exploit-db-mirror/platforms/java/webapps
Offensive Security 0fe9b46f79 DB: 2016-06-22
14 new exploits

Linux Kernel <= 2.4.22 - 'do_brk' Local Root Exploit (2)
Linux Kernel <= 2.4.22 - 'do_brk()' Local Root Exploit (2)
Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap' Local Proof of Concept (1)
Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap' Local Proof of Concept (2)
Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap()' Local Proof of Concept (1)
Linux Kernel <= 2.4.23 / <= 2.6.0 - 'do_mremap()' Local Proof of Concept (2)

Linux Kernel <= 2.4.23 / <= 2.6.0 - 'mremap()' Bound Checking Root Exploit
Linux Kernel <= 2.4.23 / <= 2.6.0 - 'mremap()' Bound Checking Root Exploit (3)

Linux Kernel <= 2.2.25 / <= 2.4.24 / <= 2.6.2 - 'mremap()' Missing 'do_munmap' Exploit
Linux Kernel <= 2.2.25 / <= 2.4.24 / <= 2.6.2 - 'mremap()' Missing 'do_munmap' Exploit (1)

Linux Kernel <= 2.4.29-rc2 - uselib() Privilege Elevation
Linux Kernel <= 2.4.29-rc2 - 'uselib()' Privilege Elevation (1)

Linux Kernel 2.4 - uselib() Privilege Elevation Exploit
Linux Kernel 2.4 - uselib() Privilege Elevation Exploit (2)

Linux Kernel 2.4.x / 2.6.x - uselib() Local Privilege Escalation Exploit
Linux Kernel 2.4.x / 2.6.x - uselib() Local Privilege Escalation Exploit (3)
Linux Kernel 2.6.17 <= 2.6.24.1 - vmsplice Local Root Exploit
Linux Kernel 2.6.23 <= 2.6.24 - vmsplice Local Root Exploit
Linux Kernel 2.6.17 <= 2.6.24.1 - 'vmsplice' Local Root Exploit (2)
Linux Kernel 2.6.23 <= 2.6.24 - vmsplice Local Root Exploit (1)

Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) - UDEV Local Privilege Escalation Exploit
Linux Kernel 2.6 (Debian 4.0 / Ubuntu / Gentoo) - UDEV Local Privilege Escalation Exploit (1)

Linux Kernel 2.6 UDEV < 141 (Gentoo / Ubuntu 8.10/9.04) - Local Privilege Escalation Exploit
Linux Kernel 2.6 (Gentoo / Ubuntu 8.10/9.04) - UDEV < 141 Local Privilege Escalation Exploit (2)
Linux Kernel 2.x (Redhat) - sock_sendpage() Ring0 Local Root Exploit (1)
Linux Kernel 2.x - sock_sendpage() Local Root Exploit (2)
Linux Kernel 2.x (Redhat) - 'sock_sendpage()' Ring0 Local Root Exploit (1)
Linux Kernel 2.x - 'sock_sendpage()' Local Root Exploit (2)

Linux Kernel 2.4 / 2.6 (RedHat Linux 9 / Fedora Core 4~11 / Whitebox 4 / CentOS 4) - sock_sendpage() ring0 Root Exploit (1)
Linux Kernel 2.4 / 2.6 (RedHat Linux 9 / Fedora Core 4~11 / Whitebox 4 / CentOS 4) - 'sock_sendpage()' ring0 Root Exploit (3)

Linux Kernel <= 2.6.30 - atalk_getname() 8-bytes Stack Disclosure Exploit
Linux Kernel <= 2.6.30 - 'atalk_getname()' 8-bytes Stack Disclosure Exploit (1)
Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5 / Fedora Core 4/5/6 x86) - ip_append_data() ring0 Root Exploit
Linux Kernel < 2.6.31-rc7 - AF_IRDA 29-Byte Stack Disclosure Exploit
Linux Kernel 2.6 < 2.6.19 (White Box 4 / CentOS 4.4/4.5 / Fedora Core 4/5/6 x86) - ip_append_data() ring0 Root Exploit (1)
Linux Kernel < 2.6.31-rc7 - AF_IRDA 29-Byte Stack Disclosure Exploit (2)
Linux Kernel < 2.6.19 (x86/x64) - udp_sendmsg Local Root Exploit
Linux Kernel < 2.6.19 (Debian 4) - udp_sendmsg Local Root Exploit
Linux Kernel < 2.6.19 (x86/x64) - udp_sendmsg Local Root Exploit (2)
Linux Kernel < 2.6.19 (Debian 4) - 'udp_sendmsg' Local Root Exploit (3)

Linux Kernel 2.4 / 2.6 (Fedora 11) - sock_sendpage() Local Root Exploit (2)
Linux Kernel 2.4 / 2.6 (Fedora 11) - 'sock_sendpage()' Local Root Exploit (4)

Linux Kernel 2.4 / 2.6 - sock_sendpage() Local Root Exploit (3)
Linux Kernel 2.4 / 2.6 - 'sock_sendpage()' Local Root Exploit (5)

Linux Kernel 2.4.1-2.4.37 / 2.6.1-2.6.32-rc5 - Pipe.c Privilege Escalation
Linux Kernel 2.4.1-2.4.37 / 2.6.1-2.6.32-rc5 - Pipe.c Privilege Escalation (3)

Linux Kernel <= 2.6.32 - 'pipe.c' Local Privilege Escalation Vulnerability
Linux Kernel <= 2.6.32 - 'pipe.c' Local Privilege Escalation Vulnerability (4)

Linux Kernel <= 2.6.37 (Redhat / Ubuntu 10.04) - 'Full Nelson' Local Privilege Escalation
Linux Kernel <= 2.6.37 (Redhat / Ubuntu 10.04) - 'Full-Nelson.c' Local Privilege Escalation

Linux Kernel <= 2.6.37 - Local Kernel Denial of Service
Linux Kernel <= 2.6.37 - Local Kernel Denial of Service (1)

Linux Kernel < 2.6.37-rc2 - TCP_MAXSEG Kernel Panic DoS
Linux Kernel < 2.6.37-rc2 - TCP_MAXSEG Kernel Panic DoS (2)

Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - Econet Privilege Escalation Exploit
Linux Kernel < 2.6.36.2 (Ubuntu 10.04) - 'Half-Nelson.c' Econet Privilege Escalation Exploit

Linux Kernel 2.6.39 <= 3.2.2 (Gentoo / Ubuntu x86/x64) - Mempodipper Local Root (1)
Linux Kernel 2.6.39 <= 3.2.2 (Gentoo / Ubuntu x86/x64) - 'Mempodipper.c' Local Root (1)

Linux Kernel 2.0/2.1_ Digital UNIX <= 4.0 D_ FreeBSD <= 2.2.4_ HP HP-UX 10.20/11.0_ IBM AIX <= 3.2.5_ NetBSD 1.2_ Solaris <= 2.5.1 - Smurf Denial of Service Vulnerability
Linux Kernel 2.0/2.1 (Digital UNIX <= 4.0 D / FreeBSD <= 2.2.4 / HP HP-UX 10.20/11.0 / IBM AIX <= 3.2.5 / NetBSD 1.2 / Solaris <= 2.5.1) - Smurf Denial of Service Vulnerability

Linux Kernel <= 2.3_ BSD/OS <= 4.0_ FreeBSD <= 3.2_ NetBSD <= 1.4 - Shared Memory Denial of Service Vulnerability
Linux Kernel <= 2.3 (BSD/OS <= 4.0 / FreeBSD <= 3.2 / NetBSD <= 1.4) - Shared Memory Denial of Service Vulnerability

Linux Kernel 2.2.12/2.2.14/2.3.99_ RedHat 6.x - Socket Denial of Service
Linux Kernel 2.2.12/2.2.14/2.3.99 (RedHat 6.x) - Socket Denial of Service
Linux Kernel 2.2.x/2.4.0-test1_ SGI ProPack 1.2/1.3 - Capabilities Local Root (sendmail) Vulnerability (1)
Linux Kernel 2.2.x/2.4.0-test1_ SGI ProPack 1.2/1.3 - Capabilities Local Root (sendmail <= 8.10.1) Vulnerability (2)
Linux Kernel 2.2.x <= 2.4.0-test1 (SGI ProPack 1.2/1.3) - Capabilities Local Root 'sendmail' Vulnerability (1)
Linux Kernel 2.2.x <= 2.4.0-test1 (SGI ProPack 1.2/1.3) - Capabilities Local Root (sendmail <= 8.10.1) Vulnerability (2)

Linux Kernel < 3.3.x - 3.7.x (Arch Linux x86_64) - sock_diag_handlers[] Local Root
Linux Kernel < 3.3.x - 3.7.x (Arch Linux x86_64) - 'sock_diag_handlers[]' Local Root (1)

Linux Kernel <= 3.7.10 (Ubuntu 12.10 x64) - sock_diag_handlers Local Root Exploit
Linux Kernel <= 3.7.10 (Ubuntu 12.10 x64) - 'sock_diag_handlers' Local Root Exploit (2)

Linux Kernel 2.6.x - SYS_EPoll_Wait Local Integer Overflow Local Root Vulnerability (1)
Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow Local Root Vulnerability (1)

Linux Kernel 2.6.32 <= 3.x.x (CentOS) - PERF_EVENTS Local Root Exploit
Linux Kernel 2.6.32 <= 3.x.x (CentOS) - 'PERF_EVENTS' Local Root Exploit (1)

Linux Kernel < 3.8.9 (x86_64) - perf_swevent_init Local Root Exploit
Linux Kernel < 3.8.9 (x86_64) - perf_swevent_init Local Root Exploit (2)

Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat - Proof of Concept
Linux Kernel 3.4 < 3.13.2 - recvmmsg x32 compat - Proof of Concept (1)
Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - Arbitrary Write with CONFIG_X86_X32 Exploit
Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.04/13.10) - 'CONFIG_X86_X32=y' Local Root Exploit
Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - Arbitrary Write with 'CONFIG_X86_X32' Exploit (2)
Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.04/13.10) - 'CONFIG_X86_X32=y' Local Root Exploit (3)

Linux Kernel 2.6.x - 'fput()' NULL Pointer Dereference Local Denial of Service Vulnerabilty

Linux Kernel 3.3 < 3.8 (Ubuntu/Fedora 18) - SOCK_DIAG Local Root Exploit
Linux Kernel 3.3 < 3.8 (Ubuntu/Fedora 18) - SOCK_DIAG Local Root Exploit (3)
Linux Kernel <= 3.2.0-23 / <= 3.5.0-23 (Ubuntu 12.04.(0_1_2) x64) - perf_swevent_init Local Root Exploit
Linux Kernel 2.6.x - 'fasync_helper()' Local Privilege Escalation Vulnerability
Linux Kernel <= 3.2.0-23 / <= 3.5.0-23 (Ubuntu 12.04.0/1/2 x64) - perf_swevent_init Local Root Exploit (3)
Linux Kernel < 2.6.28 - 'fasync_helper()' Local Privilege Escalation Vulnerability

Linux Kernel 2.6.39 <= 3.2.2 (x86/x64) - Mempodipper Local Root (2)
Linux Kernel 2.6.39 <= 3.2.2 (x86/x64) - 'Mempodipper.c' Local Root (2)

Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - overlayfs Local Root Shell
Linux Kernel 3.13.0 < 3.19 (Ubuntu 12.04/14.04/14.10/15.04) - 'overlayfs' Local Root Shell

Linux Kernel <= 4.3.3 (Ubuntu 14.04/15.10) - overlayfs Local Root Exploit
Linux Kernel <= 4.3.3 (Ubuntu 14.04/15.10) - 'overlayfs' Local Root Exploit (1)

Linux Kernel <= 4.3.3 - overlayfs Local Privilege Escalation
Linux Kernel <= 4.3.3 - 'overlayfs' Local Privilege Escalation (2)
DarkComet Server Remote File Download Exploit (msf)
Banshee 2.6.2 - .mp3 Crash PoC
IonizeCMS 1.0.8 - (Add Admin) CSRF
Yona CMS - (Add Admin) CSRF
Joomla Publisher Pro (com_publisher) Component - SQL Injection
Windows - gdi32.dll Multiple DIB-Related EMF Record Handlers Heap-Based Out-of-Bounds Reads/Memory Disclosure (MS16-074)
Windows Kernel - ATMFD.DLL NamedEscape 0x250C Pool Corruption (MS16-074)
Linux - ecryptfs and /proc/$pid/environ Privilege Escalation
Windows - Custom Font Disable Policy Bypass
Internet Explorer 11 - Garbage Collector Attribute Type Confusion (MS16-063)
SAP NetWeaver AS JAVA 7.1 - 7.5 - ctcprotocol Servlet XXE
SAP NetWeaver AS JAVA 7.1 - 7.5 - Directory Traversal
Radiant CMS 1.1.3 - Mutiple Persistent XSS Vulnerabilities
YetiForce CRM < 3.1 - Persistent XSS
2016-06-22 05:06:31 +00:00
..
18881.txt Updated 2013-12-03 19:44:07 +00:00
20668.py Updated 2013-12-03 19:44:07 +00:00
20925.txt Updated 2013-12-03 19:44:07 +00:00
21543.txt Updated 2013-12-03 19:44:07 +00:00
21562.txt Updated 2013-12-03 19:44:07 +00:00
21879.txt Updated 2013-12-03 19:44:07 +00:00
21946.txt Updated 2013-12-03 19:44:07 +00:00
22752.txt Updated 2013-12-03 19:44:07 +00:00
23268.txt Updated 2013-12-03 19:44:07 +00:00
24190.txt Updated 2013-12-03 19:44:07 +00:00
24791.txt Updated 2013-12-03 19:44:07 +00:00
25702.txt Updated 2013-12-03 19:44:07 +00:00
26001.txt Updated 2013-12-03 19:44:07 +00:00
26987.txt Updated 2013-12-03 19:44:07 +00:00
27888.txt Updated 2013-12-03 19:44:07 +00:00
28116.txt Updated 2013-12-03 19:44:07 +00:00
29918.txt Updated 2013-12-03 22:42:55 +00:00
30271.txt Updated 12_17_2013 2013-12-17 17:05:06 +00:00
30272.txt Updated 12_17_2013 2013-12-17 17:05:06 +00:00
30273.txt Updated 12_17_2013 2013-12-17 17:05:06 +00:00
30274.txt Updated 12_17_2013 2013-12-17 17:05:06 +00:00
30275.txt Updated 12_17_2013 2013-12-17 17:05:06 +00:00
30514.txt Updated 01_04_2014 2014-01-04 23:27:58 +00:00
30674.txt Updated 01_04_2014 2014-01-04 23:27:58 +00:00
31073.html Updated 01_21_2014 2014-01-21 04:28:26 +00:00
31189.txt Updated 01_27_2014 2014-01-27 04:26:39 +00:00
31438.txt Updated 02_07_2014 2014-02-07 04:27:24 +00:00
31621.txt Updated 02_14_2014 2014-02-14 04:27:08 +00:00
31641.txt Updated 02_15_2014 2014-02-15 04:27:44 +00:00
31816.txt Updated 02_24_2014 2014-02-24 04:27:50 +00:00
32448.txt Updated 03_24_2014 2014-03-24 04:32:40 +00:00
32459.txt Updated 03_25_2014 2014-03-25 04:32:15 +00:00
32574.txt Updated 03_30_2014 2014-03-30 04:31:18 +00:00
32818.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32821.html DB: 2015-04-20 2015-04-20 12:44:13 +00:00
32858.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32862.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32863.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32864.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32897.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32909.txt Updated 04_18_2014 2014-04-18 04:35:42 +00:00
32927.txt Updated 04_20_2014 2014-04-20 04:34:26 +00:00
32940.txt Updated 04_20_2014 2014-04-20 04:34:26 +00:00
33048.txt Updated 04_28_2014 2014-04-28 04:36:23 +00:00
33181.txt Updated 05_06_2014 2014-05-06 04:36:08 +00:00
33254.txt Updated 05_10_2014 2014-05-10 04:36:25 +00:00
33286.txt Updated 05_11_2014 2014-05-11 04:36:48 +00:00
33687.txt Updated 06_10_2014 2014-06-10 04:38:25 +00:00
33939.txt Updated 07_03_2014 2014-07-03 04:38:30 +00:00
34108.txt Updated 07_20_2014 2014-07-20 04:38:35 +00:00
34290.txt Updated 08_10_2014 2014-08-10 04:40:43 +00:00
34293.txt Updated 08_10_2014 2014-08-10 04:40:43 +00:00
34345.txt Updated 08_17_2014 2014-08-17 04:41:15 +00:00
35683.txt Update: 2015-01-05 2015-01-05 08:36:21 +00:00
35781.txt Update: 2015-01-17 2015-01-17 08:35:34 +00:00
36292.txt Update: 2015-03-17 2015-03-17 08:36:10 +00:00
36299.txt Update: 2015-03-08 2015-03-08 08:37:21 +00:00
36423.txt DB: 2015-03-19 2015-03-19 09:39:10 +00:00
36436.txt DB: 2015-03-20 2015-03-20 08:36:08 +00:00
36440.txt DB: 2015-03-20 2015-03-20 08:36:08 +00:00
36548.txt DB: 2015-04-20 2015-04-20 12:44:13 +00:00
36553.java DB: 2015-03-31 2015-03-31 08:35:36 +00:00
36666.txt DB: 2015-04-09 2015-04-09 08:36:09 +00:00
36667.txt DB: 2015-04-09 2015-04-09 08:36:09 +00:00
36684.txt DB: 2015-04-11 2015-04-11 08:36:20 +00:00
36828.txt DB: 2015-04-28 2015-04-28 05:01:34 +00:00
36939.txt DB: 2015-05-08 2015-05-08 05:02:43 +00:00
36971.txt DB: 2015-05-10 2015-05-10 05:02:35 +00:00
37006.txt DB: 2015-05-15 2015-05-15 05:02:32 +00:00
37009.xml DB: 2015-05-15 2015-05-15 05:02:32 +00:00
37029.txt DB: 2015-05-18 2015-05-18 05:03:27 +00:00
37030.txt DB: 2015-05-18 2015-05-18 05:03:27 +00:00
37031.txt DB: 2015-05-18 2015-05-18 05:03:27 +00:00
37032.txt DB: 2015-05-18 2015-05-18 05:03:27 +00:00
37033.txt DB: 2015-05-18 2015-05-18 05:03:27 +00:00
37110.py DB: 2015-05-27 2015-05-27 05:02:00 +00:00
37372.html DB: 2015-06-26 2015-06-26 05:02:53 +00:00
37416.txt DB: 2015-06-30 2015-06-30 05:03:19 +00:00
37555.txt DB: 2015-07-11 2015-07-11 05:03:28 +00:00
37557.txt DB: 2015-07-11 2015-07-11 05:03:28 +00:00
37589.txt DB: 2015-07-14 2015-07-14 05:03:24 +00:00
37999.txt DB: 2015-08-29 2015-08-29 05:01:51 +00:00
38130.txt DB: 2015-09-11 2015-09-11 05:01:46 +00:00
38358.txt DB: 2015-10-01 2015-10-01 05:02:54 +00:00
38461.txt DB: 2015-10-16 2015-10-16 05:02:10 +00:00
38462.txt DB: 2015-10-16 2015-10-16 05:02:10 +00:00
38551.py DB: 2015-10-29 2015-10-29 05:02:34 +00:00
38664.py DB: 2015-11-11 2015-11-11 05:02:52 +00:00
38739.txt DB: 2015-11-18 2015-11-18 05:02:21 +00:00
39193.txt DB: 2016-01-08 2016-01-08 05:03:43 +00:00
39241.py DB: 2016-02-13 2016-02-13 05:03:17 +00:00
39334.txt DB: 2016-01-28 2016-01-28 05:02:01 +00:00
39391.txt DB: 2016-02-02 2016-02-02 05:02:47 +00:00
39418.txt DB: 2016-02-15 2016-02-15 05:04:08 +00:00
39481.txt DB: 2016-02-23 2016-02-23 05:02:07 +00:00
39715.rb DB: 2016-04-22 2016-04-22 05:03:45 +00:00
39837.txt DB: 2016-05-18 2016-05-18 05:02:15 +00:00
39886.txt DB: 2016-06-07 2016-06-07 05:07:41 +00:00
39995.txt DB: 2016-06-22 2016-06-22 05:06:31 +00:00
39996.txt DB: 2016-06-22 2016-06-22 05:06:31 +00:00