![]() 24 new exploits NetAuctionHelp 4.1 - search.asp SQL Injection Apple Mac OSX 10.4.11 2007-008 - i386_set_ldt System Call Local Arbitrary Code Execution Microsoft Edge - Array.map Heap Overflow (MS16-119) Microsoft Jet Database Engine - '.MDB' File Parsing Remote Buffer Overflow Microsoft Edge - Array.join Info Leak (MS16-119) Windows DeviceApi CMApi PiCMOpenDeviceKey - Arbitrary Registry Key Write Privilege Escalation (MS16-124) Windows DeviceApi CMApi - PiCMOpenDeviceKey Arbitrary Registry Key Write Privilege Escalation (MS16-124) HikVision Security Systems - Activex Buffer Overflow Oracle Netbeans IDE 8.1 - Directory Traversal MiCasa VeraLite - Remote Code Execution Oracle BI Publisher 11.1.1.6.0 / 11.1.1.7.0 / 11.1.1.9.0 / 12.2.1.0.0 - XML External Entity Injection Classifieds Rental Script - SQL Injection SAP NetWeaver KERNEL 7.0 < 7.5 - Denial of Service SAP Adaptive Server Enterprise 16 - Denial of Service Event Calendar PHP 1.5 - SQL Injection SPIP 3.1.2 Template Compiler/Composer - PHP Code Execution SPIP 3.1.1 / 3.1.2 - File Enumeration / Path Traversal SPIP 3.1.2 - Cross-Site Request Forgery Windows win32k.sys - TTF Processing RCVT TrueType Instruction Handler Out-of-Bounds Read (MS16-120) Windows win32k.sys - TTF Processing win32k!sbit_Embolden / win32k!ttfdCloseFontContext Use-After-Free (MS16-120) Windows Kernel - Registry Hive Loading Negative RtlMoveMemory Size in nt!CmpCheckValueList (MS16-124) Windows Kernel - Registry Hive Loading Relative Arbitrary Read in nt!RtlValidRelativeSecurityDescriptor (MS16-123) Microsoft Edge - Function.apply Info Leak (MS16-119) Microsoft Edge - Spread Operator Stack Overflow (MS16-119) Windows Edge/IE - Isolated Private Namespace Insecure DACL Privilege Escalation (MS16-118) Windows Edge/IE - Isolated Private Namespace Insecure Boundary Descriptor Privilege Escalation (MS16-118) Windows - NtLoadKeyEx Read Only Hive Arbitrary File Write Privilege Escalation (MS16-124) Hak5 WiFi Pineapple - Preconfiguration Command Injection (Metasploit) OpenNMS - Java Object Unserialization Remote Code Execution (Metasploit) |
||
---|---|---|
.. | ||
aix | ||
android | ||
arm | ||
ashx/webapps | ||
asp | ||
aspx/webapps | ||
atheos/local | ||
beos | ||
bsd | ||
bsd_ppc/shellcode | ||
bsd_x86/shellcode | ||
bsdi_x86/shellcode | ||
cfm | ||
cgi | ||
freebsd | ||
freebsd_x86/shellcode | ||
freebsd_x86-64 | ||
generator/shellcode | ||
hardware | ||
hp-ux | ||
immunix/local | ||
ios | ||
irix | ||
java | ||
json/webapps | ||
jsp | ||
lin_x86 | ||
lin_x86-64 | ||
linux | ||
linux_mips | ||
linux_ppc/shellcode | ||
linux_sparc/shellcode | ||
minix/dos | ||
multiple | ||
netbsd_x86 | ||
netware | ||
novell | ||
openbsd | ||
openbsd_x86/shellcode | ||
osx | ||
osx_ppc | ||
palm_os | ||
perl/webapps | ||
php | ||
plan9/local | ||
python | ||
qnx | ||
ruby | ||
sco | ||
sco_x86/shellcode | ||
sh4/shellcode | ||
solaris | ||
solaris_sparc | ||
solaris_x86/shellcode | ||
system_z/shellcode | ||
tru64 | ||
ultrix | ||
unix | ||
unixware | ||
win_x86 | ||
win_x86-64 | ||
windows | ||
xml |