2 commits
Author | SHA1 | Message | Date | |
---|---|---|---|---|
![]() |
d304cc3d3e |
DB: 2017-11-24
116602 new exploits Too many to list! |
||
![]() |
dfa43e82f0 |
DB: 2017-11-17
137 new exploits Apache 2.x - Memory Leak Exploit Apache 2.x - Memory Leak Cisco IOS - using hping Remote Denial of Service Microsoft Windows - ASN.1 'LSASS.exe' Remote Exploit (MS04-007) Microsoft Windows - ASN.1 'LSASS.exe' Remote Denial of Service (MS04-007) Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call Exploit HP-UX 11.00/10.20 crontab - Overwrite Files Exploit Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call HP-UX 11.00/10.20 crontab - Overwrite Files Solaris 2.7/2.8 Catman - Local Insecure tmp Symlink Exploit SunOS 5.7 Catman - Local Insecure tmp Symlink Clobber Exploit RedHat 6.1/6.2 - TTY Flood Users Exploit Solaris 2.7/2.8 Catman - Local Insecure tmp Symlink SunOS 5.7 Catman - Local Insecure tmp Symlink Clobber RedHat 6.1/6.2 - TTY Flood Users Solaris 2.6 / 7 / 8 - Lock Users Out of mailx Exploit ProFTPd 1.2.0 rc2 - Memory Leakage Exploit Solaris 2.6 / 7 / 8 - Lock Users Out of mailx ProFTPd 1.2.0 rc2 - Memory Leakage Cisco (Multiple Products) - Automated Exploit Tool Cisco (Multiple Products) - Automated Tool TCP Connection Reset - Remote Denial of Service Microsoft Internet Explorer - Overly Trusted Location Cache Exploit Microsoft Internet Explorer - Overly Trusted Location Cache Microsoft Windows - JPEG Processing Buffer Overrun Exploit (MS04-028) Microsoft Windows - JPEG Processing Buffer Overrun (MS04-028) Quake 3 Engine - Infostring Crash and Shutdown Exploit Quake 3 Engine - Infostring Crash and Shutdown Microsoft Windows - 'SMB' Transaction Response Handling Exploit (MS05-011) Microsoft Windows - 'SMB' Transaction Response Handling (MS05-011) MultiTheftAuto 0.5 patch 1 - Server Crash / MOTD Deletion Exploit MultiTheftAuto 0.5 patch 1 - Server Crash / MOTD Deletion netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation Exploit netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation VMware 5.5.1 - COM Object Arbitrary Partition Table Delete Exploit VMware 5.5.1 - COM Object Arbitrary Partition Table Delete KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception Exploit KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception eIQnetworks Network Security Analyzer - Null Pointer Dereference Exploit eIQnetworks Network Security Analyzer - Null Pointer Dereference Microsoft Internet Explorer 6 - 'mshtml.dll' Null Pointer Dereference Exploit Microsoft Internet Explorer 6 - 'mshtml.dll' Null Pointer Dereference PHP 5.2.6 - 'sleep()' Local Memory Exhaust Exploit PHP 5.2.6 - 'sleep()' Local Memory Exhaust Ruby 1.9 - regex engine Remote Socket Memory Leak Exploit Ruby 1.9 - regex engine Remote Socket Memory Leak Ultra Office - ActiveX Control Arbitrary File Corruption Exploit Ultra Office - ActiveX Control Arbitrary File Corruption Flock Social Web Browser 1.2.5 - 'loop' Remote Denial of Service Microsoft Windows - GDI+ '.ICO' Remote Division By Zero Exploit Microsoft Windows - GDI+ '.ICO' Remote Division By Zero Microsoft Windows Vista - Access Violation from Limited Account Exploit (Blue Screen of Death) Microsoft Windows Vista - Access Violation from Limited Account (Blue Screen of Death) Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One Exploit Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One Mozilla Firefox - unclamped loop Denial of Service Zortam MP3 Player 1.50 - '.m3u' Integer Division by Zero Exploit Zortam MP3 Player 1.50 - '.m3u' Integer Division by Zero Firebird SQL - op_connect_request main listener shutdown Exploit Firebird SQL - op_connect_request main listener shutdown Kaspersky 2010 - Remote Memory Corruption / Denial of Service (PoC) VirtualDJ Trial 6.0.6 'New Year Edition' - '.m3u' Exploit Sagem Routers - Remote Reset Exploit Sagem Routers - Remote Reset TopDownloads MP3 Player 1.0 - '.m3u' Crash Exploit TopDownloads MP3 Player 1.0 - '.m3u' Crash Optimal Archive 1.38 - '.zip' File Exploit (SEH) (PoC) Optimal Archive 1.38 - '.zip' File (SEH) (PoC) Aircrack-NG Tools svn r1675 - Remote Exploit Aircrack-NG Tools svn r1675 - Remote Heap-Based Buffer Overflow Apple Mac OSX 10.6 - HFS FileSystem Exploit (Denial of Service) Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service) Motorola SB5101 Hax0rware Rajko HTTPd - Remote Exploit (PoC) Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC) FreeBSD - 'mountnfs()' Exploit FreeBSD - 'mountnfs()' Denial of Service AoAAudioExtractor 2.0.0.0 - ActiveX (PoC) (SEH) Microsoft Internet Explorer - MSHTML Findtext Processing Exploit Microsoft Internet Explorer - MSHTML Findtext Processing RedHat Linux - Stickiness of /tmp Exploit RedHat Linux - Stickiness of /tmp Microsoft Plug and Play Service - Overflow Exploit (MS05-039) (Metasploit) Microsoft Plug and Play Service - Overflow (MS05-039) (Metasploit) Linux 2.6.37-rc1 - serial_core TIOCGICOUNT Leak Exploit Linux 2.6.37-rc1 - serial_core TIOCGICOUNT Leak ZipWiz 2005 5.0 - '.zip' Buffer Corruption Exploit ZipWiz 2005 5.0 - '.zip' Buffer Corruption Simple HTTPd 1.42 - Denial of Servive Exploit Simple HTTPd 1.42 - Denial of Servive PeerBlock 1.1 - Blue Screen of Death Exploit PeerBlock 1.1 - Blue Screen of Death Spotify 0.8.2.610 - search func Memory Exhaustion Exploit Spotify 0.8.2.610 - search func Memory Exhaustion Microsoft Windows - 'afd.sys' Local Kernel Exploit (PoC) (MS11-046) Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Exploit SunOS 4.1.1 - '/usr/release/bin/makeinstall' Exploit SunOS 4.1.1 - '/usr/release/bin/winstall' Exploit SunOS 4.1.3 - kmem setgid /etc/crash Exploit SunOS 4.1.3 - kmem setgid /etc/crash Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA Exploit Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA Linux Kernel 2.0/2.1/2.2 - autofs Exploit Linux Kernel 2.0/2.1/2.2 - 'autofs' Apache 1.1 / NCSA httpd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi Exploit Apache 1.1 / NCSA httpd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi Netscape Enterprise Server 3.6 SP2/FastTrack Server 2.0.1 - GET Exploit Netscape Enterprise Server 3.6 SP2/FastTrack Server 2.0.1 - GET D-Link DIR605L - Denial of Service D-Link DIR-605L < 2.08 - Denial of Service Microsoft Edge Chakra: JIT - 'Lowerer::LowerBoundCheck' Incorrect Integer Overflow Check Microsoft Windows 3.11/95/NT 4.0/NT 3.5.1 - 'Out Of Band' Data Denial of Service (4) Microsoft Internet Explorer 5/6 - Self-Referential Object Denial of Service Kerio MailServer 5.6.3 subscribe Module - Overflow Exploit Kerio MailServer 5.6.3 subscribe Module - Overflow Kerio MailServer 5.6.3 list Module - Overflow Exploit Kerio MailServer 5.6.3 do_map Module - Overflow Exploit Kerio MailServer 5.6.3 list Module - Overflow Kerio MailServer 5.6.3 do_map Module - Overflow Microsoft Edge - 'Object.setPrototypeOf' Memory Corruption Red-M Red-Alert 3.1 - Remote Exploit Red-M Red-Alert 3.1 - Remote Denial of Service Microsoft Windows Server 2000 - Multiple COM Object Instantiation Code Execution Vulnerabilities Microsoft Internet Explorer 6 - Multiple COM Object Color Property Denial of Service Vulnerabilities Microsoft Windows Server 2000 - Multiple COM Object Instantiation Code Execution Vulnerabilities Microsoft Internet Explorer 6 - Multiple COM Object Color Property Denial of Service Vulnerabilities Gold MP4 Player 3.3 - Universal Exploit (SEH) (Metasploit) Gold MP4 Player 3.3 - Universal (SEH) (Metasploit) WS10 Data Server - SCADA Exploit Overflow (PoC) WS10 Data Server - SCADA Overflow (PoC) Kaspersky AntiVirus - DEX File Format Memory Corruption Kaspersky AntiVirus - '.DEX' File Format Memory Corruption Avast! - JetDb::IsExploited4x Performs Unbounded Search on Input Avast! - JetDb::Ised4x Performs Unbounded Search on Input pdfium IsFlagSet (v8 memory management) - SIGSEGV Exploit pdfium IsFlagSet (v8 memory management) - SIGSEGV Apple OS X/iOS - 'mach_ports_register' Multiple Memory Safety Exploits Apple OS X/iOS - 'mach_ports_register' Multiple Memory Safety s Microsoft Edge Chakra JIT - Type Confusion with switch Statements Microsoft Edge Chakra: JIT - 'OP_Memset' Type Confusion Mandrake Linux 8.2 - '/usr/mail' Local Exploit ICQ Pro 2003a - 'ca1-icq.asm' Password Bypass Exploit XGalaga 2.0.34 (RedHat 9.0) - Local Game Exploit xtokkaetama 1.0b (RedHat 9.0) - Local Game Exploit man-db 2.4.1 - 'open_cat_stream()' Local uid=man Exploit DameWare Mini Remote Control Server - System Exploit Mandrake Linux 8.2 - '/usr/mail' Local Overflow ICQ Pro 2003a - 'ca1-icq.asm' Password Bypass XGalaga 2.0.34 (RedHat 9.0) - Local Game xtokkaetama 1.0b (RedHat 9.0) - Local Game man-db 2.4.1 - 'open_cat_stream()' Local uid=man DameWare Mini Remote Control Server - System IBM DB2 - Universal Database 7.2 'db2licm' Local Exploit IBM DB2 - Universal Database 7.2 'db2licm' Local OpenBSD - 'ibcs2_exec' Kernel Local Exploit OpenBSD - 'ibcs2_exec' Kernel Local Microsoft Windows - ListBox/ComboBox Control Local Exploit (MS03-045) Microsoft Windows - ListBox/ComboBox Control Local (MS03-045) XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game Exploit XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game SuSE Linux 9.0 - YaST Configuration Skribt Local Exploit SuSE Linux 9.0 - YaST Configuration Skribt Local RedHat 6.2 Restore and Dump - Local Exploit (Perl) RedHat 6.2 Restore and Dump - Privilege Escalation (Perl) BSDi 3.0/4.0 - rcvtty[mh] Local Exploit BSDi 3.0/4.0 - rcvtty[mh] Local Solaris locale - Format Strings 'noexec stack' Exploit GLIBC locale - bug mount Exploit dislocate 1.3 - Local i386 Exploit UUCP Exploit - File Creation/Overwriting Symlinks Exploit Solaris locale - Format Strings 'noexec stack' GLIBC locale - bug mount dislocate 1.3 - Local i386 UUCP - File Creation/Overwriting Symlinks GLIBC locale - Format Strings Exploit GLIBC locale - Format Strings RedHat 6.1 man - 'egid 15' Local Exploit RedHat 6.1 man - 'egid 15' Local splitvt < 1.6.5 - Local Exploit splitvt < 1.6.5 - Local IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local Exploit IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Exploit Microsoft Windows Utility Manager - Local SYSTEM Exploit (MS04-011) IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Microsoft Windows Utility Manager - Local SYSTEM (MS04-011) Slackware 7.1 - '/usr/bin/mail' Local Exploit Slackware 7.1 - '/usr/bin/mail' Local GLIBC 2.1.3 - LD_PRELOAD Local Exploit GLIBC 2.1.3 - LD_PRELOAD Local Resolv+ (RESOLV_HOST_CONF) - Linux Library Local Exploit Resolv+ (RESOLV_HOST_CONF) - Linux Library Local Solaris 2.5.1 lp / lpsched - Symlink Exploit LibXt - 'XtAppInitialize()' Overflow *xterm Exploit Solaris 2.5.0/2.5.1 ps / chkey - Data Buffer Exploit Solaris 2.5.1 lp / lpsched - Symlink LibXt - 'XtAppInitialize()' Overflow *xterm Solaris 2.5.0/2.5.1 ps / chkey - Data Buffer Microsoft Windows Server 2000 - Universal Language Utility Manager Exploit (MS04-019) Microsoft Windows Task Scheduler (Windows XP/2000) - '.job' Exploit (MS04-022) Microsoft Windows Server 2000 - Utility Manager All-in-One Exploit (MS04-019) Microsoft Windows Server 2000 - Universal Language Utility Manager (MS04-019) Microsoft Windows Task Scheduler (Windows XP/2000) - '.job' (MS04-022) Microsoft Windows Server 2000 - Utility Manager All-in-One (MS04-019) Microsoft Windows XP - Task Scheduler '.job' Universal Exploit (MS04-022) Microsoft Windows XP - Task Scheduler '.job' Universal (MS04-022) ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Exploit AOL Instant Messenger AIM - 'Away' Message Local Exploit OpenBSD - 'ftp' Exploit ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Overflow AOL Instant Messenger AIM - 'Away' Message Local OpenBSD - 'ftp' IPD (Integrity Protection Driver) - Local Exploit IPD (Integrity Protection Driver) - Local htpasswd Apache 1.3.31 - Local Exploit htpasswd Apache 1.3.31 - Local SudoEdit 1.6.8 - Local Change Permission Exploit SudoEdit 1.6.8 - Local Change Permission BSD bmon 1.2.1_2 - Local Exploit BSD bmon 1.2.1_2 - Local Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read Exploit Multiple AntiVirus - '.zip' Detection Bypass Exploit Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read Multiple AntiVirus - '.zip' Detection Bypass Cscope 15.5 - Symlink Exploit Cscope 15.5 - Symlink Microsoft Windows - Improper Token Validation Local Exploit Exim 4.41 - 'dns_build_reverse' Local Exploit (PoC) Peer2Mail 1.4 - Encrypted Password Dumper Exploit fkey 0.0.2 - Local File Accessibility Exploit Microsoft Windows - Improper Token Validation Local Exim 4.41 - 'dns_build_reverse' Local (PoC) Peer2Mail 1.4 - Encrypted Password Dumper fkey 0.0.2 - Local File Accessibility /usr/bin/trn (Not SUID) - Local Exploit Mandrake / Slackware /usr/bin/trn - Privilege Escalation (Not SUID) Linux ncpfs - Local Exploit ncpfs < 2.2.6 (Gentoo / Linux) - Privilege Escalation DelphiTurk FTP 1.0 - Passwords to Local Users Exploit DelphiTurk e-Posta 1.0 - Local Exploit GNU a2ps - 'Anything to PostScript' Not SUID Local Exploit VisualBoyAdvanced 1.7.x - Non SUID Local Shell Exploit DelphiTurk FTP 1.0 - Passwords to Local Users DelphiTurk e-Posta 1.0 - Local GNU a2ps - 'Anything to PostScript' Not SUID Local VisualBoyAdvanced 1.7.x - Non SUID Local Shell GetDataBack Data Recovery 2.31 - Local Exploit Aeon 0.2a - Local Linux Exploit (1) Aeon 0.2a - Local Linux Exploit (2) GetDataBack Data Recovery 2.31 - Local Aeon 0.2a - Local Linux (1) Aeon 0.2a - Local Linux (2) Microsoft Jet Database - 'msjet40.dll' Reverse Shell Exploit (1) Microsoft Jet Database - 'msjet40.dll' Reverse Shell (1) Oracle Database PL/SQL Statement - Multiple SQL Injections Exploits Oracle Database PL/SQL Statement - Multiple SQL Injections s Microsoft Windows - 'HTA' Script Execution Exploit (MS05-016) Microsoft Windows - 'HTA' Script Execution (MS05-016) Microsoft Jet Database - 'msjet40.dll' Reverse Shell Exploit (2) Microsoft Jet Database - 'msjet40.dll' Reverse Shell (2) Exim 4.41 - 'dns_build_reverse' Local Exploit Microsoft Windows - COM Structured Storage Local Exploit (MS05-012) ePSXe 1.6.0 - 'nogui()' Local Exploit Exim 4.41 - 'dns_build_reverse' Local Microsoft Windows - COM Structured Storage Local (MS05-012) ePSXe 1.6.0 - 'nogui()' Privilege Escalation Willing Webcam 2.8 - Licence Information Disclosure Local Exploit Willing Webcam 2.8 - Licence Information Disclosure Local Solaris (SPARC/x86) - Local Socket Hijack Exploit Solaris (SPARC/x86) - Local Socket Hijack MySQL 4.0.17 (Linux) - User-Defined Function (UDF) Dynamic Library Exploit (1) MySQL 4.0.17 (Linux) - User-Defined Function (UDF) Dynamic Library (1) Appfluent Database IDS < 2.1.0.103 - Environment Variable Local Exploit Appfluent Database IDS < 2.1.0.103 - Environment Variable Local Microsoft Windows Server 2000 Kernel - APC Data-Free Local Escalation Exploit (MS05-055) Microsoft Windows Server 2000 Kernel - APC Data-Free Local Escalation (MS05-055) MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library Exploit (2) MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2) Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL Exploit Intel Wireless Service - 's24evmon.exe' Shared Memory Exploit Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL Intel Wireless Service - 's24evmon.exe' Shared Memory Solaris 8/9 - '/usr/ucb/ps' Local Information Leak Exploit VMware 5.5.1 - 'ActiveX' Local Buffer Overflow Solaris 8/9 - '/usr/ucb/ps' Local Information Leak VMware 5.5.1 - 'ActiveX' Local Buffer Overflow TIBCO Rendezvous 7.4.11 - Password Extractor Local Exploit TIBCO Rendezvous 7.4.11 - Password Extractor Local Apple Mac OSX 10.4.7 - Mach Exception Handling Local Exploit (10.3.x) Apple Mac OSX 10.4.7 - Mach Exception Handling Local (10.3.x) Kaspersky Internet Security 6.0.0.303 - IOCTL KLICK Local Exploit Kaspersky Internet Security 6.0.0.303 - IOCTL KLICK Local HP Tru64 Alpha OSF1 5.1 - 'ps' Information Leak Exploit HP Tru64 Alpha OSF1 5.1 - 'ps' Information Leak Plan 9 Kernel - 'devenv.c OTRUNC/pwrite' Local Exploit Plan 9 Kernel - 'devenv.c OTRUNC/pwrite' Local PHP 5.2.1 - 'substr_compare()' Information Leak Exploit PHP 5.2.1 - 'substr_compare()' Information Leak PHP 'COM' Extensions - inconsistent Win32 'safe_mode' Bypass Exploit PHP 'COM' Extensions - inconsistent Win32 'safe_mode' Bypass PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow Exploit PHP 5.2.1 - 'session_regenerate_id()' Double-Free Exploit PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free Exploit PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow PHP 5.2.1 - 'session_regenerate_id()' Double-Free PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free PHP 4.4.6/5.2.1 - 'array_user_key_compare()' ZVAL dtor Local Exploit PHP 5.2.0 (OSX) - 'header()' Space Trimming Buffer Underflow Exploit PHP 4.4.6/5.2.1 - ext/gd Already Freed Resources Usage Exploit PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage Exploit PHP 5.2.1 - 'Unserialize()' Local Information Leak Exploit PHP < 4.4.5/5.2.1 - '_SESSION unset()' Local Exploit PHP 4.4.6/5.2.1 - 'array_user_key_compare()' ZVAL dtor Local PHP 5.2.0 (OSX) - 'header()' Space Trimming Buffer Underflow PHP 4.4.6/5.2.1 - ext/gd Already Freed Resources Usage PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage PHP 5.2.1 - 'Unserialize()' Local Information Leak PHP < 4.4.5/5.2.1 - '_SESSION unset()' Local East Wind Software - 'advdaudio.ocx 1.5.1.1' Local Buffer Overflow PHP 5.x - (Win32service) Local 'Safe_Mode()' Bypass Exploit PHP 5.x - (Win32service) Local 'Safe_Mode()' Bypass PHP 'FFI' Extension 5.0.5 - 'Safe_mode' Local Bypass Exploit PHP 'Perl' Extension - 'Safe_mode' Bypass Exploit PHP 'FFI' Extension 5.0.5 - 'Safe_mode' Local Bypass PHP 'Perl' Extension - 'Safe_mode' Bypass Norman Virus Control - 'nvcoaft51.sys' ioctl BF672028 Exploit Norman Virus Control - 'nvcoaft51.sys' ioctl BF672028 Microsoft Visual Basic 6.0 - VBP_Open OLE Local CodeExec Exploit Microsoft Visual Basic 6.0 - VBP_Open OLE Local CodeExec PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass Exploit PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass Send ICMP Nasty Garbage (SING) - Append File Logrotate Exploit Send ICMP Nasty Garbage (SING) - Append File Logrotate SafeNet 10.4.0.12 - 'IPSecDrv.sys' Local kernel Ring0 SYSTEM Exploit SafeNet 10.4.0.12 - 'IPSecDrv.sys' Local kernel Ring0 SYSTEM DESlock+ < 3.2.6 - Local Kernel Ring0 link list zero SYSTEM Exploit DESlock+ < 3.2.6 - 'DLMFDISK.sy's Local kernel Ring0 SYSTEM Exploit DESlock+ < 3.2.6 - Local Kernel Ring0 link list zero SYSTEM DESlock+ < 3.2.6 - 'DLMFDISK.sy's Local kernel Ring0 SYSTEM Solaris 8/9/10 - 'fifofs I_PEEK' Local Kernel Memory Leak Exploit Solaris 8/9/10 - 'fifofs I_PEEK' Local Kernel Memory Leak VideoLAN VLC Media Player 0.8.6d SSA Parsing Double Sh311 - Universal Exploit Deterministic Network Enhancer - 'dne2000.sys' Kernel Ring0 SYSTEM Exploit VideoLAN VLC Media Player 0.8.6d SSA Parsing Double Sh311 - Universal Deterministic Network Enhancer - 'dne2000.sys' Kernel Ring0 SYSTEM Microsoft Windows Server 2003 - Token Kidnapping Local Exploit (PoC) Microsoft Windows Server 2003 - Token Kidnapping Local (PoC) Opera 9.62 - 'file://' Local Heap Overflow PHP 5.2.6 - 'error_log' Safe_mode Bypass Exploit Opera 9.62 - 'file://' Local Heap Overflow PHP 5.2.6 - 'error_log' Safe_mode Bypass RadASM 2.2.1.5 - '.rap' WindowCallProcA Pointer Hijack Exploit RadASM 2.2.1.5 - '.rap' WindowCallProcA Pointer Hijack PHP 'python' Extension - 'safe_mode' Local Bypass Exploit PHP 'python' Extension - 'safe_mode' Local Bypass Adobe Acrobat Reader - JBIG2 Universal Exploit Adobe Acrobat Reader - JBIG2 Universal xscreensaver 5.01 - Arbitrary File Disclosure Symlink Exploit xscreensaver 5.01 - Arbitrary File Disclosure Symlink Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer Exploit (SEH) (1) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer Exploit (SEH) (2) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer Exploit (SEH) (3) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer (SEH) (1) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer (SEH) (2) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer (SEH) (3) pIPL 2.5.0 - '.PLS' / '.PL' Universal Local Buffer Exploit (SEH) pIPL 2.5.0 - '.PLS' / '.PL' Universal Local Buffer (SEH) Xenorate Media Player 2.6.0.0 - '.xpl' Universal Local Buffer Exploit (SEH) Xenorate Media Player 2.6.0.0 - '.xpl' Universal Local Buffer (SEH) KSP 2006 FINAL - '.m3u' Universal Local Buffer Exploit (SEH) KSP 2006 FINAL - '.m3u' Universal Local Buffer (SEH) BSD (Multiple Distributions) - 'setusercontext()' Exploit BSD (Multiple Distributions) - 'setusercontext()' Multiple Vulnerabilities Fat Player 0.6b - '.wav' Universal Local Buffer Exploit Fat Player 0.6b - '.wav' Universal Local Buffer Media Jukebox 8 - '.m3u' Universal Local Buffer Exploit (SEH) Media Jukebox 8 - '.m3u' Universal Local Buffer (SEH) Media Jukebox 8 - '.pls' Universal Local Buffer Exploit (SEH) Media Jukebox 8 - '.pls' Universal Local Buffer (SEH) Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer Exploit (SEH) (1) Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer (SEH) (1) Adobe Acrobat/Reader < 7.1.1/8.1.3/9.1 - Collab getIcon Universal Exploit Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer Exploit (SEH) (2) Adobe Acrobat/Reader < 7.1.1/8.1.3/9.1 - Collab getIcon Universal Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer (SEH) (2) Enlightenment - Linux Null PTR Dereference Exploit Framework Enlightenment - Linux Null PTR Dereference Framework AIMP2 Audio Converter - Playlist (SEH) AIMP2 Audio Converter - Playlist Overflow (SEH) VMware Fusion 2.0.5 - vmx86 kext Local Exploit (PoC) VMware Fusion 2.0.5 - vmx86 kext Local (PoC) VMware Virtual 8086 - Linux Local Ring0 Exploit VMware Virtual 8086 - Linux Local Ring0 Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor Exploit Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor Exploit Oracle - ctxsys.drvxtabc.create_tables Evil Cursor Exploit Oracle - ctxsys.drvxtabc.create_tables Exploit Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor Oracle - ctxsys.drvxtabc.create_tables Evil Cursor Oracle - ctxsys.drvxtabc.create_tables Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit Easy RM to MP3 2.7.3.700 - Ruby Easy RM to MP3 2.7.3.700 - (Ruby) VirtualDJ Trial 6.0.6 'New Year Edition' - '.m3u' Overflow Authentium SafeCentral 2.6 - 'shdrv.sys' Local Kernel Ring0 SYSTEM Exploit Authentium SafeCentral 2.6 - 'shdrv.sys' Local Kernel Ring0 SYSTEM WM Downloader 3.0.0.9 (Windows XP SP3) - PLS PLA Exploit WM Downloader 3.0.0.9 (Windows XP SP3) - PLS PLA Free MP3 CD Ripper 2.6 - '.wav' Exploit Free MP3 CD Ripper 2.6 - '.wav' Winamp 5.572 - 'whatsnew.txt' Exploit (SEH) (Metasploit) Winamp 5.572 - 'whatsnew.txt' (SEH) (Metasploit) FreeBSD - 'nfs_mount()' Exploit FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Privilege Escalation GSM SIM Utility 5.15 - Direct RET Local Exploit GSM SIM Utility 5.15 - Direct RET Local Apple iOS - '.pdf' Jailbreak Exploit Exploit Easy RM to MP3 2.7.3.700 - '.m3u' / '.pls' / '.smi' / '.wpl' / '.wax' / '.wvx' / '.ram' Exploit Apple iOS - '.pdf' Jailbreak Easy RM to MP3 2.7.3.700 - '.m3u' / '.pls' / '.smi' / '.wpl' / '.wax' / '.wvx' / '.ram' Microsoft Excel - FEATHEADER Record Exploit (MS09-067) Microsoft Excel - FEATHEADER Record (MS09-067) Foxit Reader 4.0 - '.pdf' Jailbreak Exploit Foxit Reader 4.0 - '.pdf' Jailbreak Microsoft Vista - 'fveapi.dll' BitLocker Drive Encryption API Hijacking Exploit Microsoft Vista - 'fveapi.dll' BitLocker Drive Encryption API Hijacking AudioTran 1.4.2.4 - SafeSEH + SEHOP Exploit AudioTran 1.4.2.4 - SafeSEH + SEHOP Oracle Solaris - 'su' Local Exploit Oracle Solaris - 'su' Local Trend Micro Titanium Maximum Security 2011 - Local Kernel Exploit Trend Micro Titanium Maximum Security 2011 - Local Kernel G Data TotalCare 2011 - Local Kernel Exploit G Data TotalCare 2011 - Local Kernel DriveCrypt 5.3 - Local Kernel Ring0 SYSTEM Exploit DriveCrypt 5.3 - Local Kernel Ring0 SYSTEM FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak Exploit AoA DVD Creator 2.5 - ActiveX Stack Overflow AoA Mp4 Converter 4.1.0 - ActiveX Stack Overflow DESlock+ < 4.1.10 - 'vdlptokn.sys' Local Kernel Ring0 SYSTEM Exploit FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak AoA DVD Creator 2.5 - ActiveX Stack Overflow AoA Mp4 Converter 4.1.0 - ActiveX Stack Overflow DESlock+ < 4.1.10 - 'vdlptokn.sys' Local Kernel Ring0 SYSTEM MPlayer (r33064 Lite) - Buffer Overflow + ROP Exploit MPlayer (r33064 Lite) - Buffer Overflow + ROP Adobe Reader X 10.0.0 < 10.0.1 - Atom Type Confusion Exploit Adobe Reader X 10.0.0 < 10.0.1 - Atom Type Confusion DVD X Player 5.5.0 Professional / Standard - '.plf' File Universal Exploit (ASLR + DEP Bypass) DVD X Player 5.5.0 Professional / Standard - '.plf' File Universal (ASLR + DEP Bypass) Linux Kernel 2.6.37-rc1 - 'serial_multiport_struct' Local Information Leak Exploit Linux Kernel 2.6.37-rc1 - 'serial_multiport_struct' Local Information Leak Microsoft Office 2008 SP0 (Mac) - RTF pFragments Exploit Microsoft Office 2008 SP0 (Mac) - RTF pFragments Lattice Semiconductor PAC-Designer 6.21 - '.PAC' Exploit Lattice Semiconductor PAC-Designer 6.21 - '.PAC' Overflow SGI IRIX 5.3/6.2 & SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Exploit SGI IRIX 6.4 & SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Exploit Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Privilege Escalation SunOS 4.1.1 - '/usr/release/bin/makeinstall' Privilege Escalation SunOS 4.1.1 - '/usr/release/bin/winstall' Privilege Escalation SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Privilege Escalation SGI IRIX 6.4 / SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Privilege Escalation ISC BIND 4.9.7 -T1B - named SIGINT and SIGIOT Symlink Exploit ISC BIND 4.9.7 -T1B - named SIGINT / SIGIOT Symlink Sun Solaris 2.6 - power management Exploit Sun Solaris 7.0 - 'sdtcm_convert' Exploit Sun Solaris 2.6 - power management Sun Solaris 7.0 - '/usr/dt/bin/sdtcm_convert' Overflow / Privilege Escalation Microsoft Windows - 'April Fools 2001' Exploit Microsoft Windows - 'April Fools 2001' Solaris 2.5.1 - 'ffbconfig' Exploit Solaris 2.5.1 - 'chkey' Exploit Solaris 2.5.1 - 'Ping' Exploit SGI IRIX 6.4 - 'ioconfig' Exploit Solaris 2.5.1 - 'ffbconfig' Privilege Escalation Solaris 2.5.1 - 'chkey' Privilege Escalation Solaris 2.5.1 - 'Ping' SGI IRIX 6.4 - 'ioconfig' Privilege Escalation BSD/OS 2.1 / DG/UX 7.0 / Debian 1.3 / HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.4 / Solaris 2.5.1 - 'xlock' Exploit (1) BSD/OS 2.1 / DG/UX 7.0 / Debian 1.3 / HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.4 / Solaris 2.5.1 - 'xlock' Overflow / Privilege Escalation (1) Solaris 2.5.1 - 'automount' Exploit BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Exploit (1) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Exploit (2) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Exploit (3) Solaris 2.5.1 - 'automount' Privilege Escalation BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Overflow / Privilege Escalation (1) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Overflow / Privilege Escalation (2) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Overflow / Privilege Escalation (3) Allaire ColdFusion Server 4.0.1 - 'CFCRYPT.EXE' Exploit Allaire ColdFusion Server 4.0.1 - 'CFCRYPT.EXE' Solaris 7.0 - 'cancel' Exploit Solaris 7.0 - 'chkperm' Exploit Solaris 7.0 - 'cancel' Privilege Escalation Solaris 7.0 - 'chkperm' G. Wilford man 2.3.10 - Symlink Exploit G. Wilford man 2.3.10 - Symlink S.u.S.E. Linux 5.2 - gnuplot Exploit S.u.S.E. Linux 5.2 - 'gnuplot' Stanford University bootpd 2.4.3 / Debian 2.0 - netstd Exploit X11R6 3.3.3 - Symlink Exploit Sun Solaris 7.0 - 'ff.core' Exploit S.u.S.E. 5.2 - 'lpc' Exploit SGI IRIX 6.2 - '/usr/lib/netaddpr' Exploit NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' Exploit SGI IRIX 6.2 - 'cdplayer' Exploit Stanford University bootpd 2.4.3 / Debian 2.0 - netstd X11R6 3.3.3 - Symlink Sun Solaris 7.0 - 'ff.core' Privilege Escalation S.u.S.E. 5.2 - 'lpc' Privilege Escalation SGI IRIX 6.2 - '/usr/lib/netaddpr' Privilege Escalation NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' SGI IRIX 6.2 - 'cdplayer' Privilege Escalation SGI IRIX 5.3 - 'Cadmin' Exploit SGI IRIX 6.0.1 - 'colorview' Exploit SGI IRIX 5.3 - 'Cadmin' Privilege Escalation SGI IRIX 6.0.1 - 'colorview' SGI IRIX 6.2 - day5notifier Exploit SGI IRIX 6.3 - 'df' Exploit SGI IRIX 6.4 - datman/cdman Exploit SGI IRIX 6.2 - 'eject' Exploit (1) SGI IRIX 6.2 - 'eject' Exploit (2) RedHat Linux 2.1 - 'abuse.console' Exploit SGI IRIX 6.2 - 'fsdump' Exploit SGI IRIX 6.2 - 'day5notifier' SGI IRIX 6.3 - 'df' Privilege Escalation SGI IRIX 6.4 - 'datman'/'cdman' SGI IRIX 6.2 - 'eject' Privilege Escalation (1) SGI IRIX 6.2 - 'eject' Privilege Escalation (2) RedHat Linux 2.1 - 'abuse.console' Privilege Escalation SGI IRIX 6.2 - 'fsdump' Privilege Escalation IBM AIX 4.3 - 'infod' Exploit IBM AIX 4.3 - 'infod' Privilege Escalation SGI IRIX 6.4 - 'inpview' Exploit RedHat Linux 5.0 - 'msgchk' Exploit SGI IRIX 6.4 - 'inpview' Privilege Escalation RedHat Linux 5.0 - 'msgchk' Privilege Escalation SGI IRIX 6.4 - login Exploit RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' Exploit (1) RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' Exploit (2) SGI IRIX 6.4 - 'netprint' Exploit SGI IRIX 6.4 - 'login' RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' (1) RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' (2) SGI IRIX 6.4 - 'netprint' Privilege Escalation SGI IRIX 5.3/6.2 - 'ordist' Exploit SGI IRIX 5.3/6.2 - 'ordist' Privilege Escalation SGI IRIX 5.3 - 'pkgadjust' Exploit SGI IRIX 5.3 - 'pkgadjust' Privilege Escalation IBM AIX 3.2.5 - 'IFS' Exploit IBM AIX 3.2.5 - 'IFS' Privilege Escalation SGI IRIX 6.3 - 'pset' Exploit SGI IRIX 6.4 - 'rmail' Exploit SGI IRIX 6.3 - 'pset' Privilege Escalation SGI IRIX 6.4 - 'rmail' SGI IRIX 5.2/5.3 - 'serial_ports' Exploit SGI IRIX 6.4 - 'suid_exec' Exploit SGI IRIX 5.1/5.2- 'sgihelp' Exploit SGI IRIX 6.4 - 'startmidi' Exploit SGI IRIX 6.3 - 'Systour' / 'OutOfBox' Exploit SGI IRIX 6.4 - 'xfsdump' Exploit SGI IRIX 5.2/5.3 - 'serial_ports' Privilege Escalation SGI IRIX 6.4 - 'suid_exec' Privilege Escalation SGI IRIX 5.1/5.2 - 'sgihelp' SGI IRIX 6.4 - 'startmidi' Privilege Escalation SGI IRIX 6.3 - 'Systour' / 'OutOfBox' Privilege Escalation SGI IRIX 6.4 - 'xfsdump' Privilege Escalation Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS Exploit (2) Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS (2) GNU glibc 2.1/2.1.1 -6 - 'pt_chown' Exploit GNU glibc 2.1/2.1.1 -6 - 'pt_chown' Privilege Escalation Common Desktop Environment 2.1 20 / Solaris 7.0 - dtspcd Exploit Common Desktop Environment 2.1 20 / Solaris 7.0 - 'dtspcd' SCO Open Server 5.0.5 - 'userOsa' Symlink Exploit SCO Open Server 5.0.5 - 'userOsa' Symlink BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow Exploit (1) BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow Exploit (2) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS Exploit (1) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS Exploit (2) BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow (1) BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow (2) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (1) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (2) S.u.S.E. Linux 6.1/6.2 - cwdtools Exploit S.u.S.E. Linux 6.1/6.2 - 'cwdtools' Solaris 7.0 - 'kcms_configure Exploit Solaris 7.0 - 'kcms_configure' FreeBSD 3.3 - 'gdc' Symlink Exploit FreeBSD 3.3 - 'gdc' Symlink SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'uidadmin' Exploit SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'uidadmin' Privilege Escalation SCO Unixware 7.1 - 'pkg' Exploit SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'coredump' Symlink Exploit SCO Unixware 7.1 - 'pkg' Privilege Escalation SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'coredump' Symlink Nortel Networks Optivity NETarchitect 2.0 - PATH Exploit SGI IRIX 6.2 - midikeys/soundplayer Exploit Nortel Networks Optivity NETarchitect 2.0 - PATH SGI IRIX 6.2 - 'midikeys'/'soundplayer' Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path Exploit (1) Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path Exploit (2) Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1) Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (2) FreeBSD 3.4 / NetBSD 1.4.1 / OpenBSD 2.6 - '/proc' FileSystem Exploit FreeBSD 3.4 / NetBSD 1.4.1 / OpenBSD 2.6 - '/proc' FileSystem Debian 2.1 - apcd Symlink Exploit Debian 2.1 - apcd Symlink SCO Unixware 7.1/7.1.1 - ARCserver /tmp Symlink Exploit Microsoft Windows 95/98/NT 4.0 - autorun.inf Exploit FreeBSD 3.0/3.1/3.2/3.3/3.4 - 'Asmon'/'Ascpu' Exploit Sun Workshop 5.0 - Licensing Manager Symlink Exploit SCO Unixware 7.1/7.1.1 - ARCserver /tmp Symlink Microsoft Windows 95/98/NT 4.0 - 'autorun.inf' FreeBSD 3.0/3.1/3.2/3.3/3.4 - 'Asmon'/'Ascpu' Sun Workshop 5.0 - Licensing Manager Symlink Corel Linux OS 1.0 - buildxconfig Exploit Corel Linux OS 1.0 - setxconf Exploit Corel Linux OS 1.0 - buildxconfig Corel Linux OS 1.0 - 'setxconf' Matt Kimball and Roger Wolff mtr 0.28/0.41 / Turbolinux 3.5 b2/4.2/4.4/6.0 - mtr Exploit (2) Matt Kimball and Roger Wolff mtr 0.28/0.41 / Turbolinux 3.5 b2/4.2/4.4/6.0 - mtr (2) Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - imwheel Exploit (1) Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - imwheel Exploit (2) Halloween Linux 4.0 / S.u.S.E. Linux 6.0/6.1/6.2/6.3 - kreatecd Exploit Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (1) Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (2) Halloween Linux 4.0 / S.u.S.E. Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Be BeOS 4.0/4.5/5.0 - IP Packet Length Field Exploit QSSL QNX 4.25 A - 'crypt()' Exploit Be BeOS 4.0/4.5/5.0 - IP Packet Length Field QSSL QNX 4.25 A - 'crypt()' Privilege Escalation RedHat Linux 6.0/6.1/6.2 - pam_console Exploit RedHat Linux 6.0/6.1/6.2 - 'pam_console' Netscape Communicator 4.5/4.51/4.6/4.61/4.7/4.72/4.73 - '/tmp' Symlink Exploit Netscape Communicator 4.5/4.51/4.6/4.61/4.7/4.72/4.73 - '/tmp' Symlink OpenLDAP 1.2.7/1.2.8/1.2.9/1.2.10 - '/usr/tmp/' Symlink Exploit OpenLDAP 1.2.7/1.2.8/1.2.9/1.2.10 - '/usr/tmp/' Symlink HP-UX 10.20/11.0 - man '/tmp' Symlink Exploit HP-UX 10.20/11.0 - man '/tmp' Symlink Oracle Internet Directory 2.0.6 - oidldap Exploit Oracle Internet Directory 2.0.6 - oidldap HP-UX 10.20/11.0 - crontab '/tmp' File Exploit Exim Buffer 1.6.2/1.6.51 - Overflow Exploit HP-UX 10.20/11.0 - crontab '/tmp' File Exim Buffer 1.6.2/1.6.51 - Overflow PHP 5.3.4 Win Com Module - Com_sink Exploit PHP 5.3.4 Win Com Module - Com_sink Zoner Photo Studio 15 Build 3 - 'Zps.exe' Registry Value Parsing Exploit Zoner Photo Studio 15 Build 3 - 'Zps.exe' Registry Value Parsing BlazeVideo HDTV Player 6.6 Professional - Direct RETN Exploit Aviosoft Digital TV Player Professional 1.x - '.PLF' Direct Retn Exploit BlazeVideo HDTV Player 6.6 Professional - Direct RETN Aviosoft Digital TV Player Professional 1.x - '.PLF' Direct Retn BlazeDVD 6.1 - '.PLF' File Exploit (ASLR + DEP Bypass) (Metasploit) BlazeDVD 6.1 - '.PLF' File (ASLR + DEP Bypass) (Metasploit) Inmatrix Ltd. Zoom Player 8.5 - '.jpeg' Exploit Inmatrix Ltd. Zoom Player 8.5 - '.jpeg' HexChat 2.9.4 - Local Exploit HexChat 2.9.4 - Local Microsoft Windows NT/2000/2003/2008/XP/Vista/7/8 - 'EPATHOBJ' Local Ring Exploit Microsoft Windows NT/2000/2003/2008/XP/Vista/7/8 - 'EPATHOBJ' Local Ring Winamp 5.63 - 'winamp.ini' Local Exploit Winamp 5.63 - 'winamp.ini' Local Nginx (Debian-Based Distros + Gentoo) - 'logrotate' Privilege Escalation Nginx (Debian Based Distros + Gentoo) - 'logrotate' Privilege Escalation PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass Exploit PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass Apple 2.0.4 - Safari Local Exploit Apple 2.0.4 - Safari Local Notepad++ Plugin Notepad 1.5 - Local Exploit Notepad++ Plugin Notepad 1.5 - Local Overflow Castripper 2.50.70 - '.pls' DEP Bypass Exploit Castripper 2.50.70 - '.pls' DEP Bypass Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write Exploit (2) Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2) suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass Exploit suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass Exploit PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass Adobe Reader for Android - 'addJavascriptInterface' Exploit (Metasploit) Adobe Reader for Android < 11.2.0 - 'addJavascriptInterface' Local Overflow (Metasploit) glibc - NUL Byte gconv_translit_find Off-by-One Exploit glibc - NUL Byte gconv_translit_find Off-by-One Microsoft Windows - OLE Package Manager SandWorm Exploit Microsoft Windows - OLE Package Manager SandWorm PonyOS 3.0 - VFS Permissions Exploit PonyOS 3.0 - VFS Permissions PonyOS 3.0 - TTY 'ioctl()' Local Kernel Exploit PonyOS 3.0 - TTY 'ioctl()' Local Kernel Microsoft Windows - ClientCopyImage Win32k Exploit (MS15-051) (Metasploit) Microsoft Windows - ClientCopyImage Win32k (MS15-051) (Metasploit) Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy Exploit Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy Google Android - get_user/put_user Exploit (Metasploit) Google Android - get_user/put_user (Metasploit) IKEView.exe R60 - '.elg' Local Exploit (SEH) IKEView.exe R60 - '.elg' Local (SEH) IKEView R60 - Buffer Overflow Local Exploit (SEH) IKEView R60 - Buffer Overflow Local (SEH) Gold MP4 Player - '.swf' Local Exploit Gold MP4 Player - '.swf' Local Easy RM to MP3 Converter 2.7.3.700 - '.m3u' File Exploit (Universal ASLR + DEP Bypass) Easy RM to MP3 Converter 2.7.3.700 - '.m3u' File (Universal ASLR + DEP Bypass) Apple iOS < 10.3.1 - Kernel Exploit Apple iOS < 10.3.1 - Kernel Linux Kernel - 'offset2lib Stack Clash' Exploit Linux Kernel - 'offset2lib Stack Clash' Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC) Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Exploit Microsoft IIS - WebDAV 'ntdll.dll' Remote Microsoft IIS 5.0 - WebDAV Remote (PoC) Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Microsoft Windows 2000/XP - SMB Authentication Remote Exploit RealServer < 8.0.2 (Windows Platforms) - Remote Exploit Microsoft Windows 2000/XP - SMB Authentication Remote RealServer < 8.0.2 (Windows Platforms) - Remote Overflow CommuniGate Pro Webmail 4.0.6 - Session Hijacking Exploit CommuniGate Pro Webmail 4.0.6 - Session Hijacking Webfroot Shoutbox < 2.32 (Apache) - Remote Exploit Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution Microsoft Internet Explorer - Object Tag Exploit (MS03-020) Apache 2.0.45 - 'APR' Remote Exploit Microsoft Internet Explorer - Object Tag (MS03-020) Apache 2.0.45 - 'APR' Remote Yahoo Messenger 5.5 - 'DSR-ducky.c' Remote Exploit Yahoo Messenger 5.5 - 'DSR-ducky.c' Remote Microsoft Windows Media Services - Remote Exploit (MS03-022) eXtremail 1.5.x (Linux) - Remote Format Strings Exploit ColdFusion MX - Remote Development Service Exploit Microsoft Windows Media Services - Remote (MS03-022) eXtremail 1.5.x (Linux) - Remote Format Strings ColdFusion MX - Remote Development Service Microsoft Windows Media Services - 'nsiislog.dll' Remote Exploit Microsoft Windows Media Services - 'nsiislog.dll' Remote Citadel/UX BBS 6.07 - Remote Exploit Citadel/UX BBS 6.07 - Remote Microsoft Windows XP/2000 - 'RPC DCOM' Remote Exploit (MS03-026) Microsoft Windows XP/2000 - 'RPC DCOM' Remote (MS03-026) Microsoft Windows - 'RPC DCOM' Remote Exploit (1) Microsoft Windows - 'RPC DCOM' Remote Exploit (2) Microsoft Windows - 'RPC DCOM' Remote (1) Microsoft Windows - 'RPC DCOM' Remote (2) Microsoft Windows - 'RPC DCOM' Remote Exploit (Universal) Microsoft Windows - 'RPC DCOM' Remote (Universal) Microsoft Internet Explorer - Object Data Remote Exploit (MS03-032) Microsoft Internet Explorer - Object Data Remote (MS03-032) Linux pam_lib_smb < 1.1.6 - '/bin/login' Remote Exploit Linux pam_lib_smb < 1.1.6 - '/bin/login' Remote Overflow MySQL 3.23.x/4.0.x - Remote Exploit MySQL 3.23.x/4.0.x - Remote Buffer Overflow Microsoft Windows - 'RPC DCOM2' Remote Exploit (MS03-039) Microsoft Windows - 'RPC DCOM2' Remote (MS03-039) Microsoft Windows - 'RPC2' Universal Exploit / Denial of Service (RPC3) (MS03-039) Microsoft Windows - 'RPC2' Universal / Denial of Service (RPC3) (MS03-039) NIPrint LPD-LPR Print Server 4.10 - Remote Exploit Microsoft Windows XP/2000 - RPC Remote Non Exec Memory Exploit NIPrint LPD-LPR Print Server 4.10 - Remote Microsoft Windows XP/2000 - RPC Remote Non Exec Memory Microsoft FrontPage Server Extensions - 'fp30reg.dll' Exploit (MS03-051) Microsoft Windows - Workstation Service WKSSVC Remote Exploit (MS03-049) IA WebMail Server 3.x - 'iaregdll.dll 1.0.0.5' Remote Exploit Apache mod_gzip (with debug_mode) 1.2.26.1a - Remote Exploit Opera 7.22 - File Creation and Execution Exploit (WebServer) Microsoft Windows XP - Workstation Service Remote Exploit (MS03-049) Microsoft FrontPage Server Extensions - 'fp30reg.dll' (MS03-051) Microsoft Windows - Workstation Service WKSSVC Remote (MS03-049) IA WebMail Server 3.x - 'iaregdll.dll 1.0.0.5' Remote Apache mod_gzip (with debug_mode) 1.2.26.1a - Remote Opera 7.22 - File Creation and Execution (WebServer) Microsoft Windows XP - Workstation Service Remote (MS03-049) Microsoft Windows Messenger Service (French) - Remote Exploit (MS03-043) Eznet 3.5.0 - Remote Stack Overflow Universal Exploit Microsoft Windows Messenger Service (French) - Remote (MS03-043) Eznet 3.5.0 - Remote Stack Overflow Universal RhinoSoft Serv-U FTPd Server 3.x/4.x - 'SITE CHMOD' Remote Exploit RhinoSoft Serv-U FTPd Server 3.x/4.x - 'SITE CHMOD' Remote Eudora 6.0.3 (Windows) - Attachment Spoofing Exploit Eudora 6.0.3 (Windows) - Attachment Spoofing Cisco - Cisco Global Exploiter Tool Cisco - Cisco Global er Tool BFTPd - 'vsprintf()' Format Strings Exploit INND/NNRP < 1.6.x - Overflow Exploit BFTPd - 'vsprintf()' Format Strings INND/NNRP < 1.6.x - Overflow BFTPd 1.0.12 - Remote Exploit BFTPd 1.0.12 - Remote Overflow Check Point VPN-1/FireWall-1 4.1 SP2 - Blocked Port Bypass Exploit OpenBSD ftpd 2.6/2.7 - Remote Exploit Linux Kernel 2.2 - TCP/IP Weakness Spoof IP Exploit WU-FTPD 2.6.0 - Remote Format Strings Exploit Check Point VPN-1/FireWall-1 4.1 SP2 - Blocked Port Bypass OpenBSD ftpd 2.6/2.7 - Remote Linux Kernel 2.2 - TCP/IP Weakness Spoof IP WU-FTPD 2.6.0 - Remote Format Strings Cisco - Password Bruteforcer Exploit Netscape Enterprise Server 4.0/sparc/SunOS 5.7 - Remote Exploit Cisco - Password Bruteforcer Netscape Enterprise Server 4.0/sparc/SunOS 5.7 - Remote Command Execution IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Exploit TCP Connection Reset - Remote Exploit IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Microsoft Windows XP/2000 - 'Lsasrv.dll' Remote Universal Exploit (MS04-011) Microsoft Windows XP/2000 - 'Lsasrv.dll' Remote Universal (MS04-011) Borland Interbase 7.x - Remote Exploit Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Exploit Borland Interbase 7.x - Remote Buffer Overflow Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Microsoft Internet Explorer - Remote Application.Shell Exploit Microsoft Internet Explorer - Remote Application.Shell Microsoft Internet Explorer - Remote Wscript.Shell Exploit Linux imapd - Remote Overflow File Retrieve Exploit Microsoft Internet Explorer - Remote Wscript.Shell Linux imapd - Remote Overflow / File Retrieve OpenFTPd 0.30.2 - Remote Exploit OpenFTPd 0.30.2 - Remote Remote CVS 1.11.15 - 'error_prog_name' Remote Exploit WU-IMAP 2000.287(1-2) - Remote Exploit rsync 2.5.1 - Remote Exploit (1) rsync 2.5.1 - Remote Exploit (2) Remote CVS 1.11.15 - 'error_prog_name' Arbitrary Code Execution WU-IMAP 2000.287(1-2) - Remote rsync 2.5.1 - Remote (1) rsync 2.5.1 - Remote (2) D-Link DCS-900 Camera - Remote IP Address Changer Exploit D-Link DCS-900 Camera - Remote IP Address Changer AOL Instant Messenger AIM - 'Away' Message Remote Exploit (2) AOL Instant Messenger AIM - 'Away' Message Remote (2) Citadel/UX 6.23 - Remote USER Directive Exploit Citadel/UX 6.23 - Remote USER Directive Microsoft Windows - JPEG GDI+ Overflow Shellcode Exploit Microsoft Windows - JPEG GDI+ Overflow Shellcode Microsoft Windows - JPEG GDI+ Overflow Administrator Exploit (MS04-028) Microsoft Windows - JPEG GDI+ Overflow Download Shellcode Exploit (MS04-028) Microsoft Windows - JPEG GDI+ Overflow Administrator (MS04-028) Microsoft Windows - JPEG GDI+ Overflow Download Shellcode (MS04-028) Eudora 6.2.0.7 - Attachment Spoofer Exploit Eudora 6.2.0.7 - Attachment Spoofer Microsoft Windows - Compressed Zipped Folders Exploit (MS04-034) Microsoft Windows - Compressed Zipped Folders (MS04-034) PHP 4.3.7/5.0.0RC3 - memory_limit Remote Exploit PHP 4.3.7/5.0.0RC3 - memory_limit Remote SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Exploit SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Apple iTunes - Playlist Buffer Overflow Download Shellcode Exploit Apple iTunes - Playlist Buffer Overflow Download Shellcode Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Exploit Microsoft Internet Explorer - '.ANI' Universal Exploit (MS05-002) Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow Microsoft Internet Explorer - '.ANI' Universal (MS05-002) Microsoft Internet Explorer - '.ANI' Downloader Exploit (MS05-002) Microsoft Internet Explorer - '.ANI' Downloader (MS05-002) 3CServer 1.1 (FTP Server) - Remote Exploit MSN Messenger - '.png' Image Buffer Overflow Download Shellcode Exploit 3CServer 1.1 (FTP Server) - Remote MSN Messenger - '.png' Image Buffer Overflow Download Shellcode Exim 4.43 - 'auth_spa_server()' Remote Exploit (PoC) Exim 4.43 - 'auth_spa_server()' Remote (PoC) Thomson TCW690 - POST Password Validation Exploit SHOUTcast 1.9.4 (Windows) - File Request Format String Remote Exploit Thomson TCW690 - POST Password Validation SHOUTcast 1.9.4 (Windows) - File Request Format String Remote LimeWire 4.1.2 < 4.5.6 - 'GET' Remote Exploit LimeWire 4.1.2 < 4.5.6 - 'GET' Remote Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote Exploit Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote MailEnable Enterprise 1.x - IMAPd Remote Exploit MailEnable Enterprise 1.x - IMAPd Remote HP-UX FTPD 1.1.214.4 - 'REST' Remote Brute Force Exploit HP-UX FTPD 1.1.214.4 - 'REST' Remote Brute Force dSMTP Mail Server 3.1b (Linux) - Format String Exploit dSMTP Mail Server 3.1b (Linux) - Format String ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie Exploit ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie Microsoft Windows Message Queuing - Buffer Overflow Universal Exploit (MS05-017) (v.0.3) Microsoft Internet Explorer - 'javaprxy.dll' COM Object Remote Exploit Nokia Affix < 3.2.0 - btftp Remote Client Exploit Microsoft Windows Message Queuing - Buffer Overflow Universal (MS05-017) (v.0.3) Microsoft Internet Explorer - 'javaprxy.dll' COM Object Remote Nokia Affix < 3.2.0 - btftp Remote Client Hosting Controller 0.6.1 HotFix 2.1 - Change Credit Limit Exploit Baby Web Server 2.6.2 - Command Validation Exploit Hosting Controller 0.6.1 HotFix 2.1 - Change Credit Limit Baby Web Server 2.6.2 - Command Validation Small HTTP Server 3.05.28 - Arbitrary Data Execution Exploit HP OpenView OmniBack II - Generic Remote Exploit Small HTTP Server 3.05.28 - Arbitrary Data Execution HP OpenView OmniBack II - Generic Remote CA BrightStor ARCserve Backup Agent - 'dbasqlr.exe' Remote Exploit CA BrightStor ARCserve Backup Agent - 'dbasqlr.exe' Remote Microsoft Internet Explorer - 'blnmgr.dll' COM Object Remote Exploit (MS05-038) Microsoft Internet Explorer - 'blnmgr.dll' COM Object Remote (MS05-038) Veritas Backup Exec (Windows) - Remote File Access Exploit (Metasploit) Microsoft Windows Plug-and-Play Service - Remote Universal Exploit (MS05-039) Veritas Backup Exec (Windows) - Remote File Access (Metasploit) Microsoft Windows Plug-and-Play Service - Remote Universal (MS05-039) Solaris 10 LPD - Arbitrary File Delete Exploit (Metasploit) Solaris 10 LPD - Arbitrary File Delete (Metasploit) Microsoft IIS 5.0 - '500-100.asp' Server Name Spoof Exploit Microsoft Windows Plug-and-Play Service - Remote Universal Exploit (Spanish) (MS05-039) Microsoft Windows Plug-and-Play Service (French) - Remote Universal Exploit (MS05-039) Microsoft IIS 5.0 - '500-100.asp' Server Name Spoof Microsoft Windows Plug-and-Play Service - Remote Universal (Spanish) (MS05-039) Microsoft Windows Plug-and-Play Service (French) - Remote Universal (MS05-039) HP OpenView Network Node Manager 7.50 - Remote Exploit DameWare Mini Remote Control 4.0 < 4.9 - Client Agent Remote Exploit HP OpenView Network Node Manager 7.50 - Remote DameWare Mini Remote Control 4.0 < 4.9 - Client Agent Remote Mozilla Browsers - 0xAD (HOST:) Remote Heap Buffer Overrun Exploit (2) Mozilla Browsers - 0xAD (HOST:) Remote Heap Buffer Overrun (2) HP-UX FTP Server - Unauthenticated Directory Listing Exploit (Metasploit) HP-UX FTP Server - Unauthenticated Directory Listing (Metasploit) Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Exploit Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Exploit Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Exploit Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Mirabilis ICQ 2003a - Buffer Overflow Download Shellcode Exploit Mirabilis ICQ 2003a - Buffer Overflow Download Shellcode Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote Exploit (3) Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote Exploit (4) Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (3) Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4) Microsoft Windows - DTC Remote Exploit (PoC) (MS05-051) (2) Microsoft Windows - DTC Remote (PoC) (MS05-051) (2) Mercury Mail Transport System 4.01b - PH SERVER Remote Exploit Mercury Mail Transport System 4.01b - PH SERVER Remote Farmers WIFE 4.4 sp1 - 'FTP' Remote System Access Exploit Farmers WIFE 4.4 sp1 - 'FTP' Remote System Access Microsoft Internet Explorer 6.0 SP0 - IsComponentInstalled() Remote Exploit (Metasploit) Microsoft Internet Explorer 6.0 SP0 - IsComponentInstalled() Remote (Metasploit) Microsoft Internet Explorer - 'createTextRang' Download Shellcode Exploit (1) Microsoft Internet Explorer - 'createTextRang' Remote Exploit (Metasploit) Microsoft Internet Explorer - 'createTextRang' Download Shellcode (1) Microsoft Internet Explorer - 'createTextRang' Remote (Metasploit) Microsoft Internet Explorer - 'createTextRang' Download Shellcode Exploit (2) Microsoft Internet Explorer - 'createTextRang' Download Shellcode (2) MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage Exploit MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage Microsoft Windows - DHCP Client Broadcast Exploit (MS06-036) Microsoft Windows - DHCP Client Broadcast (MS06-036) Microsoft Windows - CanonicalizePathName() Remote Exploit (MS06-040) Microsoft Windows - CanonicalizePathName() Remote (MS06-040) Easy File Sharing FTP Server 2.0 - 'PASS' Remote Exploit (PoC) Easy File Sharing FTP Server 2.0 - 'PASS' Remote (PoC) Microsoft Internet Explorer - WebViewFolderIcon setSlice() Exploit (HTML) Microsoft Internet Explorer - WebViewFolderIcon setSlice() Exploit (1) Microsoft Internet Explorer - WebViewFolderIcon setSlice() Exploit (2) McAfee ePo 3.5.0 / ProtectionPilot 1.1.0 - Source Remote Exploit (Metasploit) Microsoft Internet Explorer - WebViewFolderIcon setSlice() (HTML) Microsoft Internet Explorer - WebViewFolderIcon setSlice() (1) Microsoft Internet Explorer - WebViewFolderIcon setSlice() (2) McAfee ePo 3.5.0 / ProtectionPilot 1.1.0 - Source Remote (Metasploit) AEP SmartGate 4.3b - 'GET' Arbitrary File Download Exploit Cisco VPN 3000 Concentrator 4.1.7/4.7.2 - 'FTP' Remote Exploit AEP SmartGate 4.3b - 'GET' Arbitrary File Download Cisco VPN 3000 Concentrator 4.1.7/4.7.2 - 'FTP' Remote MiniHTTPServer Web Forum & File Sharing Server 4.0 - Add User Exploit MiniHTTPServer Web Forum & File Sharing Server 4.0 - Add User Easy File Sharing Web Server 4 - Remote Information Stealer Exploit EFS Easy Address Book Web Server 1.2 - Remote File Stream Exploit Easy File Sharing Web Server 4 - Remote Information Stealer EFS Easy Address Book Web Server 1.2 - Remote File Stream Oracle 9i/10g - 'read/write/execute' Exploitation Suite Oracle 9i/10g - 'read/write/execute' ation Suite Oracle 9i/10g - 'utl_file' FileSystem Access Exploit Oracle 9i/10g - 'utl_file' FileSystem Access Microsoft Windows - ASN.1 Remote Exploit (MS04-007) Microsoft Windows - ASN.1 Remote (MS04-007) Rediff Bol Downloader - ActiveX Control Execute Local File Exploit Rediff Bol Downloader - ActiveX Control Execute Local File Microsoft Internet Explorer - VML Download and Execute Exploit (MS07-004) Microsoft Internet Explorer - VML Download and Execute (MS07-004) PA168 Chipset IP Phones - Weak Session Management Exploit PA168 Chipset IP Phones - Weak Session Management Lotus Domino R6 Webmail - Remote Password Hash Dumper Exploit Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack Exploit Lotus Domino R6 Webmail - Remote Password Hash Dumper Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission Exploit Oracle 10g - KUPV$FT.ATTACH_JOB Grant/Revoke dba Permission Exploit Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission Oracle 10g - KUPV$FT.ATTACH_JOB Grant/Revoke dba Permission NetProxy 4.03 - Web Filter Evasion / Bypass Logging Exploit 3Com TFTP Service (3CTftpSvc) 2.0.1 - Long Transporting Mode Exploit (Perl) NetProxy 4.03 - Web Filter Evasion / Bypass Logging 3Com TFTP Service (3CTftpSvc) 2.0.1 - Long Transporting Mode (Perl) PHP 5.2.0 - EXT/Filter FDF Post Filter Bypass Exploit PHP 5.2.0 - EXT/Filter FDF Post Filter Bypass Mercur Messaging 2005 (Windows 2000 SP4) - IMAP 'Subscribe' Remote Exploit Mercur Messaging 2005 < SP4 - IMAP Remote Exploit (Egghunter) Mercur Messaging 2005 (Windows 2000 SP4) - IMAP 'Subscribe' Remote Mercur Messaging 2005 < SP4 - IMAP Remote (Egghunter) Microsoft DNS Server - Dynamic DNS Updates Remote Exploit Microsoft DNS Server - Dynamic DNS Updates Remote Ethernet Device Drivers Frame Padding - 'Etherleak' Infomation Leakage Exploit Ethernet Device Drivers Frame Padding - 'Etherleak' Infomation Leakage Microsoft Internet Explorer - Recordset Double-Free Memory Exploit (MS07-009) Easy File Sharing FTP Server 2.0 (Windows 2000 SP4) - 'PASS' Remote Exploit Microsoft Internet Explorer - Recordset Double-Free Memory (MS07-009) Easy File Sharing FTP Server 2.0 (Windows 2000 SP4) - 'PASS' Remote CA BrightStor Backup 11.5.2.0 - 'Mediasvr.exe' Remote Code Exploit CA BrightStor Backup 11.5.2.0 - 'Mediasvr.exe' Remote Code IBM Lotus Domino Server 6.5 - Unauthenticated Remote Exploit IBM Lotus Domino Server 6.5 - Unauthenticated Remote Microsoft Windows - Animated Cursor '.ani' Remote Exploit (eeye patch Bypass) Microsoft Windows - Animated Cursor '.ani' Remote (eeye patch Bypass) Microsoft Windows - Animated Cursor '.ani' Universal Exploit Generator Microsoft Windows - Animated Cursor '.ani' Universal Generator MiniWebsvr 0.0.7 - Remote Directory Traversal Virtual CD 9.0.0.2 - 'vc9api.DLL' Remote Shell Commands Execution Exploit Virtual CD 9.0.0.2 - 'vc9api.DLL' Remote Shell Commands Execution EDraw Office Viewer Component - Unsafe Method Exploit EDraw Office Viewer Component - Unsafe Method Vivotek Motion Jpeg Control - 'MjpegDecoder.dll 2.0.0.13' Remote Exploit Vivotek Motion Jpeg Control - 'MjpegDecoder.dll 2.0.0.13' Remote IBM Tivoli Provisioning Manager - Unauthenticated Remote Exploit IBM Tivoli Provisioning Manager - Unauthenticated Remote Zenturi ProgramChecker - 'ActiveX NavigateUrl()' Insecure Method Exploit Yahoo! Messenger Webcam 8.1 - 'Ywcvwr.dll' Download / Execute Exploit Yahoo! Messenger Webcam 8.1 - 'Ywcupl.dll' Download / Execute Exploit Zenturi ProgramChecker - 'ActiveX NavigateUrl()' Insecure Method Yahoo! Messenger Webcam 8.1 - 'Ywcvwr.dll' Download / Execute Yahoo! Messenger Webcam 8.1 - 'Ywcupl.dll' Download / Execute HP Digital Imaging 'hpqxml.dll 2.0.0.133' - Arbitrary Data Write Exploit HP Digital Imaging 'hpqxml.dll 2.0.0.133' - Arbitrary Data Write HP Digital Imaging 'hpqvwocx.dll 2.1.0.556' - 'SaveToFile()' Exploit HP Digital Imaging 'hpqvwocx.dll 2.1.0.556' - 'SaveToFile()' Apache Tomcat Connector mod_jk - 'exec-shield' Remote Exploit Apache Tomcat Connector mod_jk - 'exec-shield' Remote SecureBlackbox 'PGPBBox.dll 5.1.0.112' - Arbitrary Data Write Exploit SecureBlackbox 'PGPBBox.dll 5.1.0.112' - Arbitrary Data Write Nessus Vulnerability Scanner 3.0.6 - ActiveX Remote Delete File Exploit Nessus Vulnerability Scanner 3.0.6 - ActiveX Remote Delete File VMware 'IntraProcessLogging.dll' 5.5.3.42958 - Arbitrary Data Write Exploit VMware 'IntraProcessLogging.dll' 5.5.3.42958 - Arbitrary Data Write BIND 9 0.3beta - DNS Cache Poisoning Exploit BIND 9 0.3beta - DNS Cache Poisoning NVR SP2 2.0 'nvUnifiedControl.dll 1.1.45.0' - 'SetText()' Remote Exploit NVR SP2 2.0 'nvUnifiedControl.dll 1.1.45.0' - 'SetText()' Remote Telecom Italy Alice Messenger - Remote Registry Key Manipulation Exploit Telecom Italy Alice Messenger - Remote Registry Key Manipulation Lighttpd 1.4.16 - FastCGI Header Overflow Remote Exploit Lighttpd 1.4.16 - FastCGI Header Overflow Remote Apple QuickTime /w IE .qtl Version XAS - Remote Exploit (PoC) Apple QuickTime /w IE .qtl Version XAS - Remote (PoC) Lighttpd 1.4.17 - FastCGI Header Overflow Remote Exploit Lighttpd 1.4.17 - FastCGI Header Overflow Remote Motorola Timbuktu Pro 8.6.5 - File Deletion/Creation Exploit Tor < 0.1.2.16 - ControlPort Remote Rewrite Exploit Motorola Timbuktu Pro 8.6.5 - File Deletion/Creation Tor < 0.1.2.16 - ControlPort Remote Rewrite Apple iTouch/iPhone 1.1.1 - '.tif' File Remote Jailbreak Exploit PBEmail 7 - ActiveX Edition Insecure Method Exploit Apple iTouch/iPhone 1.1.1 - '.tif' File Remote Jailbreak PBEmail 7 - ActiveX Edition Insecure Method IBM Lotus Domino 7.0.2FP1 - IMAP4 Server LSUB Command Exploit IBM Lotus Domino 7.0.2FP1 - IMAP4 Server LSUB Command SonicWALL SSL-VPN - 'NeLaunchCtrl' ActiveX Control Remote Exploit EDraw Flowchart ActiveX Control 2.0 - Insecure Method Exploit SonicWALL SSL-VPN - 'NeLaunchCtrl' ActiveX Control Remote EDraw Flowchart ActiveX Control 2.0 - Insecure Method Apple QuickTime 7.2/7.3 (Internet Explorer 7 / Firefox / Opera) - RTSP Response Universal Exploit Apple QuickTime 7.2/7.3 (Internet Explorer 7 / Firefox / Opera) - RTSP Response Universal Apple QuickTime 7.2/7.3 - RSTP Response Universal Exploit Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal Exploit Apple QuickTime 7.2/7.3 - RSTP Response Universal Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal Microsoft Windows Server 2000 SP4 (Advanced Server) - Message Queue Exploit (MS07-065) Microsoft Windows Server 2000 SP4 (Advanced Server) - Message Queue (MS07-065) Macrovision FlexNet - 'isusweb.dll' DownloadAndExecute Method Exploit Macrovision FlexNet - 'isusweb.dll' DownloadAndExecute Method Sejoong Namo ActiveSquare 6 - 'NamoInstaller.dll' install Method Exploit Sejoong Namo ActiveSquare 6 - 'NamoInstaller.dll' install Method MailBee Objects 5.5 - 'MailBee.dll' Remote Insecure Method Exploit Chilkat Mail ActiveX 7.8 - 'ChilkatCert.dll' Insecure Method Exploit MailBee Objects 5.5 - 'MailBee.dll' Remote Insecure Method Chilkat Mail ActiveX 7.8 - 'ChilkatCert.dll' Insecure Method Chilkat FTP ActiveX 2.0 - 'ChilkatCert.dll' Insecure Method Exploit Chilkat FTP ActiveX 2.0 - 'ChilkatCert.dll' Insecure Method Backup Exec System Recovery Manager 7.0.1 - Arbitrary File Upload Rising AntiVirus Online Scanner - Insecure Method Flaw Exploit Rising AntiVirus Online Scanner - Insecure Method Flaw NetWin Surgemail 3.8k4-4 - IMAP Authenticated Remote LIST Universal Exploit NetWin Surgemail 3.8k4-4 - IMAP Authenticated Remote LIST Universal IBiz E-Banking Integrator 2.0 - ActiveX Edition Insecure Method Exploit IBiz E-Banking Integrator 2.0 - ActiveX Edition Insecure Method C6 Messenger - ActiveX Remote Download and Execute Exploit C6 Messenger - ActiveX Remote Download and Execute Akamai Download Manager < 2.2.3.7 - ActiveX Remote Download Exploit Akamai Download Manager < 2.2.3.7 - ActiveX Remote Download BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning Exploit (Metasploit) BIND 9.x - Remote DNS Cache Poisoning Exploit (Python) Microsoft Access - 'Snapview.ocx 10.0.5529.0' ActiveX Remote Exploit BIND 9.x - Remote DNS Cache Poisoning Exploit BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit) BIND 9.x - Remote DNS Cache Poisoning (Python) Microsoft Access - 'Snapview.ocx 10.0.5529.0' ActiveX Remote BIND 9.x - Remote DNS Cache Poisoning Cisco IOS 12.3(18) (FTP Server) - Remote Exploit (Attached to GDB) Cisco IOS 12.3(18) (FTP Server) - Remote (Attached to GDB) BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning Exploit BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass Sun Solaris 10 - snoop(1M) Utility Remote Exploit Friendly Technologies - Read/Write Registry/Read Files Exploit Google Chrome 0.2.149.27 - Automatic File Download Exploit Sun Solaris 10 - snoop(1M) Utility Remote Friendly Technologies - Read/Write Registry/Read Files Google Chrome 0.2.149.27 - Automatic File Download Microworld Mailscan 5.6.a - Password Reveal Exploit Microworld Mailscan 5.6.a - Password Reveal NuMedia Soft Nms DVD Burning SDK - ActiveX 'NMSDVDX.dll' Exploit NuMedia Soft Nms DVD Burning SDK - ActiveX 'NMSDVDX.dll' Chilkat XML - ActiveX Arbitrary File Creation/Execution Exploit Chilkat XML - ActiveX Arbitrary File Creation/Execution Autodesk DWF Viewer Control / LiveUpdate Module - Remote Exploit GdPicture Pro - ActiveX 'gdpicture4s.ocx' File Overwrite / Exec Exploit Microsoft Windows - GDI (EMR_COLORMATCHTOTARGETW) Exploit (MS08-021) Autodesk DWF Viewer Control / LiveUpdate Module - Remote GdPicture Pro - ActiveX 'gdpicture4s.ocx' File Overwrite / Exec Microsoft Windows - GDI (EMR_COLORMATCHTOTARGETW) (MS08-021) PowerTCP FTP Module - Multiple Exploit Techniques (SEH HeapSpray) PowerTCP FTP Module - Multiple Techniques (SEH HeapSpray) MW6 Aztec - ActiveX 'Aztec.dll' Remote Insecure Method Exploit MW6 Barcode - ActiveX 'Barcode.dll' Insecure Method Exploit MW6 Datamatrix - ActiveX 'Datamatrix.dll' Insecure Method Exploit MW6 PDF417 - ActiveX 'MW6PDF417.dll' Remote Insecure Method Exploit MW6 Aztec - ActiveX 'Aztec.dll' Remote Insecure Method MW6 Barcode - ActiveX 'Barcode.dll' Insecure Method MW6 Datamatrix - ActiveX 'Datamatrix.dll' Insecure Method MW6 PDF417 - ActiveX 'MW6PDF417.dll' Remote Insecure Method GE Fanuc Real Time Information Portal 2.6 - 'writeFile()' API Exploit (Metasploit) GE Fanuc Real Time Information Portal 2.6 - 'writeFile()' API (Metasploit) Microsoft Windows - SmbRelay3 NTLM Replay Exploit (MS08-068) Microsoft Windows - SmbRelay3 NTLM Replay (MS08-068) DD-WRT v24-sp1 - Cross-Site Reference Forgery Microsoft Internet Explorer (Windows Vista) - XML Parsing Buffer Overflow Chilkat FTP - ActiveX (SaveLastError) Insecure Method Exploit Chilkat FTP - ActiveX (SaveLastError) Insecure Method ExcelOCX ActiveX 3.2 - Download File Insecure Method Exploit ExcelOCX ActiveX 3.2 - Download File Insecure Method GuildFTPd FTP Server 0.999.14 - Remote Delete Files Exploit GuildFTPd FTP Server 0.999.14 - Remote Delete Files GeoVision LiveAudio - ActiveX Remote Freed-Memory Access Exploit Morovia Barcode ActiveX 3.6.2 - 'MrvBarCd.dll' Insecure Method Exploit RhinoSoft Serv-U FTP Server 7.4.0.1 - 'MKD' Create Arbitrary Directories Exploit GeoVision LiveAudio - ActiveX Remote Freed-Memory Access Morovia Barcode ActiveX 3.6.2 - 'MrvBarCd.dll' Insecure Method RhinoSoft Serv-U FTP Server 7.4.0.1 - 'MKD' Create Arbitrary Directories Sysax Multi Server 4.3 - Arbitrary Delete Files Exploit Sysax Multi Server 4.3 - Arbitrary Delete Files Expoit IncrediMail 5.86 - Cross-Site Scripting Script Execution Exploit IncrediMail 5.86 - Cross-Site Scripting Script Execution Pirelli Discus DRG A225 wifi router - WPA2PSK Default Algorithm Exploit Pirelli Discus DRG A225 wifi router - WPA2PSK Default Algorithm Linux Kernel 2.6.20/2.6.24/2.6.27_7-10 (Ubuntu 7.04/8.04/8.10 / Fedora Core 10 / OpenSuse 11.1) - SCTP FWD Memory Corruption Remote Exploit Linux Kernel 2.6.20/2.6.24/2.6.27_7-10 (Ubuntu 7.04/8.04/8.10 / Fedora Core 10 / OpenSuse 11.1) - SCTP FWD Memory Corruption Remote httpdx 0.8 - FTP Server Delete/Get/Create Directories/Files Exploit httpdx 0.8 - FTP Server Delete/Get/Create Directories/Files Bopup Communications Server 3.2.26.5460 - Remote SYSTEM Exploit Bopup Communications Server 3.2.26.5460 - Remote SYSTEM Green Dam - Remote Change System Time Exploit Green Dam - Remote Change System Time Microsoft Office Web Components Spreadsheet - ActiveX 'OWC10/11' Exploit Microsoft Office Web Components Spreadsheet - ActiveX 'OWC10/11' Oracle Secure Backup Server 10.3.0.1.0 - Authentication Bypass / Remote Code Injection Exploit Oracle Secure Backup Server 10.3.0.1.0 - Authentication Bypass / Remote Code Injection IBM Installation Manager 1.3.0 - 'iim://' URI handler Exploit EMC Captiva QuickScan Pro 4.6 SP1 and EMC Documentum ApllicationXtender Desktop 5.4 (keyhelp.ocx 1.2.312) - Remote Exploit Oracle - Document Capture BlackIce DEVMODE Exploit IBM Installation Manager 1.3.0 - 'iim://' URI handler EMC Captiva QuickScan Pro 4.6 SP1 and EMC Documentum ApllicationXtender Desktop 5.4 (keyhelp.ocx 1.2.312) - Remote Oracle - Document Capture BlackIce DEVMODE Sun Java Runtime and Development Kit 6 Update 10 - Calendar Deserialization Exploit (Metasploit) Sun Java Runtime and Development Kit 6 Update 10 - Calendar Deserialization (Metasploit) AoA MP4 Converter 4.1.2 - ActiveX Exploit AoA MP4 Converter 4.1.2 - ActiveX Snort 2.4.0 < 2.4.3 - Back Orifice Pre-Preprocessor Remote Exploit (Metasploit) Snort 2.4.0 < 2.4.3 - Back Orifice Pre-Preprocessor Remote (Metasploit) Unreal Tournament 2004 - 'Secure' Overflow Exploit (Metasploit) Unreal Tournament 2004 - 'Secure' Overflow (Metasploit) AoA Audio Extractor Basic 2.3.7 - ActiveX Exploit AoA DVD Creator 2.6.2 - ActiveX Exploit AoA Audio Extractor Basic 2.3.7 - ActiveX AoA DVD Creator 2.6.2 - ActiveX Microsoft Internet Explorer 6 - Aurora Exploit Microsoft Internet Explorer 6 - Aurora Exploit EFS Software Easy Chat Server 2.2 - Buffer Overflow EFS Software Easy Chat Server 2.2 - Buffer Overflow AOL 9.5 - ActiveX Heap Spray Exploit AOL 9.5 - ActiveX Heap Spray (Gabriel's FTP Server) Open & Compact FTPd 1.2 - Unauthenticated Remote Exploit (Gabriel's FTP Server) Open & Compact FTPd 1.2 - Unauthenticated Remote Microsoft Internet Explorer 6/7 - Remote Code Execution (Remote User Add Exploit) Microsoft Internet Explorer 6/7 - Remote Code Execution (Remote User Add) Apache 2.2.14 mod_isapi - Dangling Pointer Remote SYSTEM Exploit SAP GUI 7.10 - WebViewer3D Active-X JIT-Spray Exploit Apache 2.2.14 mod_isapi - Dangling Pointer Remote SYSTEM SAP GUI 7.10 - WebViewer3D Active-X JIT-Spray Microsoft Internet Explorer - 'iepeers.dll' Use-After-Free Exploit (Metasploit) Microsoft Internet Explorer - 'iepeers.dll' Use-After-Free (Metasploit) Magneto Net Resource ActiveX 4.0.0.5 - 'NetFileClose' Universal Exploit Magneto Net Resource ActiveX 4.0.0.5 - 'NetConnectionEnum' Universal Exploit Magneto Net Resource ActiveX 4.0.0.5 - 'NetShareEnum' Universal Exploit Magneto Net Resource ActiveX 4.0.0.5 - 'NetFileClose' Universal Magneto Net Resource ActiveX 4.0.0.5 - 'NetConnectionEnum' Universal Magneto Net Resource ActiveX 4.0.0.5 - 'NetShareEnum' Universal Xftp client 3.0 - 'PWD' Remote Exploit Xftp client 3.0 - 'PWD' Remote HP Digital Imaging - 'hpodio08.dll' Insecure Method Exploit HP Digital Imaging - 'hpodio08.dll' Insecure Method ProSSHD 1.2 - Authenticated Remote Exploit (ASLR + DEP Bypass) ProSSHD 1.2 - Authenticated Remote (ASLR + DEP Bypass) Litespeed Technologies - Web Server Remote Poison Null Byte Exploit Litespeed Technologies - Web Server Remote Poison Null Byte Sun Java Web Server 7.0 u7 - Remote Exploit Sun Java Web Server 7.0 u7 - Remote Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Exploit Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote IBM AIX 5l - 'FTPd' Remote DES Hash Exploit IBM AIX 5l - 'FTPd' Remote DES Hash Barcodewiz Barcode ActiveX Control 3.29 - Remote HeapSpray Exploit (Internet Explorer 6/7) Barcodewiz Barcode ActiveX Control 3.29 - Remote HeapSpray (Internet Explorer 6/7) AoA Audio Extractor - Remote ActiveX SEH JIT Spray Exploit (ASLR + DEP Bypass) SopCast 3.2.9 - Remote Exploit AoA Audio Extractor - Remote ActiveX SEH JIT Spray (ASLR + DEP Bypass) SopCast 3.2.9 - Remote Adobe Acrobat Reader and Flash Player - 'newclass' Invalid Pointer Exploit Adobe Acrobat Reader and Flash Player - 'newclass' Invalid Pointer Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Exploit Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote AoA Audio Extractor 2.x - ActiveX ROP Exploit AoA Audio Extractor 2.x - ActiveX ROP Microsoft ASP.NET - Auto-Decryptor File Download Exploit (MS10-070) Microsoft ASP.NET - Auto-Decryptor File Download (MS10-070) Mozilla Firefox 3.6.8 < 3.6.11 - Interleaving 'document.write' / 'appendChild' Exploit Mozilla Firefox 3.6.8 < 3.6.11 - Interleaving 'document.write' / 'appendChild' Google Android 2.0 < 2.1 - Reverse Shell Exploit Google Android 2.0 < 2.1 - Reverse Shell FreeBSD Litespeed Web Server 4.0.17 with PHP - Remote Exploit Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Crystal Reports Viewer 12.0.0.549 - 'PrintControl.dll' ActiveX Exploit Microsoft Internet Explorer 8 - CSS Parser Exploit Crystal Reports Viewer 12.0.0.549 - 'PrintControl.dll' ActiveX Microsoft Internet Explorer 8 - CSS Parser Novell iPrint 5.52 - ActiveX 'GetDriverSettings()' Remote Exploit Novell iPrint 5.52 - ActiveX 'GetDriverSettings()' Remote Sun Microsystems SunScreen Firewall - Root Exploit Sun Microsystems SunScreen Firewall - Privilege Escalation FTPGetter 3.58.0.21 - 'PASV' Buffer Overflow Exploit FTPGetter 3.58.0.21 - 'PASV' Buffer Overflow Sun Java - Calendar Deserialization Exploit (Metasploit) Sun Java - Calendar Deserialization (Metasploit) Java - 'Statement.invoke()' Trusted Method Chain Exploit (Metasploit) Java - 'Statement.invoke()' Trusted Method Chain (Metasploit) Veritas Backup Exec Name Service - Overflow Exploit (Metasploit) Veritas Backup Exec Name Service - Overflow (Metasploit) Microsoft Private Communications Transport - Overflow Exploit (MS04-011) (Metasploit) Microsoft Private Communications Transport - Overflow (MS04-011) (Metasploit) Microsoft RRAS Service - Overflow Exploit (MS06-025) (Metasploit) Microsoft RRAS Service - Overflow (MS06-025) (Metasploit) Microsoft NetDDE Service - Overflow Exploit (MS04-031) (Metasploit) Microsoft NetDDE Service - Overflow (MS04-031) (Metasploit) CA BrightStor Agent for Microsoft SQL - Overflow Exploit (Metasploit) CA BrightStor Agent for Microsoft SQL - Overflow (Metasploit) CA BrightStor Universal Agent - Overflow Exploit (Metasploit) CA BrightStor Universal Agent - Overflow (Metasploit) Knox Arkeia Backup Client Type 77 (Windows x86) - Overflow Exploit (Metasploit) Knox Arkeia Backup Client Type 77 (Windows x86) - Overflow (Metasploit) Mozilla Firefox - Interleaving 'document.write' / 'appendChild' Exploit (Metasploit) Mozilla Firefox - Interleaving 'document.write' / 'appendChild' (Metasploit) Microsoft Works 7 - 'WkImgSrv.dll' WKsPictureInterface() ActiveX Exploit (Metasploit) Microsoft Works 7 - 'WkImgSrv.dll' WKsPictureInterface() ActiveX (Metasploit) Microsoft RPC DCOM Interface - Overflow Exploit (MS03-026) (Metasploit) Microsoft RPC DCOM Interface - Overflow (MS03-026) (Metasploit) Savant Web Server 3.1 - Overflow Exploit (Metasploit) Savant Web Server 3.1 - Overflow (Metasploit) McAfee ePolicy Orchestrator / ProtectionPilot - Overflow Exploit (Metasploit) McAfee ePolicy Orchestrator / ProtectionPilot - Overflow (Metasploit) Snort Back Orifice - Pre-Preprocessor Remote Exploit (Metasploit) Snort Back Orifice - Pre-Preprocessor Remote (Metasploit) Knox Arkeia Backup Client Type 77 (OSX) - Overflow Exploit (Metasploit) Knox Arkeia Backup Client Type 77 (OSX) - Overflow (Metasploit) Samba 2.2.8 (BSD x86) - 'trans2open' Overflow Exploit (Metasploit) Samba 2.2.8 (BSD x86) - 'trans2open' Overflow (Metasploit) KingView 6.5.3 SCADA - ActiveX Exploit KingView 6.5.3 SCADA - ActiveX Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free Exploit Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free Progea Movicon 11 - 'TCPUploadServer' Remote Exploit Progea Movicon 11 - 'TCPUploadServer' Remote Adobe Flash Player < 10.1.53.64 - Action Script Type Confusion Exploit (ASLR + DEP Bypass) Adobe Flash Player < 10.1.53.64 - Action Script Type Confusion (ASLR + DEP Bypass) IBM Tivoli Endpoint 4.1.1 - Remote SYSTEM Exploit IBM Tivoli Endpoint 4.1.1 - Remote SYSTEM Black Ice Cover Page SDK - Insecure Method 'DownloadImageFileURL()' Exploit (Metasploit) Black Ice Cover Page SDK - Insecure Method 'DownloadImageFileURL()' (Metasploit) IBM Web Application Firewall - Bypass Exploit IBM Web Application Firewall - Bypass Symantec Backup Exec 12.5 - Man In The Middle Exploit Symantec Backup Exec 12.5 - Man In The Middle Mozilla Firefox 3.6.16 (Windows 7) - mChannel Object Use-After-Free Exploit Mozilla Firefox 3.6.16 (Windows 7) - mChannel Object Use-After-Free Sunway Force Control SCADA 6.1 SP3 - 'httpsrv.exe' Exploit Sunway Force Control SCADA 6.1 SP3 - 'httpsrv.exe' JBoss AS 2.0 - Remote Exploit JBoss AS 2.0 - Remote NJStar Communicator 3.00 - MiniSMTP Server Remote Exploit (Metasploit) NJStar Communicator 3.00 - MiniSMTP Server Remote (Metasploit) Oracle - xdb.xdb_pitrig_pkg.PITRIG_DROPMETADATA procedure Exploit Oracle - xdb.xdb_pitrig_pkg.PITRIG_DROPMETADATA procedure CoDeSys SCADA 2.3 - Remote Exploit CoDeSys SCADA 2.3 - Remote Buffer Overflow CoCSoft Stream Down 6.8.0 - Universal Exploit (Metasploit) Reaver - WiFi Protected Setup (WPS) Exploit CoCSoft Stream Down 6.8.0 - Universal (Metasploit) Reaver - WiFi Protected Setup (WPS) Mozilla Firefox 4.0.1 - 'Array.reduceRight()' Exploit Mozilla Firefox 4.0.1 - 'Array.reduceRight()' Apache Tomcat - Account Scanner / 'PUT' Request Remote Exploit Apache Tomcat - Account Scanner / 'PUT' Request Remote McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 - ActiveX 'GetObject()' Exploit McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 - ActiveX 'GetObject()' Berkeley Sendmail 5.58 - Debug Exploit Berkeley Sendmail 5.58 - Debug SunView (SunOS 4.1.1) - selection_svc Exploit SunOS 4.1.3 - LD_LIBRARY_PATH / LD_OPTIONS Exploit SunView (SunOS 4.1.1) - 'selection_svc' Remote File Read SunOS 4.1.3 - LD_LIBRARY_PATH / LD_OPTIONS IRIX 6.4 - 'pfdisplay.cgi' Exploit IRIX 6.4 - 'pfdisplay.cgi' Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Exploit (1) WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Exploit (2) Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Buffer Overflow (1) WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Buffer Overflow (2) HP JetAdmin 1.0.9 Rev. D - symlink Exploit HP JetAdmin 1.0.9 Rev. D - symlink XM Easy Personal FTP Server 5.30 - Remote Format String Write4 Exploit XM Easy Personal FTP Server 5.30 - Remote Format String Write4 Western Digital's WD TV Live SMP/Hub - Root Exploit Western Digital's WD TV Live SMP/Hub - Privilege Escalation Debian 2.1 - httpd Exploit Debian 2.1 - httpd SGI IRIX 6.2 - cgi-bin wrap Exploit SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Exploit SGI IRIX 6.4 - cgi-bin handler Exploit SGI IRIX 6.5.2 - 'nsd'' Exploit SGI IRIX 6.2 - cgi-bin wrap SGI IRIX 6.3 - cgi-bin 'webdist.cgi' SGI IRIX 6.4 - cgi-bin handler SGI IRIX 6.5.2 - 'nsd' Information Gathering IBM AIX 3.2.5 - 'login(1)' Exploit IBM AIX 3.2.5 - 'login(1)' Privilege Escalation Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS Exploit (1) Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS (1) Microsoft Windows 98a/98b/98SE / Solaris 2.6 - IRDP Exploit Microsoft Windows 98a/98b/98SE / Solaris 2.6 - IRDP ProFTPd 1.2 pre6 - 'snprintf' Remote Root Exploit ProFTPd 1.2 pre6 - 'snprintf' Remote Root Microsoft Internet Explorer 5.0/4.0.1 - iFrame Exploit Microsoft Internet Explorer 5.0/4.0.1 - iFrame PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog Exploit Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 Exploit (1) Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 Exploit (2) PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (1) Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2) AN-HTTPd 1.2b - CGI Exploits AN-HTTPd 1.2b - CGI s Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Exploit Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure RedHat 6.1 / IRIX 6.5.18 - 'lpd' Exploit RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution A-V Tronics InetServ 3.0 - WebMail GET Exploit A-V Tronics InetServ 3.0 - WebMail GET Cat Soft Serv-U FTP Server 2.5/a/b (Windows 95/98/2000/NT 4.0) - Shortcut Exploit Cat Soft Serv-U FTP Server 2.5/a/b (Windows 95/98/2000/NT 4.0) - Shortcut SGI InfoSearch 1.0 / SGI IRIX 6.5.x - fname Exploit SGI InfoSearch 1.0 / SGI IRIX 6.5.x - fname Cisco IOS 11.x/12.x - HTTP %% Exploit Cisco IOS 11.x/12.x - HTTP %% Netscape Professional Services FTP Server (LDAP Aware) 1.3.6 - FTP Server Exploit Netscape Professional Services FTP Server (LDAP Aware) 1.3.6 - FTP Server NCSA httpd-campas 1.2 - sample script Exploit NCSA httpd-campas 1.2 - sample script Microsoft Internet Explorer 5.5 - 'Index.dat' Exploit (MS00-055) Microsoft Internet Explorer 5.5 - 'Index.dat' (MS00-055) Novell NetWare Web Server 2.x - convert.bas Exploit Novell NetWare Web Server 2.x - convert.bas Microsoft Internet Explorer 5 - 'INPUT TYPE=FILE' Exploit Microsoft Internet Explorer 5 - 'INPUT TYPE=FILE' Novell Netware Web Server 3.x - files.pl Exploit Novell Netware Web Server 3.x - files.pl SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon Exploit SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon Sitecom MD-25x - Multiple Vulnerabilities / Reverse Root Exploit Sitecom MD-25x - Multiple Vulnerabilities Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuck.c' Remote Exploit Apache mod_ssl OpenSSL < 0.9.6d / < 0.9.7-beta2 - 'openssl-too-open.c' SSL2 KEY_ARG Overflow Exploit Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuck.c' Remote Buffer Overflow Apache mod_ssl OpenSSL < 0.9.6d / < 0.9.7-beta2 - 'openssl-too-open.c' SSL2 KEY_ARG Overflow BigAnt Server 2.52 SP5 - Stack Overflow ROP-Based Exploit (SEH) (ASLR + DEP Bypass) BigAnt Server 2.52 SP5 - Stack Overflow ROP-Based (SEH) (ASLR + DEP Bypass) IBM System Director Agent - Remote System Level Exploit IBM System Director Agent - Remote System Level MySQL - 'Stuxnet Technique' Windows Remote System Exploit MySQL - 'Stuxnet Technique' Windows Remote System Microsoft Internet Explorer 5 - window.open Search Pane Cross-Zone Scripting ActFax 5.01 - RAW Server Exploit (Metasploit) ActFax 5.01 - RAW Server (Metasploit) Mitsubishi MX ActiveX Component 3 - 'ActUWzd.dll' 'WzTitle' Remote Exploit Mitsubishi MX ActiveX Component 3 - 'ActUWzd.dll' 'WzTitle' Remote Adobe ColdFusion APSB13-03 - Remote Exploit (Metasploit) Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit) Plesk < 9.5.4 - Remote Exploit Plesk < 9.5.4 - Remote PCMan FTP Server 2.0.7 - Remote Exploit (Metasploit) PCMan FTP Server 2.0.7 - Remote (Metasploit) (Gabriel's FTP Server) Open & Compact FTP Server 1.2 - Authentication Bypass / Directory Traversal SAM Retrieval Exploit (Gabriel's FTP Server) Open & Compact FTP Server 1.2 - Authentication Bypass / Directory Traversal SAM Retrieval PHP 4.x - 'copy() Safe_Mode' Bypass Exploit PHP 4.x - 'copy() Safe_Mode' Bypass Microsoft PowerPoint 2003 - 'powerpnt.exe' Exploit Microsoft PowerPoint 2003 - 'powerpnt.exe' Microsoft Internet Explorer 6 - Code Execution (1) Microsoft Internet Explorer 6 - Code Execution (2) Microsoft Internet Explorer 6 - Code Execution (1) Microsoft Internet Explorer 6 - Code Execution (2) Nginx 1.4.0 (Generic Linux x64) - Remote Exploit Nginx 1.4.0 (Generic Linux x64) - Remote PHP 5.2.5 - cURL 'safe_mode' Security Bypass Exploit PHP 5.2.5 - cURL 'safe_mode' Security Bypass Oracle Forms and Reports 11.1 - Remote Exploit Oracle Forms and Reports 11.1 - Arbitrary Code Execution Novell eDirectory 8.x - eMBox Utility 'edirutil' Command Exploit Novell eDirectory 8.x - eMBox Utility 'edirutil' Command OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak Exploit (1) OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak Exploit (2) (DTLS Support) OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support) Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow Exploit Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow SugarCRM 6.5.23 - REST PHP Object Injection Exploit (Metasploit) SugarCRM 6.5.23 - REST PHP Object Injection (Metasploit) NovaSTOR NovaNET 12.0 - Remote SYSTEM Exploit NovaSTOR NovaNET 12.0 - Remote SYSTEM Kolibri Web Server 2.0 - GET Exploit (SEH) Kolibri Web Server 2.0 - GET (SEH) GNU bash 4.3.11 - Environment Variable dhclient Exploit GNU bash 4.3.11 - Environment Variable dhclient Eclipse 3.6.1 - Help Server help/index.jsp URI Cross-Site Scripting Eclipse 3.6.1 - Help Server help/advanced/content.jsp URI Cross-Site Scripting Eclipse 3.6.1 - Help Server 'help/index.jsp' Cross-Site Scripting Eclipse 3.6.1 - Help Server 'help/advanced/content.jsp' Cross-Site Scripting Microsoft Windows - OLE Remote Code Execution 'Sandworm' Exploit (MS14-060) Microsoft Windows - OLE Remote Code Execution 'Sandworm' (MS14-060) tnftp (FreeBSD 8/9/10) - 'tnftp' Client Eide Exploit tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side VSAT Sailor 900 - Remote Exploit VSAT Sailor 900 - Remote Bsplayer 2.68 - HTTP Response Universal Exploit Bsplayer 2.68 - HTTP Response Universal MS SQL Server 2000/2005 - SQLNS.SQLNamespace COM Object Refresh() Unhandled Pointer Exploit MS SQL Server 2000/2005 - SQLNS.SQLNamespace COM Object Refresh() Unhandled Pointer Microsoft Windows Media Center - MCL Exploit (MS15-100) (Metasploit) Microsoft Windows Media Center - MCL (MS15-100) (Metasploit) Adobe Flash - Object.unwatch Use-After-Free Exploit Adobe Flash - Object.unwatch Use-After-Free Google Android 5.0.1 - Metaphor Stagefright Exploit (ASLR Bypass) Google Android 5.0.1 - Metaphor Stagefright (ASLR Bypass) TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote Exploit TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote D-Link DIR Routers - Unauthenticated HNAP Login Stack Buffer Overflow (Metasploit) D-Link DIR-Series Routers - Unauthenticated HNAP Login Stack Buffer Overflow (Metasploit) DC/OS Marathon UI - Docker Exploit (Metasploit) DC/OS Marathon UI - Docker (Metasploit) CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Exploit CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote phpBB 2.0.6 - 'search_id' SQL Injection MD5 Hash Remote Exploit PHP-Nuke 6.9 - 'cid' SQL Injection Remote Exploit phpBB 2.0.6 - 'search_id' SQL Injection MD5 Hash Remote PHP-Nuke 6.9 - 'cid' SQL Injection Remote UBBCentral UBB.Threads 6.2.x < 6.3x - One Char Brute Force Exploit UBBCentral UBB.Threads 6.2.x < 6.3x - One Char Brute Force phpBB 1.0.0/2.0.10 - 'admin_cash.php' Remote Exploit PHP 4.3.9 + phpBB 2.x - 'Unserialize()' Remote Exploit phpBB 1.0.0/2.0.10 - 'admin_cash.php' Remote Code Execution PHP 4.3.9 + phpBB 2.x - 'Unserialize()' Remote phpMyChat 0.14.5 - Remote Improper File Permissions Exploit e107 - 'include()' Remote Exploit phpMyChat 0.14.5 - Remote Improper File Permissions e107 - 'include()' Remote Siteman 1.1.10 - Remote Administrative Account Addition Exploit Siteman 1.1.10 - Remote Administrative Account Addition PostNuke PostWrap Module - Remote Exploit PHP-Nuke 7.4 - Admin Exploit PostNuke PostWrap Module - Remote PHP-Nuke 7.4 - Admin AWStats 5.7 < 6.2 - Multiple Remote Exploits (PoC) AWStats 5.7 < 6.2 - Multiple Remote Exploits AWStats 5.7 < 6.2 - Multiple Remote s (PoC) AWStats 5.7 < 6.2 - Multiple Remote s Aztek Forum 4.0 - 'myadmin.php' Database Dumper Exploit Aztek Forum 4.0 - 'myadmin.php' Database Dumper phpBB 2.0.13 - 'downloads.php' mod Remote Exploit phpBB 2.0.13 - 'Calendar Pro' mod Remote Exploit phpBB 2.0.13 - 'downloads.php' mod Remote phpBB 2.0.13 - 'Calendar Pro' mod Remote PhotoPost - Arbitrary Data Remote Exploit PhotoPost - Arbitrary Data Remote ZeroBoard 4.1 - preg_replace Remote nobody Shell Exploit ZeroBoard 4.1 - 'preg_replace' Remote Nobody Shell eXtropia Shopping Cart - 'web_store.cgi' Remote Exploit Mambo 4.5.2.1 - Fetch Password Hash Remote Exploit PHP Arena 1.1.3 - 'pafiledb.php' Remote Change Password Exploit eXtropia Shopping Cart - 'web_store.cgi' Remote Mambo 4.5.2.1 - Fetch Password Hash Remote PHP Arena 1.1.3 - 'pafiledb.php' Remote Change Password PHP-Fusion 6.00.105 - Accessible Database Backups Download Exploit PHP-Fusion 6.00.105 - Accessible Database Backups Download phpBB 2.0.15 - 'highlight' Database Authentication Details Exploit phpBB 2.0.15 - 'highlight' Database Authentication Details Hosting Controller 6.1 HotFix 2.2 - Add Domain without Quota Exploit Hosting Controller 6.1 HotFix 2.2 - Add Domain without Quota Simple PHP Blog 0.4.0 - Multiple Remote Exploits Simple PHP Blog 0.4.0 - Multiple Remote s MuOnline Loopholes Web Server - 'pkok.asp' SQL Injection Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution Exploit Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution SimpleBBS 1.1 - Remote Commands Execution Exploit SimpleBBS 1.1 - Remote Commands Execution SimpleBBS 1.1 - Remote Commands Execution Exploit (C) SimpleBBS 1.1 - Remote Commands Execution (C) Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Overwrite Remote Exploit Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Overwrite Remote phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command Exploit phpDocumentor 1.3.0 rc4 - Remote Commands Execution Exploit phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command phpDocumentor 1.3.0 rc4 - Remote Commands Execution Magic News Plus 1.0.3 - Admin Pass Change Exploit Magic News Plus 1.0.3 - Admin Pass Change creLoaded 6.15 - 'HTMLAREA' Automated Perl Exploit creLoaded 6.15 - 'HTMLAREA' Automated Perl CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution Exploit SPIP 1.8.2g - Remote Commands Execution Exploit CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution SPIP 1.8.2g - Remote Commands Execution DocMGR 0.54.2 - 'file_exists' Remote Commands Execution Exploit DocMGR 0.54.2 - 'file_exists' Remote Commands Execution EnterpriseGS 1.0 rc4 - Remote Commands Execution Exploit FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution Exploit EnterpriseGS 1.0 rc4 - Remote Commands Execution FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution Exploit PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution Coppermine Photo Gallery 1.4.3 - Remote Commands Execution Exploit Coppermine Photo Gallery 1.4.3 - Remote Commands Execution GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution Exploit GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution VHCS 2.4.7.1 - Add User Authentication Bypass Pentacle In-Out Board 6.03 - 'login.asp' Remote Authentication Bypass Farsinews 2.5 - Directory Traversal Arbitrary 'users.db' Access Exploit Farsinews 2.5 - Directory Traversal Arbitrary 'users.db' Access PHP-Stats 0.1.9.1 - Remote Commands Execution Exploit PHP-Stats 0.1.9.1 - Remote Commands Execution Gallery 2.0.3 - stepOrder[] Remote Commands Execution Exploit Gallery 2.0.3 - stepOrder[] Remote Commands Execution JiRos Banner Experience 1.0 - Create Authentication Bypass Remote Exploit JiRos Banner Experience 1.0 - Create Authentication Bypass Remote Simplog 0.9.2 - 's' Remote Commands Execution Exploit Simplog 0.9.2 - 's' Remote Commands Execution phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution Exploit phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution FlexBB 0.5.5 - '/inc/start.php?_COOKIE' SQL Bypass Exploit FlexBB 0.5.5 - '/inc/start.php?_COOKIE' SQL Bypass phpBB 2.0.20 - Admin/Restore DB/default_lang Remote Exploit Sugar Suite Open Source 4.2 - 'OptimisticLock' Remote Exploit phpBB 2.0.20 - Admin/Restore DB/default_lang Remote Sugar Suite Open Source 4.2 - 'OptimisticLock' Remote DeluxeBB 1.06 - 'Attachment mod_mime' Remote Exploit DeluxeBB 1.06 - 'Attachment mod_mime' Remote XOOPS 2.0.13.2 - 'xoopsOption[nocommon]' Remote Exploit XOOPS 2.0.13.2 - 'xoopsOption[nocommon]' Remote Command Execution Drupal 4.7 - 'Attachment mod_mime' Remote Exploit Drupal 4.7 - 'Attachment mod_mime' Remote EggBlog < 3.07 - Remote SQL Injection / Privilege Escalation Speedy ASP Forum - 'profileupdate.asp' User Pass Change Exploit Nukedit 4.9.6 - Unauthorized Admin Add Speedy ASP Forum - 'profileupdate.asp' User Pass Change Nukedit 4.9.6 - Unauthorized Admin Add aspWebLinks 2.0 - SQL Injection / Admin Pass Change Exploit aspWebLinks 2.0 - SQL Injection / Admin Pass Change FunkBoard CF0.71 - 'profile.php' Remote User Pass Change Exploit FunkBoard CF0.71 - 'profile.php' Remote User Pass Change myNewsletter 1.1.2 - 'adminLogin.asp' Authentication Bypass Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime Exploit Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime MyBulletinBoard (MyBB) 1.1.3 - 'usercp.php' Create Admin Exploit MyBulletinBoard (MyBB) 1.1.3 - 'usercp.php' Create Admin Phorum 5 - 'pm.php' Arbitrary Local Inclusion Exploit Phorum 5 - 'pm.php' Arbitrary Local Inclusion TinyPHP Forum 3.6 - 'makeAdmin' Remote Admin Maker Exploit TinyPHP Forum 3.6 - 'makeAdmin' Remote Admin Maker WEBInsta MM 1.3e - 'absolute_path' Remote File Inclusion Joomla! Component Poll 1.0.10 - Arbitrary Add Votes Exploit Joomla! Component Poll 1.0.10 - Arbitrary Add Votes Simple Machines Forum (SMF) 1.1 rc2 (Windows) - 'lngfile' Remote Exploit Simple Machines Forum (SMF) 1.1 rc2 (Windows) - 'lngfile' Remote Simple Machines Forum (SMF) 1.1 rc2 - Lock Topics Remote Exploit Simple Machines Forum (SMF) 1.1 rc2 - Lock Topics Remote PmWiki 2.1.19 - 'Zend_Hash_Del_Key_Or_Index' Remote Exploit PmWiki 2.1.19 - 'Zend_Hash_Del_Key_Or_Index' Remote TR Forum 2.0 - SQL Injection / Bypass Security Restriction Exploit TR Forum 2.0 - SQL Injection / Bypass Security Restriction phpBB 2.0.21 - Poison Null Byte Remote Exploit phpBB 2.0.21 - Poison Null Byte Remote Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin Exploit Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users Exploit Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users Active Bulletin Board 1.1b2 - Remote User Pass Change Exploit Active Bulletin Board 1.1b2 - Remote User Pass Change JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface Exploit JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface PHP League 0.81 - 'config.php' Remote File Inclusion MiraksGalerie 2.62 - 'pcltar.lib.php' Remote File Inclusion E Annu 1.0 - Authentication Bypass / SQL Injection Invision Power Board 2.1.7 - 'Debug' Remote Password Change Exploit Invision Power Board 2.1.7 - 'Debug' Remote Password Change iPrimal Forums - '/admin/index.php' Change User Password Exploit iPrimal Forums - '/admin/index.php' Change User Password Online Event Registration 2.0 - 'save_profile.asp' Pass Change Exploit Online Event Registration 2.0 - 'save_profile.asp' Pass Change Bandwebsite 1.5 - 'LOGIN' Remote Add Admin Enthrallweb eClassifieds 1.0 - Remote User Pass Change Exploit Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change Exploit Enthrallweb eNews 1.0 - Remote User Pass Change Exploit Enthrallweb eClassifieds 1.0 - Remote User Pass Change Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change Enthrallweb eNews 1.0 - Remote User Pass Change Fishyshoop 0.930b - Remote Add Administrator Account Exploit Fishyshoop 0.930b - Remote Add Administrator Account Cahier de texte 2.2 - Bypass General Access Protection Exploit Cahier de texte 2.2 - Bypass General Access Protection Cacti 0.8.6i - 'copy_cacti_user.php' SQL Injection Create Admin Exploit Cacti 0.8.6i - 'copy_cacti_user.php' SQL Injection Create Admin IMGallery 2.5 - Create Uploader Script Exploit IMGallery 2.5 - Create Uploader Script TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator Exploit TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion GuppY 4.5.16 - Remote Commands Execution Exploit GuppY 4.5.16 - Remote Commands Execution Extcalendar 2 - 'profile.php' Remote User Pass Change Exploit Extcalendar 2 - 'profile.php' Remote User Pass Change Advanced Poll 2.0.5-dev - Remote Admin Session Generator Exploit Advanced Poll 2.0.5-dev - Remote Admin Session Generator Site-Assistant 0990 - 'paths[version]' Remote File Inclusion AT Contenator 1.0 - 'Root_To_Script' Remote File Inclusion VS-News-System 1.2.1 - 'newsordner' Remote File Inclusion VS-Link-Partner 2.1 - 'script_pfad' Remote File Inclusion VS-News-System 1.2.1 - 'newsordner' Remote File Inclusion VS-Link-Partner 2.1 - 'script_pfad' Remote File Inclusion S-Gastebuch 1.5.3 - 'gb_pfad' Remote File Inclusion AJ Dating 1.0 - 'view_profile.php' SQL Injection AJ Classifieds 1.0 - 'postingdetails.php' SQL Injection AJ Dating 1.0 - 'view_profile.php' SQL Injection AJ Classifieds 1.0 - 'postingdetails.php' SQL Injection JobSitePro 1.0 - 'search.php' SQL Injection JGBBS 3.0beta1 - 'search.asp?author' SQL Injection WSN Guest 1.21 - 'id' SQL Injection Dayfox Blog 4 - 'postpost.php' Remote Code Execution Orion-Blog 2.0 - Remote Authentication Bypass WSN Guest 1.21 - 'id' SQL Injection Dayfox Blog 4 - 'postpost.php' Remote Code Execution Orion-Blog 2.0 - Remote Authentication Bypass Particle Blogger 1.2.0 - 'post.php?postid' SQL Injection PHP-Stats 0.1.9.1b - 'PHP-stats-options.php' Admin 2 'exec()' Exploit PHP-Stats 0.1.9.1b - 'PHP-stats-options.php' Admin 2 'exec()' Guestbara 1.2 - Change Admin Login and Password Exploit Guestbara 1.2 - Change Admin Login and Password Active NewsLetter 4.3 - 'ViewNewspapers.asp' SQL Injection eWebquiz 8 - 'eWebQuiz.asp' SQL Injection PBlang 4.66z - Remote Create Admin Exploit PBlang 4.66z - Remote Create Admin IceBB 1.0-rc5 - Remote Create Admin Exploit IceBB 1.0-rc5 - Remote Create Admin Joomla! Component D4JeZine 2.8 - Blind SQL Injection Web Content System 2.7.1 - Remote File Inclusion XOOPS Module Lykos Reviews 1.00 - 'index.php' SQL Injection WinMail Server 4.4 build 1124 - 'WebMail' Remote Add Super User Exploit WinMail Server 4.4 build 1124 - 'WebMail' Remote Add Super User XOOPS Module debaser 0.92 - 'genre.php' Blind SQL Injection XOOPS Module RM+Soft Gallery 1.0 - Blind SQL Injection XOOPS Module XFsection 1.07 - 'articleId' Blind SQL Injection XOOPS Module PopnupBlog 2.52 - 'postid' Blind SQL Injection phpMyNewsletter 0.6.10 - 'customize.php' Remote File Inclusion XOOPS Module WF-Snippets 1.02 (c) - Blind SQL Injection Mutant 0.9.2 - 'mutant_functions.php' Remote File Inclusion XOOPS Module WF-Snippets 1.02 (c) - Blind SQL Injection Mutant 0.9.2 - 'mutant_functions.php' Remote File Inclusion CodeBreak 1.1.2 - 'codebreak.php' Remote File Inclusion e107 0.7.8 - 'mailout.php' Authenticated Access Escalation Exploit e107 0.7.8 - 'mailout.php' Authenticated Access Escalation AimStats 3.2 - 'process.php?update' Remote Code Execution wavewoo 0.1.1 - 'loading.php?path_include' Remote File Inclusion The Merchant 2.2.0 - 'index.php?show' Remote File Inclusion phpMyPortal 3.0.0 RC3 - GLOBALS[CHEMINMODULES] Remote File Inclusion Snaps! Gallery 1.4.4 - Remote User Pass Change Exploit Snaps! Gallery 1.4.4 - Remote User Pass Change PHP FirstPost 0.1 - 'block.php?Include' Remote File Inclusion XOOPS Module resmanager 1.21 - Blind SQL Injection Alstrasoft e-Friends 4.21 - Admin Session Retrieve Exploit Alstrasoft Live Support 1.21 - Admin Credential Retrieve Exploit Alstrasoft e-Friends 4.21 - Admin Session Retrieve Alstrasoft Live Support 1.21 - Admin Credential Retrieve WordPress 2.1.3 - 'admin-ajax.php' SQL Injection Blind Fishing Exploit WordPress 2.1.3 - 'admin-ajax.php' SQL Injection Blind Fishing RevokeBB 1.0 RC4 - Blind SQL Injection / Hash Retrieve Exploit XOOPS Module icontent 1.0/4.5 - Remote File Inclusion RevokeBB 1.0 RC4 - Blind SQL Injection / Hash Retrieve XOOPS Module icontent 1.0/4.5 - Remote File Inclusion NewsSync for phpBB 1.5.0rc6 - Remote File Inclusion PHP Real Estate Classifieds - Remote File Inclusion Solar Empire 2.9.1.1 - Blind SQL Injection / Hash Retrieve Exploit Solar Empire 2.9.1.1 - Blind SQL Injection / Hash Retrieve AV Tutorial Script 1.0 - Remote User Pass Change Exploit AV Tutorial Script 1.0 - Remote User Pass Change Vivvo CMS 3.4 - 'index.php' Blind SQL Injection JBlog 1.0 - Create / Delete Admin Authentication Bypass Fuzzylime CMS 3.0 - Local File Inclusion Flip 3.0 - Remote Admin Creation Exploit Flip 3.0 - Remote Admin Creation Drupal 5.2 - PHP Zend Hash Exploitation Vector Drupal 5.2 - PHP Zend Hash ation Vector PHP-AGTC Membership System 1.1a - Remote Add Admin IceBB 1.0-rc6 - Remote Database Authentication Details Exploit IceBB 1.0-rc6 - Remote Database Authentication Details Ucms 1.8 - Backdoor Remote Command Execution Snitz Forums 2000 - 'Active.asp' SQL Injection MonAlbum 0.87 - Arbitrary File Upload / Password Grabber Exploit MonAlbum 0.87 - Arbitrary File Upload / Password Grabber FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber Exploit FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber CuteNews 1.4.5 - Admin Password md5 Hash Fetching Exploit CuteNews 1.4.5 - Admin Password md5 Hash Fetching WebPortal CMS 0.6-beta - Remote Password Change Exploit WebPortal CMS 0.6-beta - Remote Password Change ClipShare 2.6 - Remote User Password Change Exploit ClipShare 2.6 - Remote User Password Change NetRisk 1.9.7 - Remote Password Change Exploit NetRisk 1.9.7 - Remote Password Change DomPHP 0.81 - Remote Add Administrator Exploit DomPHP 0.81 - Remote Add Administrator Evilsentinel 1.0.9 - Multiple Vulnerabilities Disable Exploit Evilsentinel 1.0.9 - Multiple Vulnerabilities Disable DigitalHive 2.0 RC2 - 'user_id' SQL Injection MoinMoin 1.5.x - 'MOIND_ID' Cookie Bug Remote Exploit MoinMoin 1.5.x - 'MOIND_ID' Cookie Bug Remote sCssBoard (Multiple Versions) - 'pwnpack' Remote Exploits sCssBoard (Multiple Versions) - 'pwnpack' Remote s PunBB 1.2.16 - Blind Password Recovery Exploit MultiCart 2.0 - 'productdetails.php' SQL Injection PunBB 1.2.16 - Blind Password Recovery MultiCart 2.0 - 'productdetails.php' SQL Injection QuickTalk Forum 1.6 - Blind SQL Injection Destar 0.2.2-5 - Arbitrary Add New User Exploit Destar 0.2.2-5 - Arbitrary Add New User phpBB Addon Fishing Cat Portal - Remote File Inclusion LightNEasy 1.2 - no database Remote Hash Retrieve Exploit LightNEasy 1.2 - no database Remote Hash Retrieve Joomla! Component JoomlaXplorer 1.6.2 - Remote Exploits Joomla! Component JoomlaXplorer 1.6.2 - Remote s OpenInvoice 0.9 - Arbitrary Change User Password Exploit OpenInvoice 0.9 - Arbitrary Change User Password txtCMS 0.3 - 'index.php' Local File Inclusion Zomplog 3.8.2 - 'newuser.php' Arbitrary Add Admin MeltingIce File System 1.0 - Arbitrary Add User Exploit MeltingIce File System 1.0 - Arbitrary Add User CMSimple 3.1 - Local File Inclusion / Arbitrary File Upload Telephone Directory 2008 - Arbitrary Delete Contact Exploit Telephone Directory 2008 - Arbitrary Delete Contact AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete Exploit AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete Scripteen Free Image Hosting Script 1.2 - 'cookie' Pass Grabber Exploit Scripteen Free Image Hosting Script 1.2 - 'cookie' Pass Grabber WordPress Plugin Download Manager 0.2 - Arbitrary File Upload IceBB 1.0-RC9.2 - Blind SQL Injection / Session Hijacking Exploit IceBB 1.0-RC9.2 - Blind SQL Injection / Session Hijacking moziloCMS 1.10.1 - 'download.php' Arbitrary Download File Exploit moziloCMS 1.10.1 - 'download.php' Arbitrary Download File LoveCMS 1.6.2 Final - Update Settings Remote Exploit LoveCMS 1.6.2 Final - Update Settings Remote Simple Machines Forum (SMF) 1.1.5 (Windows x86) - Admin Reset Password Exploit MemHT Portal 3.9.0 - Remote Create Shell Exploit Simple Machines Forum (SMF) 1.1.5 (Windows x86) - Admin Reset Password MemHT Portal 3.9.0 - Remote Create Shell WordPress 2.6.1 - SQL Column Truncation Admin Takeover Exploit WordPress 2.6.1 - SQL Column Truncation Admin Takeover phsBlog 0.2 - Bypass SQL Injection Filtering Exploit phsBlog 0.2 - Bypass SQL Injection Filtering Sports Clubs Web Panel 0.0.1 - Remote Game Delete Exploit Sports Clubs Web Panel 0.0.1 - Remote Game Delete Pluck CMS 4.5.3 - 'update.php' Remote File Corruption Exploit Pluck CMS 4.5.3 - 'update.php' Remote File Corruption Kusaba 1.0.4 - Remote Code Execution (2) Globsy 1.0 - Remote File Rewriting Exploit Globsy 1.0 - Remote File Rewriting LokiCMS 0.3.4 - 'index.php' Arbitrary Check File Exploit LokiCMS 0.3.4 - 'index.php' Arbitrary Check File Micro CMS 0.3.5 - Remote Add/Delete/Password Change Exploit Micro CMS 0.3.5 - Remote Add/Delete/Password Change FREEze Greetings 1.0 - Remote Password Retrieve Exploit FREEze Greetings 1.0 - Remote Password Retrieve wPortfolio 0.3 - Admin Password Changing Exploit wPortfolio 0.3 - Admin Password Changing vBulletin 3.7.3 - Visitor Message Cross-Site Request Forgery / Worm Exploit vBulletin 3.7.3 - Visitor Message Cross-Site Request Forgery / Worm Discuz! - Remote Reset User Password Exploit Discuz! - Remote Reset User Password All Club CMS 0.0.2 - Remote Database Configuration Retrieve Exploit All Club CMS 0.0.2 - Remote Database Configuration Retrieve OpenForum 0.66 Beta - Remote Reset Admin Password Exploit OpenForum 0.66 Beta - Remote Reset Admin Password IPNPro3 < 1.44 - Admin Password Changing Exploit DL PayCart 1.34 - Admin Password Changing Exploit Bonza Cart 1.10 - Admin Password Changing Exploit IPNPro3 < 1.44 - Admin Password Changing DL PayCart 1.34 - Admin Password Changing Bonza Cart 1.10 - Admin Password Changing Wysi Wiki Wyg 1.0 - Remote Password Retrieve Exploit Wysi Wiki Wyg 1.0 - Remote Password Retrieve Flatnux - html/JavaScript Injection Cookie Grabber Exploit Flatnux - html/JavaScript Injection Cookie Grabber BabbleBoard 1.1.6 - Cross-Site Request Forgery/Cookie Grabber Exploit BabbleBoard 1.1.6 - Cross-Site Request Forgery/Cookie Grabber Comersus Shopping Cart 6.0 - Remote User Pass Exploit Comersus Shopping Cart 6.0 - Remote User Pass Fhimage 1.2.1 - Remote Index Change Exploit Fhimage 1.2.1 - Remote Index Change Max.Blog 1.0.6 - Arbitrary Delete Post Exploit Max.Blog 1.0.6 - Arbitrary Delete Post OpenFiler 2.3 - (Authentication Bypass) Remote Password Change Exploit OpenFiler 2.3 - (Authentication Bypass) Remote Password Change txtBB 1.0 RC3 - HTML/JS Injection / Arbitrary Add Admin Privileges MemHT Portal 4.0.1 - Delete All Private Messages Exploit MemHT Portal 4.0.1 - Delete All Private Messages Traidnt up 2.0 - 'cookie' Add Extension Bypass Exploit Traidnt up 2.0 - 'cookie' Add Extension Bypass Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass Exploit) Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass ) eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password Exploit eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password TotalCalendar 2.4 - Remote Password Change Exploit TotalCalendar 2.4 - Remote Password Change Absolute Form Processor XE-V 1.5 - Remote Change Password Exploit Absolute Form Processor XE-V 1.5 - Remote Change Password Teraway LinkTracker 1.0 - Remote Password Change Exploit Teraway LinkTracker 1.0 - Remote Password Change VisionLms 1.0 - 'changePW.php' Remote Password Change Exploit VisionLms 1.0 - 'changePW.php' Remote Password Change MiniTwitter 0.2b - Remote User Options Changer Exploit MiniTwitter 0.2b - Remote User Options Changer Simple Customer 1.3 - Arbitrary Change Admin Password Job Script 2.0 - Arbitrary Change Admin Password Simple Customer 1.3 - Arbitrary Change Admin Password Job Script 2.0 - Arbitrary Change Admin Password MaxCMS 2.0 - 'm_username' Arbitrary Create Admin Exploit MaxCMS 2.0 - 'm_username' Arbitrary Create Admin 2DayBiz Template Monster Clone - 'edituser.php' Change Pass Exploit 2DayBiz Template Monster Clone - 'edituser.php' Change Pass PHP Article Publisher - Remote Change Admin Password Coppermine Photo Gallery 1.4.22 - Remote Exploit Coppermine Photo Gallery 1.4.22 - Remote Joomla! Component Casino 0.3.1 - Multiple SQL Injections Exploits Joomla! Component Casino 0.3.1 - Multiple SQL Injections s ZaoCMS - 'user_updated.php' Remote Change Password Exploit ZaoCMS - 'user_updated.php' Remote Change Password Mole Group Sky Hunter/Bus Ticket Scripts - Change Admin Password Ultimate Media Script 2.0 - Remote Change Content Gallarific - 'user.php' Arbirary Change Admin Information Exploit Ultimate Media Script 2.0 - Remote Change Content Gallarific - 'user.php' Arbirary Change Admin Information ShaadiClone 2.0 - 'addAdminmembercode.php' Arbitrary Add Admin ZeeCareers 2.0 - 'addAdminmembercode.php' Arbitrary Add Admin Online Grades & Attendance 3.2.6 - Credentials Changer SQL Exploit Online Grades & Attendance 3.2.6 - Credentials Changer SQL Web Directory PRO - 'Admins.php' Change Admin Password Host Directory PRO 2.1.0 - Remote Change Admin Password Grestul 1.2 - Remote Add Administrator Account Exploit Grestul 1.2 - Remote Add Administrator Account Evernew Free Joke Script 1.2 - Remote Change Password Exploit Evernew Free Joke Script 1.2 - Remote Change Password phpMyAdmin - pmaPWN! Code Injection Remote Code Execution Scanner & Exploit Tool phpMyAdmin - 'pmaPWN!' Code Injection / Remote Code Execution Messages Library 2.0 - Arbitrary Administrator Account Infinity 2.0.5 - Arbitrary Create Admin Exploit Infinity 2.0.5 - Arbitrary Create Admin webLeague 2.2.0 - 'install.php' Remote Change Password Exploit webLeague 2.2.0 - 'install.php' Remote Change Password JBLOG 1.5.1 - SQL Table Backup Exploit JBLOG 1.5.1 - SQL Table Backup Barracuda IMFirewall 620 - Exploit Barracuda IMFirewall 620 - Barracuda Web Firewall 660 Firmware 7.3.1.007 - Exploit Barracuda Web Firewall 660 Firmware 7.3.1.007 - XP Book 3.0 - login Admin Exploit XP Book 3.0 - login Admin Jax Guestbook 3.50 - Admin Login Exploit Jax Guestbook 3.50 - Admin Login ImageVue 2.0 - Remote Admin Login Exploit ImageVue 2.0 - Remote Admin Login SoftCab Sound Converter - 'sndConverter.ocx' ActiveX Insecure Method Exploit SoftCab Sound Converter - 'sndConverter.ocx' ActiveX Insecure Method Jevonweb Guestbook - Remote Admin Access Exploit Simple PHP Guestbook - Remote Admin Access Exploit Jevonweb Guestbook - Remote Admin Access Simple PHP Guestbook - Remote Admin Access PHPShop 0.6 - Bypass Exploit PHPShop 0.6 - Bypass Jax Calendar 1.34 - Remote Admin Access Exploit Jax Calendar 1.34 - Remote Admin Access al3jeb script - Remote Change Password Exploit al3jeb script - Remote Change Password Joomla! 1.5.12 - connect back Exploit Joomla! 1.5.12 - Connect Back Snif 1.5.2 - Any Filetype Download Exploit Snif 1.5.2 - Any Filetype Download bispage - Bypass Exploit bispage - Bypass Kolang 4.3.10 < 5.3.0 - 'proc_open()' PHP 'safe_mode' Bypass Exploit Kolang 4.3.10 < 5.3.0 - 'proc_open()' PHP 'safe_mode' Bypass Torrent Hoster - Remount Upload Exploit Torrent Hoster - Remount Upload Easy-Clanpage 2.2 - Multiple SQL Injections / Exploit Easy-Clanpage 2.2 - Multiple SQL Injections / PHP Jokesite 2.0 - exec Command Exploit PHP Jokesite 2.0 - exec Command Zyke CMS 1.1 - Bypass Exploit Zyke CMS 1.1 - Bypass Tochin eCommerce - Multiple Remote Exploits Tochin eCommerce - Multiple Remote s PHP-Nuke 8.2 - Arbitrary File Upload Exploit PHP-Nuke 8.2 - Arbitrary File Upload JCMS 2010 - File Download Exploit JCMS 2010 - File Download CakePHP 1.3.5/1.2.8 - 'Unserialize()' Exploit CakePHP 1.3.5/1.2.8 - 'Unserialize()' JBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 < 4.3.0.CP08 - Remote Exploit JBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 < 4.3.0.CP08 - Remote CakePHP 1.3.5/1.2.8 - Cache Corruption Exploit (Metasploit) CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit) N_CMS 1.1E - Unauthenticated Local File Inclusion / Remote Code Exploit N_CMS 1.1E - Unauthenticated Local File Inclusion / Remote Code iCMS 1.1 - Admin SQL Injection / Brute Force Exploit iCMS 1.1 - Admin SQL Injection / Brute Force WordPress Plugin Block-Spam-By-Math-Reloaded - Bypass Exploit WordPress Plugin Block-Spam-By-Math-Reloaded - Bypass COMTREND CT-5624 Router - Root/Support Password Disclosure/Change Exploit COMTREND CT-5624 Router - Root/Support Password Disclosure/Change Vonage VDV23 - Cross-Site Scripting TP-Link TL-WR740N - Cross-Site Scripting LanSweeper 6.0.100.75 - Cross-Site Scripting TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root Exploit TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root WordPress Plugin Akismet 2.1.3 - Exploit WordPress Plugin Akismet 2.1.3 - SonicWALL Gms 7.x - Filter Bypass / Persistent Exploit SonicWALL Gms 7.x - Filter Bypass / Persistent Google Gmail IOS Mobile Application - Persistent / Persistent Cross-Site Scripting Google Gmail IOS Mobile Application - Persistent Cross-Site Scripting Feetan Inc WireShare 1.9.1 iOS - Persistent Exploit Feetan Inc WireShare 1.9.1 iOS - Persistent Seagate BlackArmor NAS - Root Exploit Seagate BlackArmor NAS - Privilege Escalation Kemana Directory 1.5.6 - 'qvc_init()' Cookie Poisoning CAPTCHA Bypass Exploit Kemana Directory 1.5.6 - 'qvc_init()' Cookie Poisoning CAPTCHA Bypass Private Photo+Video 1.1 Pro iOS - Persistent Exploit Private Photo+Video 1.1 Pro iOS - Persistent Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent Exploit Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent Bonefire 0.7.1 - Reinstall Admin Account Exploit Bonefire 0.7.1 - Reinstall Admin Account Kingsoft Webshield 1.1.0.62 - Cross-Site Scripting / Remote Command Execution NETGEAR WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access Exploit NETGEAR WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access PHPads 213607 - Authentication Bypass / Password Change Exploit PHPads 213607 - Authentication Bypass / Password Change D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored Exploit Wlsecrefresh.wl & Wlsecurity.wl D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored Wlsecrefresh.wl & Wlsecurity.wl D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored Exploit DnsProxy.cmd D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored DnsProxy.cmd Seagate Central 2014.0410.0026-F - Remote Facebook Access Token Exploit Seagate Central 2014.0410.0026-F - Remote Facebook Access Token Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security Exploit Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security AirDroid iOS / Android / Win 3.1.3 - Persistent Exploit AirDroid iOS / Android / Win 3.1.3 - Persistent up.time 7.5.0 - Arbitrary File Disclose and Delete Exploit up.time 7.5.0 - Upload and Execute Exploit up.time 7.5.0 - Arbitrary File Disclose and Delete up.time 7.5.0 - Upload and Execute MantisBT 1.2.19 - Host Header Exploit MantisBT 1.2.19 - Host Header SMF (Simple Machine Forum) 2.0.10 - Remote Memory Exfiltration Exploit SMF (Simple Machine Forum) 2.0.10 - Remote Memory Exfiltration JSSE - SKIP-TLS Exploit JSSE - SKIP-TLS D-Link DIR Series Routers - '/model/__show_info.php' Local File Disclosure D-Link DIR-Series Routers - '/model/__show_info.php' Local File Disclosure iScripts AutoHoster - 'main_smtp.php' Traversal Exploit iScripts AutoHoster - 'main_smtp.php' Traversal OpenMRS 2.3 (1.11.4) - XML External Entity Processing Exploit OpenMRS 2.3 (1.11.4) - XML External Entity Processing IBM Lotus Domino R8 - Password Hash Extraction Exploit IBM Lotus Domino R8 - Password Hash Extraction Trend Micro - 'CoreServiceShell.exe' Multiple HTTP Exploits Trend Micro - 'CoreServiceShell.exe' Multiple HTTP s Dell OpenManage Server Administrator 8.3 - XML External Entity Exploit Dell OpenManage Server Administrator 8.3 - XML External Entity D-Link DIR8xx Routers - Leak Credentials D-Link DIR8xx Routers - Root Remote Code Execution D-Link DIR8xx Routers - Local Firmware Upload D-Link DIR-8xx Routers - Leak Credentials D-Link DIR-8xx Routers - Root Remote Code Execution D-Link DIR-8xx Routers - Local Firmware Upload TP-Link WR940N - Authenticated Remote Code Exploit TP-Link WR940N - Authenticated Remote Code Zeta Components Mail 1.8.1 - Remote Code Execution |
Renamed from platforms/php/webapps/8728.htm (Browse further)