19,jdc,php,webapps,0
|
||||
13936,platforms/php/webapps/13936.txt,"Elite Gaming Ladders 3.5 - 'ladder[id]' SQL Injection",2010-06-19,ahwak2000,php,webapps,0
|
||||
13936,platforms/php/webapps/13936.txt,"Elite Gaming Ladders 3.5 - 'ladder[id]' SQL Injection",2010-06-19,ahwak2000,php,webapps,0
|
||||
13937,platforms/php/webapps/13937.txt,"SnowCade 3.0 - SQL Injection",2010-06-19,ahwak2000,php,webapps,0
|
||||
13938,platforms/php/webapps/13938.html,"WebsiteBaker 2.8.1 - Cross-Site Request Forgery (PoC)",2010-06-19,"Luis Santana",php,webapps,0
|
||||
14848,platforms/php/webapps/14848.txt,"Web-Ideas Web Shop Standard - SQL Injection",2010-08-31,Ariko-Security,php,webapps,0
|
||||
|
@ -32392,7 +32392,7 @@ id,file,description,date,author,platform,type,port
|
|||
32245,platforms/php/webapps/32245.txt,"Nortel Networks SRG V16 - 'modules.php?module' Cross-Site Scripting",2008-08-13,CraCkEr,php,webapps,0
|
||||
32246,platforms/php/webapps/32246.txt,"Nortel Networks SRG V16 - 'admin_modules.php?module' Traversal Local File Inclusion",2008-08-13,CraCkEr,php,webapps,0
|
||||
32247,platforms/php/webapps/32247.txt,"Nortel Networks SRG V16 - 'modules.php?module' Traversal Local File Inclusion",2008-08-13,CraCkEr,php,webapps,0
|
||||
31221,platforms/windows/webapps/31221.txt,"Ability Mail Server 2013 - Persistent Cross-Site Scripting / Cross-Site Request Forgery (Password Reset)",2014-01-27,"David Um",windows,webapps,0
|
||||
31221,platforms/windows/webapps/31221.txt,"Ability Mail Server 2013 -Persistent Cross-Site Scripting / Cross-Site Request Forgery (Password Reset)",2014-01-27,"David Um",windows,webapps,0
|
||||
31224,platforms/php/webapps/31224.txt,"Joomla! / Mambo Component com_profile - 'oid' SQL Injection",2008-02-19,S@BUN,php,webapps,0
|
||||
31225,platforms/php/webapps/31225.html,"RunCMS 1.6.1 - 'admin.php' Cross-Site Scripting",2008-02-18,NBBN,php,webapps,0
|
||||
31226,platforms/php/webapps/31226.txt,"Joomla! / Mambo Component com_detail - 'id' SQL Injection",2008-02-18,S@BUN,php,webapps,0
|
||||
|
@ -36512,7 +36512,7 @@ id,file,description,date,author,platform,type,port
|
|||
38011,platforms/php/webapps/38011.txt,"OrangeHRM - 'sortField' SQL Injection",2012-11-07,"High-Tech Bridge",php,webapps,0
|
||||
38012,platforms/php/webapps/38012.txt,"WordPress Plugin FLV Player - 'id' SQL Injection",2012-11-07,"Ashiyane Digital Security Team",php,webapps,0
|
||||
38015,platforms/php/webapps/38015.txt,"AR Web Content Manager (AWCM) - 'cookie_gen.php' Arbitrary Cookie Generation",2012-11-08,"Sooel Son",php,webapps,0
|
||||
38016,platforms/multiple/webapps/38016.txt,"ESRI ArcGIS for Server - 'where' Form SQL Injection",2012-11-09,anonymous,multiple,webapps,0
|
||||
38016,platforms/multiple/webapps/38016.txt,"ESRI ArcGIS for Server - 'where' SQL Injection",2012-11-09,anonymous,multiple,webapps,0
|
||||
38017,platforms/php/webapps/38017.txt,"WordPress Theme Kakao - 'ID' SQL Injection",2012-11-09,sil3nt,php,webapps,0
|
||||
38018,platforms/php/webapps/38018.txt,"WordPress Plugin PHP Event Calendar - 'cid' SQL Injection",2012-11-09,"Ashiyane Digital Security Team",php,webapps,0
|
||||
38019,platforms/php/webapps/38019.txt,"WordPress Plugin Eco-annu - 'eid' SQL Injection",2012-11-09,"Ashiyane Digital Security Team",php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue