exploit-db-mirror/platforms/xml/webapps
Offensive Security 9e9bf495c2 DB: 2017-04-26
26 new exploits

PHP 5.4.0RC6 (x64t) - Denial of Service
PHP 5.4.0RC6 (x64) - Denial of Service

Evostream Media Server 1.7.1 (x64) - Denial of Service

PrivateTunnel Client 2.8 - Local Buffer Overflow (SEH)
VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation
VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write
Dmitry 1.3a - Local Buffer Overflow
Oracle VM VirtualBox - Environment and ioctl Unprivileged Host User to Host Kernel Privilege Escalation
Oracle VM VirtualBox - 'virtio-net' Guest-to-Host Out-of-Bounds Write
Apple Safari - Array concat Memory Corruption
Oracle VirtualBox Guest Additions 5.1.18 -  Unprivileged Windows User-Mode Guest Code Double-Free
VirtualBox - Cooperating VMs can Escape from Shared Folder
PCAUSA Rawether (ASUS PCE-AC56 WLAN Card Utilities Windows 10 x64) - Privilege Escalation
Oracle VM VirtualBox - Cooperating VMs can Escape from Shared Folder
PCAUSA Rawether (ASUS PCE-AC56 WLAN Card Utilities Windows 10 x64) - Privilege Escalation
VirtualBox - Guest-to-Host Privilege Escalation via Broken Length Handling in slirp Copy
VirtualBox 5.1.14 r112924 - Unprivileged Host User to Host Kernel Privilege Escalation via ALSA config
VirtualBox 5.0.32 r112930 x64 - Windows Process COM Injection Privilege Escalation
Oracle VM VirtualBox - Guest-to-Host Privilege Escalation via Broken Length Handling in slirp Copy
Oracle VM VirtualBox 5.1.14 r112924 - Unprivileged Host User to Host Kernel Privilege Escalation via ALSA config
Oracle VM VirtualBox 5.0.32 r112930 (x64) - Windows Process COM Injection Privilege Escalation
Dell Customer Connect 1.3.28.0 - Privilege Escalation
LightDM (Ubuntu 16.04/16.10) - Guest Account Local Privilege Escalation
Realtek Audio Driver 6.0.1.7898 (Windows 10) - Dolby Audio X2 Service Privilege Escalation

Nginx 1.4.0 (x64) (Generic Linux) - Remote Exploit
Nginx 1.4.0 (Generic Linux x64) - Remote Exploit
Microsoft Windows 2003 SP2 - 'ERRATICGOPHER' SMB Remote Code Execution
Microsoft Office Word - Malicious Hta Execution (Metasploit)
WePresent WiPG-1000 - Command Injection (Metasploit)

OSX/Intel - setuid shell x86_64 Shellcode (51 bytes)
OSX/Intel (x86-64) - setuid shell  Shellcode (51 bytes)

OSX/Intel (x86_64) - reverse_tcp shell Shellcode (131 bytes)
OSX/Intel (x86-64) - reverse_tcp shell Shellcode (131 bytes)
Linux x86 / x86_64 - reverse_tcp (192.168.1.29:4444) Shellcode (195 bytes)
Linux x86 / x86_64 - tcp_bind (Port 4444) Shellcode (251 bytes)
Linux x86 / x86_64 - Read /etc/passwd Shellcode (156 bytes)
Linux x86/x86-64 - reverse_tcp (192.168.1.29:4444) Shellcode (195 bytes)
Linux x86/x86-64 - tcp_bind (Port 4444) Shellcode (251 bytes)
Linux x86/x86-64 - Read /etc/passwd Shellcode (156 bytes)

Linux/Windows/BSD x86_64 - execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode (194 bytes)
Linux/Windows/BSD x86-64 - execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode (194 bytes)

Linux/x86-64 - Egghunter Shellcode (38 bytes)

Linux/x86-64 - Reverse Shell Shellcode (84 bytes)
FlySpray 1.0-rc4 - Cross-Site Scripting / Cross-Site Request Forgery
WordPress Plugin KittyCatfish 2.2 - SQL Injection
WordPress Plugin Car Rental System 2.5 - SQL Injection
WordPress Plugin Wow Viral Signups 2.1 - SQL Injection
WordPress Plugin Wow Forms 2.1 - SQL Injection
Oracle PeopleSoft - 'PeopleSoftServiceListeningConnector' XML External Entity via DOCTYPE
Oracle E-Business Suite 12.2.3 - 'IESFOOTPRINT' SQL Injection
HPE OpenCall Media Platform (OCMP) 4.3.2 - Cross-Site Scripting / Remote File Inclusion
OpenText Documentum Content Server - dm_bp_transition.ebs docbase Method Arbitrary Code Execution
Joomla Component Myportfolio 3.0.2 - 'pid' Parameter SQL Injection
October CMS 1.0.412 - Multiple Vulnerabilities
2017-04-26 05:01:18 +00:00
..
35275.txt DB: 2015-04-20 2015-04-20 12:44:13 +00:00
36132.txt DB: 2015-04-20 2015-04-20 12:44:13 +00:00
36369.txt DB: 2015-04-20 2015-04-20 12:44:13 +00:00
36441.txt DB: 2015-03-20 2015-03-20 08:36:08 +00:00
36941.txt DB: 2015-05-08 2015-05-08 05:02:43 +00:00
37250.txt DB: 2015-06-11 2015-06-11 05:02:28 +00:00
37609.txt DB: 2015-07-15 2015-07-15 05:01:36 +00:00
37891.txt DB: 2015-08-27 2015-08-27 05:01:55 +00:00
37977.py DB: 2016-09-03 2016-09-03 13:13:25 +00:00
38118.txt DB: 2016-09-03 2016-09-03 13:13:25 +00:00
38261.txt DB: 2015-09-23 2015-09-23 05:02:17 +00:00
38896.py DB: 2015-12-09 2015-12-09 05:02:11 +00:00
38897.txt DB: 2015-12-09 2015-12-09 05:02:11 +00:00
38898.txt DB: 2015-12-09 2015-12-09 05:02:11 +00:00
38899.txt DB: 2015-12-09 2015-12-09 05:02:11 +00:00
39170.txt DB: 2016-01-06 2016-01-06 05:03:27 +00:00
39840.txt DB: 2016-05-20 2016-05-20 06:50:49 +00:00
39841.txt DB: 2016-05-20 2016-05-20 06:50:49 +00:00
39909.rb DB: 2016-06-11 2016-06-11 05:06:22 +00:00
40077.txt DB: 2016-07-09 2016-07-09 05:06:22 +00:00
40109.txt DB: 2016-07-14 2016-07-14 05:05:01 +00:00
40501.txt DB: 2016-10-12 2016-10-12 05:01:17 +00:00
40590.txt DB: 2016-10-21 2016-10-21 05:01:17 +00:00
40816.txt DB: 2016-11-23 2016-11-23 05:01:19 +00:00
41482.txt DB: 2017-03-02 2017-03-02 05:01:19 +00:00
41574.html DB: 2017-03-10 2017-03-10 05:01:18 +00:00
41579.html DB: 2017-03-11 2017-03-11 05:01:19 +00:00
41855.sh DB: 2017-04-12 2017-04-12 05:01:16 +00:00
41925.txt DB: 2017-04-26 2017-04-26 05:01:18 +00:00