![]() 137 new exploits Apache 2.x - Memory Leak Exploit Apache 2.x - Memory Leak Cisco IOS - using hping Remote Denial of Service Microsoft Windows - ASN.1 'LSASS.exe' Remote Exploit (MS04-007) Microsoft Windows - ASN.1 'LSASS.exe' Remote Denial of Service (MS04-007) Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call Exploit HP-UX 11.00/10.20 crontab - Overwrite Files Exploit Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call HP-UX 11.00/10.20 crontab - Overwrite Files Solaris 2.7/2.8 Catman - Local Insecure tmp Symlink Exploit SunOS 5.7 Catman - Local Insecure tmp Symlink Clobber Exploit RedHat 6.1/6.2 - TTY Flood Users Exploit Solaris 2.7/2.8 Catman - Local Insecure tmp Symlink SunOS 5.7 Catman - Local Insecure tmp Symlink Clobber RedHat 6.1/6.2 - TTY Flood Users Solaris 2.6 / 7 / 8 - Lock Users Out of mailx Exploit ProFTPd 1.2.0 rc2 - Memory Leakage Exploit Solaris 2.6 / 7 / 8 - Lock Users Out of mailx ProFTPd 1.2.0 rc2 - Memory Leakage Cisco (Multiple Products) - Automated Exploit Tool Cisco (Multiple Products) - Automated Tool TCP Connection Reset - Remote Denial of Service Microsoft Internet Explorer - Overly Trusted Location Cache Exploit Microsoft Internet Explorer - Overly Trusted Location Cache Microsoft Windows - JPEG Processing Buffer Overrun Exploit (MS04-028) Microsoft Windows - JPEG Processing Buffer Overrun (MS04-028) Quake 3 Engine - Infostring Crash and Shutdown Exploit Quake 3 Engine - Infostring Crash and Shutdown Microsoft Windows - 'SMB' Transaction Response Handling Exploit (MS05-011) Microsoft Windows - 'SMB' Transaction Response Handling (MS05-011) MultiTheftAuto 0.5 patch 1 - Server Crash / MOTD Deletion Exploit MultiTheftAuto 0.5 patch 1 - Server Crash / MOTD Deletion netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation Exploit netPanzer 0.8 rev 952 - 'frameNum' Server Terminiation VMware 5.5.1 - COM Object Arbitrary Partition Table Delete Exploit VMware 5.5.1 - COM Object Arbitrary Partition Table Delete KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception Exploit KDE libkhtml 3.5 < 4.2.0 - Unhandled HTML Parse Exception eIQnetworks Network Security Analyzer - Null Pointer Dereference Exploit eIQnetworks Network Security Analyzer - Null Pointer Dereference Microsoft Internet Explorer 6 - 'mshtml.dll' Null Pointer Dereference Exploit Microsoft Internet Explorer 6 - 'mshtml.dll' Null Pointer Dereference PHP 5.2.6 - 'sleep()' Local Memory Exhaust Exploit PHP 5.2.6 - 'sleep()' Local Memory Exhaust Ruby 1.9 - regex engine Remote Socket Memory Leak Exploit Ruby 1.9 - regex engine Remote Socket Memory Leak Ultra Office - ActiveX Control Arbitrary File Corruption Exploit Ultra Office - ActiveX Control Arbitrary File Corruption Flock Social Web Browser 1.2.5 - 'loop' Remote Denial of Service Microsoft Windows - GDI+ '.ICO' Remote Division By Zero Exploit Microsoft Windows - GDI+ '.ICO' Remote Division By Zero Microsoft Windows Vista - Access Violation from Limited Account Exploit (Blue Screen of Death) Microsoft Windows Vista - Access Violation from Limited Account (Blue Screen of Death) Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One Exploit Novell Groupwise 8.0 - Malformed RCPT Command Off-by-One Mozilla Firefox - unclamped loop Denial of Service Zortam MP3 Player 1.50 - '.m3u' Integer Division by Zero Exploit Zortam MP3 Player 1.50 - '.m3u' Integer Division by Zero Firebird SQL - op_connect_request main listener shutdown Exploit Firebird SQL - op_connect_request main listener shutdown Kaspersky 2010 - Remote Memory Corruption / Denial of Service (PoC) VirtualDJ Trial 6.0.6 'New Year Edition' - '.m3u' Exploit Sagem Routers - Remote Reset Exploit Sagem Routers - Remote Reset TopDownloads MP3 Player 1.0 - '.m3u' Crash Exploit TopDownloads MP3 Player 1.0 - '.m3u' Crash Optimal Archive 1.38 - '.zip' File Exploit (SEH) (PoC) Optimal Archive 1.38 - '.zip' File (SEH) (PoC) Aircrack-NG Tools svn r1675 - Remote Exploit Aircrack-NG Tools svn r1675 - Remote Heap-Based Buffer Overflow Apple Mac OSX 10.6 - HFS FileSystem Exploit (Denial of Service) Apple Mac OSX 10.6 - HFS FileSystem (Denial of Service) Motorola SB5101 Hax0rware Rajko HTTPd - Remote Exploit (PoC) Motorola SB5101 Hax0rware Rajko HTTPd - Remote Denial of Service (PoC) FreeBSD - 'mountnfs()' Exploit FreeBSD - 'mountnfs()' Denial of Service AoAAudioExtractor 2.0.0.0 - ActiveX (PoC) (SEH) Microsoft Internet Explorer - MSHTML Findtext Processing Exploit Microsoft Internet Explorer - MSHTML Findtext Processing RedHat Linux - Stickiness of /tmp Exploit RedHat Linux - Stickiness of /tmp Microsoft Plug and Play Service - Overflow Exploit (MS05-039) (Metasploit) Microsoft Plug and Play Service - Overflow (MS05-039) (Metasploit) Linux 2.6.37-rc1 - serial_core TIOCGICOUNT Leak Exploit Linux 2.6.37-rc1 - serial_core TIOCGICOUNT Leak ZipWiz 2005 5.0 - '.zip' Buffer Corruption Exploit ZipWiz 2005 5.0 - '.zip' Buffer Corruption Simple HTTPd 1.42 - Denial of Servive Exploit Simple HTTPd 1.42 - Denial of Servive PeerBlock 1.1 - Blue Screen of Death Exploit PeerBlock 1.1 - Blue Screen of Death Spotify 0.8.2.610 - search func Memory Exhaustion Exploit Spotify 0.8.2.610 - search func Memory Exhaustion Microsoft Windows - 'afd.sys' Local Kernel Exploit (PoC) (MS11-046) Microsoft Windows - 'afd.sys' Local Kernel (PoC) (MS11-046) Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Exploit SunOS 4.1.1 - '/usr/release/bin/makeinstall' Exploit SunOS 4.1.1 - '/usr/release/bin/winstall' Exploit SunOS 4.1.3 - kmem setgid /etc/crash Exploit SunOS 4.1.3 - kmem setgid /etc/crash Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA Exploit Microsoft IIS 4.0 / Microsoft JET 3.5/3.5.1 Database Engine - VBA Linux Kernel 2.0/2.1/2.2 - autofs Exploit Linux Kernel 2.0/2.1/2.2 - 'autofs' Apache 1.1 / NCSA httpd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi Exploit Apache 1.1 / NCSA httpd 1.5.2 / Netscape Server 1.12/1.1/2.0 - a nph-test-cgi Netscape Enterprise Server 3.6 SP2/FastTrack Server 2.0.1 - GET Exploit Netscape Enterprise Server 3.6 SP2/FastTrack Server 2.0.1 - GET D-Link DIR605L - Denial of Service D-Link DIR-605L < 2.08 - Denial of Service Microsoft Edge Chakra: JIT - 'Lowerer::LowerBoundCheck' Incorrect Integer Overflow Check Microsoft Windows 3.11/95/NT 4.0/NT 3.5.1 - 'Out Of Band' Data Denial of Service (4) Microsoft Internet Explorer 5/6 - Self-Referential Object Denial of Service Kerio MailServer 5.6.3 subscribe Module - Overflow Exploit Kerio MailServer 5.6.3 subscribe Module - Overflow Kerio MailServer 5.6.3 list Module - Overflow Exploit Kerio MailServer 5.6.3 do_map Module - Overflow Exploit Kerio MailServer 5.6.3 list Module - Overflow Kerio MailServer 5.6.3 do_map Module - Overflow Microsoft Edge - 'Object.setPrototypeOf' Memory Corruption Red-M Red-Alert 3.1 - Remote Exploit Red-M Red-Alert 3.1 - Remote Denial of Service Microsoft Windows Server 2000 - Multiple COM Object Instantiation Code Execution Vulnerabilities Microsoft Internet Explorer 6 - Multiple COM Object Color Property Denial of Service Vulnerabilities Microsoft Windows Server 2000 - Multiple COM Object Instantiation Code Execution Vulnerabilities Microsoft Internet Explorer 6 - Multiple COM Object Color Property Denial of Service Vulnerabilities Gold MP4 Player 3.3 - Universal Exploit (SEH) (Metasploit) Gold MP4 Player 3.3 - Universal (SEH) (Metasploit) WS10 Data Server - SCADA Exploit Overflow (PoC) WS10 Data Server - SCADA Overflow (PoC) Kaspersky AntiVirus - DEX File Format Memory Corruption Kaspersky AntiVirus - '.DEX' File Format Memory Corruption Avast! - JetDb::IsExploited4x Performs Unbounded Search on Input Avast! - JetDb::Ised4x Performs Unbounded Search on Input pdfium IsFlagSet (v8 memory management) - SIGSEGV Exploit pdfium IsFlagSet (v8 memory management) - SIGSEGV Apple OS X/iOS - 'mach_ports_register' Multiple Memory Safety Exploits Apple OS X/iOS - 'mach_ports_register' Multiple Memory Safety s Microsoft Edge Chakra JIT - Type Confusion with switch Statements Microsoft Edge Chakra: JIT - 'OP_Memset' Type Confusion Mandrake Linux 8.2 - '/usr/mail' Local Exploit ICQ Pro 2003a - 'ca1-icq.asm' Password Bypass Exploit XGalaga 2.0.34 (RedHat 9.0) - Local Game Exploit xtokkaetama 1.0b (RedHat 9.0) - Local Game Exploit man-db 2.4.1 - 'open_cat_stream()' Local uid=man Exploit DameWare Mini Remote Control Server - System Exploit Mandrake Linux 8.2 - '/usr/mail' Local Overflow ICQ Pro 2003a - 'ca1-icq.asm' Password Bypass XGalaga 2.0.34 (RedHat 9.0) - Local Game xtokkaetama 1.0b (RedHat 9.0) - Local Game man-db 2.4.1 - 'open_cat_stream()' Local uid=man DameWare Mini Remote Control Server - System IBM DB2 - Universal Database 7.2 'db2licm' Local Exploit IBM DB2 - Universal Database 7.2 'db2licm' Local OpenBSD - 'ibcs2_exec' Kernel Local Exploit OpenBSD - 'ibcs2_exec' Kernel Local Microsoft Windows - ListBox/ComboBox Control Local Exploit (MS03-045) Microsoft Windows - ListBox/ComboBox Control Local (MS03-045) XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game Exploit XSOK 1.02 - '-xsokdir' Local Buffer Overflow Game SuSE Linux 9.0 - YaST Configuration Skribt Local Exploit SuSE Linux 9.0 - YaST Configuration Skribt Local RedHat 6.2 Restore and Dump - Local Exploit (Perl) RedHat 6.2 Restore and Dump - Privilege Escalation (Perl) BSDi 3.0/4.0 - rcvtty[mh] Local Exploit BSDi 3.0/4.0 - rcvtty[mh] Local Solaris locale - Format Strings 'noexec stack' Exploit GLIBC locale - bug mount Exploit dislocate 1.3 - Local i386 Exploit UUCP Exploit - File Creation/Overwriting Symlinks Exploit Solaris locale - Format Strings 'noexec stack' GLIBC locale - bug mount dislocate 1.3 - Local i386 UUCP - File Creation/Overwriting Symlinks GLIBC locale - Format Strings Exploit GLIBC locale - Format Strings RedHat 6.1 man - 'egid 15' Local Exploit RedHat 6.1 man - 'egid 15' Local splitvt < 1.6.5 - Local Exploit splitvt < 1.6.5 - Local IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local Exploit IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Exploit Microsoft Windows Utility Manager - Local SYSTEM Exploit (MS04-011) IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/bin/lpstat' Local IRIX 5.3/6.2/6.3/6.4/6.5/6.5.11 - '/usr/lib/print/netprint' Local Microsoft Windows Utility Manager - Local SYSTEM (MS04-011) Slackware 7.1 - '/usr/bin/mail' Local Exploit Slackware 7.1 - '/usr/bin/mail' Local GLIBC 2.1.3 - LD_PRELOAD Local Exploit GLIBC 2.1.3 - LD_PRELOAD Local Resolv+ (RESOLV_HOST_CONF) - Linux Library Local Exploit Resolv+ (RESOLV_HOST_CONF) - Linux Library Local Solaris 2.5.1 lp / lpsched - Symlink Exploit LibXt - 'XtAppInitialize()' Overflow *xterm Exploit Solaris 2.5.0/2.5.1 ps / chkey - Data Buffer Exploit Solaris 2.5.1 lp / lpsched - Symlink LibXt - 'XtAppInitialize()' Overflow *xterm Solaris 2.5.0/2.5.1 ps / chkey - Data Buffer Microsoft Windows Server 2000 - Universal Language Utility Manager Exploit (MS04-019) Microsoft Windows Task Scheduler (Windows XP/2000) - '.job' Exploit (MS04-022) Microsoft Windows Server 2000 - Utility Manager All-in-One Exploit (MS04-019) Microsoft Windows Server 2000 - Universal Language Utility Manager (MS04-019) Microsoft Windows Task Scheduler (Windows XP/2000) - '.job' (MS04-022) Microsoft Windows Server 2000 - Utility Manager All-in-One (MS04-019) Microsoft Windows XP - Task Scheduler '.job' Universal Exploit (MS04-022) Microsoft Windows XP - Task Scheduler '.job' Universal (MS04-022) ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Exploit AOL Instant Messenger AIM - 'Away' Message Local Exploit OpenBSD - 'ftp' Exploit ProFTPd - 'ftpdctl' 'pr_ctrls_connect' Overflow AOL Instant Messenger AIM - 'Away' Message Local OpenBSD - 'ftp' IPD (Integrity Protection Driver) - Local Exploit IPD (Integrity Protection Driver) - Local htpasswd Apache 1.3.31 - Local Exploit htpasswd Apache 1.3.31 - Local SudoEdit 1.6.8 - Local Change Permission Exploit SudoEdit 1.6.8 - Local Change Permission BSD bmon 1.2.1_2 - Local Exploit BSD bmon 1.2.1_2 - Local Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read Exploit Multiple AntiVirus - '.zip' Detection Bypass Exploit Linux Kernel 2.4.27/2.6.8 - 'binfmt_elf' Executable File Read Multiple AntiVirus - '.zip' Detection Bypass Cscope 15.5 - Symlink Exploit Cscope 15.5 - Symlink Microsoft Windows - Improper Token Validation Local Exploit Exim 4.41 - 'dns_build_reverse' Local Exploit (PoC) Peer2Mail 1.4 - Encrypted Password Dumper Exploit fkey 0.0.2 - Local File Accessibility Exploit Microsoft Windows - Improper Token Validation Local Exim 4.41 - 'dns_build_reverse' Local (PoC) Peer2Mail 1.4 - Encrypted Password Dumper fkey 0.0.2 - Local File Accessibility /usr/bin/trn (Not SUID) - Local Exploit Mandrake / Slackware /usr/bin/trn - Privilege Escalation (Not SUID) Linux ncpfs - Local Exploit ncpfs < 2.2.6 (Gentoo / Linux) - Privilege Escalation DelphiTurk FTP 1.0 - Passwords to Local Users Exploit DelphiTurk e-Posta 1.0 - Local Exploit GNU a2ps - 'Anything to PostScript' Not SUID Local Exploit VisualBoyAdvanced 1.7.x - Non SUID Local Shell Exploit DelphiTurk FTP 1.0 - Passwords to Local Users DelphiTurk e-Posta 1.0 - Local GNU a2ps - 'Anything to PostScript' Not SUID Local VisualBoyAdvanced 1.7.x - Non SUID Local Shell GetDataBack Data Recovery 2.31 - Local Exploit Aeon 0.2a - Local Linux Exploit (1) Aeon 0.2a - Local Linux Exploit (2) GetDataBack Data Recovery 2.31 - Local Aeon 0.2a - Local Linux (1) Aeon 0.2a - Local Linux (2) Microsoft Jet Database - 'msjet40.dll' Reverse Shell Exploit (1) Microsoft Jet Database - 'msjet40.dll' Reverse Shell (1) Oracle Database PL/SQL Statement - Multiple SQL Injections Exploits Oracle Database PL/SQL Statement - Multiple SQL Injections s Microsoft Windows - 'HTA' Script Execution Exploit (MS05-016) Microsoft Windows - 'HTA' Script Execution (MS05-016) Microsoft Jet Database - 'msjet40.dll' Reverse Shell Exploit (2) Microsoft Jet Database - 'msjet40.dll' Reverse Shell (2) Exim 4.41 - 'dns_build_reverse' Local Exploit Microsoft Windows - COM Structured Storage Local Exploit (MS05-012) ePSXe 1.6.0 - 'nogui()' Local Exploit Exim 4.41 - 'dns_build_reverse' Local Microsoft Windows - COM Structured Storage Local (MS05-012) ePSXe 1.6.0 - 'nogui()' Privilege Escalation Willing Webcam 2.8 - Licence Information Disclosure Local Exploit Willing Webcam 2.8 - Licence Information Disclosure Local Solaris (SPARC/x86) - Local Socket Hijack Exploit Solaris (SPARC/x86) - Local Socket Hijack MySQL 4.0.17 (Linux) - User-Defined Function (UDF) Dynamic Library Exploit (1) MySQL 4.0.17 (Linux) - User-Defined Function (UDF) Dynamic Library (1) Appfluent Database IDS < 2.1.0.103 - Environment Variable Local Exploit Appfluent Database IDS < 2.1.0.103 - Environment Variable Local Microsoft Windows Server 2000 Kernel - APC Data-Free Local Escalation Exploit (MS05-055) Microsoft Windows Server 2000 Kernel - APC Data-Free Local Escalation (MS05-055) MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library Exploit (2) MySQL 4.x/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2) Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL Exploit Intel Wireless Service - 's24evmon.exe' Shared Memory Exploit Oracle 10g Release 2 - 'DBMS_EXPORT_EXTENSION' SQL Intel Wireless Service - 's24evmon.exe' Shared Memory Solaris 8/9 - '/usr/ucb/ps' Local Information Leak Exploit VMware 5.5.1 - 'ActiveX' Local Buffer Overflow Solaris 8/9 - '/usr/ucb/ps' Local Information Leak VMware 5.5.1 - 'ActiveX' Local Buffer Overflow TIBCO Rendezvous 7.4.11 - Password Extractor Local Exploit TIBCO Rendezvous 7.4.11 - Password Extractor Local Apple Mac OSX 10.4.7 - Mach Exception Handling Local Exploit (10.3.x) Apple Mac OSX 10.4.7 - Mach Exception Handling Local (10.3.x) Kaspersky Internet Security 6.0.0.303 - IOCTL KLICK Local Exploit Kaspersky Internet Security 6.0.0.303 - IOCTL KLICK Local HP Tru64 Alpha OSF1 5.1 - 'ps' Information Leak Exploit HP Tru64 Alpha OSF1 5.1 - 'ps' Information Leak Plan 9 Kernel - 'devenv.c OTRUNC/pwrite' Local Exploit Plan 9 Kernel - 'devenv.c OTRUNC/pwrite' Local PHP 5.2.1 - 'substr_compare()' Information Leak Exploit PHP 5.2.1 - 'substr_compare()' Information Leak PHP 'COM' Extensions - inconsistent Win32 'safe_mode' Bypass Exploit PHP 'COM' Extensions - inconsistent Win32 'safe_mode' Bypass PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow Exploit PHP 5.2.1 - 'session_regenerate_id()' Double-Free Exploit PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free Exploit PHP 5.2.0 (OSX) - EXT/Filter Space Trimming Buffer Underflow PHP 5.2.1 - 'session_regenerate_id()' Double-Free PHP 5.2.0/5.2.1 - Rejected Session ID Double-Free PHP 4.4.6/5.2.1 - 'array_user_key_compare()' ZVAL dtor Local Exploit PHP 5.2.0 (OSX) - 'header()' Space Trimming Buffer Underflow Exploit PHP 4.4.6/5.2.1 - ext/gd Already Freed Resources Usage Exploit PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage Exploit PHP 5.2.1 - 'Unserialize()' Local Information Leak Exploit PHP < 4.4.5/5.2.1 - '_SESSION unset()' Local Exploit PHP 4.4.6/5.2.1 - 'array_user_key_compare()' ZVAL dtor Local PHP 5.2.0 (OSX) - 'header()' Space Trimming Buffer Underflow PHP 4.4.6/5.2.1 - ext/gd Already Freed Resources Usage PHP 5.2.1 - 'hash_update_file()' Freed Resource Usage PHP 5.2.1 - 'Unserialize()' Local Information Leak PHP < 4.4.5/5.2.1 - '_SESSION unset()' Local East Wind Software - 'advdaudio.ocx 1.5.1.1' Local Buffer Overflow PHP 5.x - (Win32service) Local 'Safe_Mode()' Bypass Exploit PHP 5.x - (Win32service) Local 'Safe_Mode()' Bypass PHP 'FFI' Extension 5.0.5 - 'Safe_mode' Local Bypass Exploit PHP 'Perl' Extension - 'Safe_mode' Bypass Exploit PHP 'FFI' Extension 5.0.5 - 'Safe_mode' Local Bypass PHP 'Perl' Extension - 'Safe_mode' Bypass Norman Virus Control - 'nvcoaft51.sys' ioctl BF672028 Exploit Norman Virus Control - 'nvcoaft51.sys' ioctl BF672028 Microsoft Visual Basic 6.0 - VBP_Open OLE Local CodeExec Exploit Microsoft Visual Basic 6.0 - VBP_Open OLE Local CodeExec PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass Exploit PHP 4.4.7/5.2.3 - MySQL/MySQLi 'Safe_Mode' Bypass Send ICMP Nasty Garbage (SING) - Append File Logrotate Exploit Send ICMP Nasty Garbage (SING) - Append File Logrotate SafeNet 10.4.0.12 - 'IPSecDrv.sys' Local kernel Ring0 SYSTEM Exploit SafeNet 10.4.0.12 - 'IPSecDrv.sys' Local kernel Ring0 SYSTEM DESlock+ < 3.2.6 - Local Kernel Ring0 link list zero SYSTEM Exploit DESlock+ < 3.2.6 - 'DLMFDISK.sy's Local kernel Ring0 SYSTEM Exploit DESlock+ < 3.2.6 - Local Kernel Ring0 link list zero SYSTEM DESlock+ < 3.2.6 - 'DLMFDISK.sy's Local kernel Ring0 SYSTEM Solaris 8/9/10 - 'fifofs I_PEEK' Local Kernel Memory Leak Exploit Solaris 8/9/10 - 'fifofs I_PEEK' Local Kernel Memory Leak VideoLAN VLC Media Player 0.8.6d SSA Parsing Double Sh311 - Universal Exploit Deterministic Network Enhancer - 'dne2000.sys' Kernel Ring0 SYSTEM Exploit VideoLAN VLC Media Player 0.8.6d SSA Parsing Double Sh311 - Universal Deterministic Network Enhancer - 'dne2000.sys' Kernel Ring0 SYSTEM Microsoft Windows Server 2003 - Token Kidnapping Local Exploit (PoC) Microsoft Windows Server 2003 - Token Kidnapping Local (PoC) Opera 9.62 - 'file://' Local Heap Overflow PHP 5.2.6 - 'error_log' Safe_mode Bypass Exploit Opera 9.62 - 'file://' Local Heap Overflow PHP 5.2.6 - 'error_log' Safe_mode Bypass RadASM 2.2.1.5 - '.rap' WindowCallProcA Pointer Hijack Exploit RadASM 2.2.1.5 - '.rap' WindowCallProcA Pointer Hijack PHP 'python' Extension - 'safe_mode' Local Bypass Exploit PHP 'python' Extension - 'safe_mode' Local Bypass Adobe Acrobat Reader - JBIG2 Universal Exploit Adobe Acrobat Reader - JBIG2 Universal xscreensaver 5.01 - Arbitrary File Disclosure Symlink Exploit xscreensaver 5.01 - Arbitrary File Disclosure Symlink Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer Exploit (SEH) (1) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer Exploit (SEH) (2) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer Exploit (SEH) (3) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer (SEH) (1) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer (SEH) (2) Easy Music Player 1.0.0.2 - 'wav' Universal Local Buffer (SEH) (3) pIPL 2.5.0 - '.PLS' / '.PL' Universal Local Buffer Exploit (SEH) pIPL 2.5.0 - '.PLS' / '.PL' Universal Local Buffer (SEH) Xenorate Media Player 2.6.0.0 - '.xpl' Universal Local Buffer Exploit (SEH) Xenorate Media Player 2.6.0.0 - '.xpl' Universal Local Buffer (SEH) KSP 2006 FINAL - '.m3u' Universal Local Buffer Exploit (SEH) KSP 2006 FINAL - '.m3u' Universal Local Buffer (SEH) BSD (Multiple Distributions) - 'setusercontext()' Exploit BSD (Multiple Distributions) - 'setusercontext()' Multiple Vulnerabilities Fat Player 0.6b - '.wav' Universal Local Buffer Exploit Fat Player 0.6b - '.wav' Universal Local Buffer Media Jukebox 8 - '.m3u' Universal Local Buffer Exploit (SEH) Media Jukebox 8 - '.m3u' Universal Local Buffer (SEH) Media Jukebox 8 - '.pls' Universal Local Buffer Exploit (SEH) Media Jukebox 8 - '.pls' Universal Local Buffer (SEH) Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer Exploit (SEH) (1) Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer (SEH) (1) Adobe Acrobat/Reader < 7.1.1/8.1.3/9.1 - Collab getIcon Universal Exploit Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer Exploit (SEH) (2) Adobe Acrobat/Reader < 7.1.1/8.1.3/9.1 - Collab getIcon Universal Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer (SEH) (2) Enlightenment - Linux Null PTR Dereference Exploit Framework Enlightenment - Linux Null PTR Dereference Framework AIMP2 Audio Converter - Playlist (SEH) AIMP2 Audio Converter - Playlist Overflow (SEH) VMware Fusion 2.0.5 - vmx86 kext Local Exploit (PoC) VMware Fusion 2.0.5 - vmx86 kext Local (PoC) VMware Virtual 8086 - Linux Local Ring0 Exploit VMware Virtual 8086 - Linux Local Ring0 Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor Exploit Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor Exploit Oracle - ctxsys.drvxtabc.create_tables Evil Cursor Exploit Oracle - ctxsys.drvxtabc.create_tables Exploit Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit Oracle - SYS.LT.MERGEWORKSPACE Evil Cursor Oracle - SYS.LT.COMPRESSWORKSPACETREE Evil Cursor Oracle - ctxsys.drvxtabc.create_tables Evil Cursor Oracle - ctxsys.drvxtabc.create_tables Oracle - SYS.LT.REMOVEWORKSPACE Evil Cursor Exploit Easy RM to MP3 2.7.3.700 - Ruby Easy RM to MP3 2.7.3.700 - (Ruby) VirtualDJ Trial 6.0.6 'New Year Edition' - '.m3u' Overflow Authentium SafeCentral 2.6 - 'shdrv.sys' Local Kernel Ring0 SYSTEM Exploit Authentium SafeCentral 2.6 - 'shdrv.sys' Local Kernel Ring0 SYSTEM WM Downloader 3.0.0.9 (Windows XP SP3) - PLS PLA Exploit WM Downloader 3.0.0.9 (Windows XP SP3) - PLS PLA Free MP3 CD Ripper 2.6 - '.wav' Exploit Free MP3 CD Ripper 2.6 - '.wav' Winamp 5.572 - 'whatsnew.txt' Exploit (SEH) (Metasploit) Winamp 5.572 - 'whatsnew.txt' (SEH) (Metasploit) FreeBSD - 'nfs_mount()' Exploit FreeBSD 8.0/7.3/7.2 - 'nfs_mount()' Privilege Escalation GSM SIM Utility 5.15 - Direct RET Local Exploit GSM SIM Utility 5.15 - Direct RET Local Apple iOS - '.pdf' Jailbreak Exploit Exploit Easy RM to MP3 2.7.3.700 - '.m3u' / '.pls' / '.smi' / '.wpl' / '.wax' / '.wvx' / '.ram' Exploit Apple iOS - '.pdf' Jailbreak Easy RM to MP3 2.7.3.700 - '.m3u' / '.pls' / '.smi' / '.wpl' / '.wax' / '.wvx' / '.ram' Microsoft Excel - FEATHEADER Record Exploit (MS09-067) Microsoft Excel - FEATHEADER Record (MS09-067) Foxit Reader 4.0 - '.pdf' Jailbreak Exploit Foxit Reader 4.0 - '.pdf' Jailbreak Microsoft Vista - 'fveapi.dll' BitLocker Drive Encryption API Hijacking Exploit Microsoft Vista - 'fveapi.dll' BitLocker Drive Encryption API Hijacking AudioTran 1.4.2.4 - SafeSEH + SEHOP Exploit AudioTran 1.4.2.4 - SafeSEH + SEHOP Oracle Solaris - 'su' Local Exploit Oracle Solaris - 'su' Local Trend Micro Titanium Maximum Security 2011 - Local Kernel Exploit Trend Micro Titanium Maximum Security 2011 - Local Kernel G Data TotalCare 2011 - Local Kernel Exploit G Data TotalCare 2011 - Local Kernel DriveCrypt 5.3 - Local Kernel Ring0 SYSTEM Exploit DriveCrypt 5.3 - Local Kernel Ring0 SYSTEM FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak Exploit AoA DVD Creator 2.5 - ActiveX Stack Overflow AoA Mp4 Converter 4.1.0 - ActiveX Stack Overflow DESlock+ < 4.1.10 - 'vdlptokn.sys' Local Kernel Ring0 SYSTEM Exploit FreeBSD 5.4-RELEASE ftpd 6.00LS - 'sendfile' Memory Leak AoA DVD Creator 2.5 - ActiveX Stack Overflow AoA Mp4 Converter 4.1.0 - ActiveX Stack Overflow DESlock+ < 4.1.10 - 'vdlptokn.sys' Local Kernel Ring0 SYSTEM MPlayer (r33064 Lite) - Buffer Overflow + ROP Exploit MPlayer (r33064 Lite) - Buffer Overflow + ROP Adobe Reader X 10.0.0 < 10.0.1 - Atom Type Confusion Exploit Adobe Reader X 10.0.0 < 10.0.1 - Atom Type Confusion DVD X Player 5.5.0 Professional / Standard - '.plf' File Universal Exploit (ASLR + DEP Bypass) DVD X Player 5.5.0 Professional / Standard - '.plf' File Universal (ASLR + DEP Bypass) Linux Kernel 2.6.37-rc1 - 'serial_multiport_struct' Local Information Leak Exploit Linux Kernel 2.6.37-rc1 - 'serial_multiport_struct' Local Information Leak Microsoft Office 2008 SP0 (Mac) - RTF pFragments Exploit Microsoft Office 2008 SP0 (Mac) - RTF pFragments Lattice Semiconductor PAC-Designer 6.21 - '.PAC' Exploit Lattice Semiconductor PAC-Designer 6.21 - '.PAC' Overflow SGI IRIX 5.3/6.2 & SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Exploit SGI IRIX 6.4 & SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Exploit Digital Ultrix 4.0/4.1 - '/usr/bin/chroot' Privilege Escalation SunOS 4.1.1 - '/usr/release/bin/makeinstall' Privilege Escalation SunOS 4.1.1 - '/usr/release/bin/winstall' Privilege Escalation SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Privilege Escalation SGI IRIX 6.4 / SGI license_oeo 3.0/3.1/3.1.1 LicenseManager - 'LICENSEMGR_FILE_ROOT' Privilege Escalation ISC BIND 4.9.7 -T1B - named SIGINT and SIGIOT Symlink Exploit ISC BIND 4.9.7 -T1B - named SIGINT / SIGIOT Symlink Sun Solaris 2.6 - power management Exploit Sun Solaris 7.0 - 'sdtcm_convert' Exploit Sun Solaris 2.6 - power management Sun Solaris 7.0 - '/usr/dt/bin/sdtcm_convert' Overflow / Privilege Escalation Microsoft Windows - 'April Fools 2001' Exploit Microsoft Windows - 'April Fools 2001' Solaris 2.5.1 - 'ffbconfig' Exploit Solaris 2.5.1 - 'chkey' Exploit Solaris 2.5.1 - 'Ping' Exploit SGI IRIX 6.4 - 'ioconfig' Exploit Solaris 2.5.1 - 'ffbconfig' Privilege Escalation Solaris 2.5.1 - 'chkey' Privilege Escalation Solaris 2.5.1 - 'Ping' SGI IRIX 6.4 - 'ioconfig' Privilege Escalation BSD/OS 2.1 / DG/UX 7.0 / Debian 1.3 / HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.4 / Solaris 2.5.1 - 'xlock' Exploit (1) BSD/OS 2.1 / DG/UX 7.0 / Debian 1.3 / HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.4 / Solaris 2.5.1 - 'xlock' Overflow / Privilege Escalation (1) Solaris 2.5.1 - 'automount' Exploit BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Exploit (1) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Exploit (2) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Exploit (3) Solaris 2.5.1 - 'automount' Privilege Escalation BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Overflow / Privilege Escalation (1) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Overflow / Privilege Escalation (2) BSD/OS 2.1 / Caldera UnixWare 7/7.1.0 / FreeBSD 1.1.5.1/2.0 / HP HP-UX 10.34 / IBM AIX 4.2 / SGI IRIX 6.3 / SunOS 4.1.4 - 'libXt Library' Overflow / Privilege Escalation (3) Allaire ColdFusion Server 4.0.1 - 'CFCRYPT.EXE' Exploit Allaire ColdFusion Server 4.0.1 - 'CFCRYPT.EXE' Solaris 7.0 - 'cancel' Exploit Solaris 7.0 - 'chkperm' Exploit Solaris 7.0 - 'cancel' Privilege Escalation Solaris 7.0 - 'chkperm' G. Wilford man 2.3.10 - Symlink Exploit G. Wilford man 2.3.10 - Symlink S.u.S.E. Linux 5.2 - gnuplot Exploit S.u.S.E. Linux 5.2 - 'gnuplot' Stanford University bootpd 2.4.3 / Debian 2.0 - netstd Exploit X11R6 3.3.3 - Symlink Exploit Sun Solaris 7.0 - 'ff.core' Exploit S.u.S.E. 5.2 - 'lpc' Exploit SGI IRIX 6.2 - '/usr/lib/netaddpr' Exploit NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' Exploit SGI IRIX 6.2 - 'cdplayer' Exploit Stanford University bootpd 2.4.3 / Debian 2.0 - netstd X11R6 3.3.3 - Symlink Sun Solaris 7.0 - 'ff.core' Privilege Escalation S.u.S.E. 5.2 - 'lpc' Privilege Escalation SGI IRIX 6.2 - '/usr/lib/netaddpr' Privilege Escalation NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at(1)' SGI IRIX 6.2 - 'cdplayer' Privilege Escalation SGI IRIX 5.3 - 'Cadmin' Exploit SGI IRIX 6.0.1 - 'colorview' Exploit SGI IRIX 5.3 - 'Cadmin' Privilege Escalation SGI IRIX 6.0.1 - 'colorview' SGI IRIX 6.2 - day5notifier Exploit SGI IRIX 6.3 - 'df' Exploit SGI IRIX 6.4 - datman/cdman Exploit SGI IRIX 6.2 - 'eject' Exploit (1) SGI IRIX 6.2 - 'eject' Exploit (2) RedHat Linux 2.1 - 'abuse.console' Exploit SGI IRIX 6.2 - 'fsdump' Exploit SGI IRIX 6.2 - 'day5notifier' SGI IRIX 6.3 - 'df' Privilege Escalation SGI IRIX 6.4 - 'datman'/'cdman' SGI IRIX 6.2 - 'eject' Privilege Escalation (1) SGI IRIX 6.2 - 'eject' Privilege Escalation (2) RedHat Linux 2.1 - 'abuse.console' Privilege Escalation SGI IRIX 6.2 - 'fsdump' Privilege Escalation IBM AIX 4.3 - 'infod' Exploit IBM AIX 4.3 - 'infod' Privilege Escalation SGI IRIX 6.4 - 'inpview' Exploit RedHat Linux 5.0 - 'msgchk' Exploit SGI IRIX 6.4 - 'inpview' Privilege Escalation RedHat Linux 5.0 - 'msgchk' Privilege Escalation SGI IRIX 6.4 - login Exploit RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' Exploit (1) RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' Exploit (2) SGI IRIX 6.4 - 'netprint' Exploit SGI IRIX 6.4 - 'login' RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' (1) RedHat Linux 4.2 / SGI IRIX 6.3 / Solaris 2.6 - 'mailx' (2) SGI IRIX 6.4 - 'netprint' Privilege Escalation SGI IRIX 5.3/6.2 - 'ordist' Exploit SGI IRIX 5.3/6.2 - 'ordist' Privilege Escalation SGI IRIX 5.3 - 'pkgadjust' Exploit SGI IRIX 5.3 - 'pkgadjust' Privilege Escalation IBM AIX 3.2.5 - 'IFS' Exploit IBM AIX 3.2.5 - 'IFS' Privilege Escalation SGI IRIX 6.3 - 'pset' Exploit SGI IRIX 6.4 - 'rmail' Exploit SGI IRIX 6.3 - 'pset' Privilege Escalation SGI IRIX 6.4 - 'rmail' SGI IRIX 5.2/5.3 - 'serial_ports' Exploit SGI IRIX 6.4 - 'suid_exec' Exploit SGI IRIX 5.1/5.2- 'sgihelp' Exploit SGI IRIX 6.4 - 'startmidi' Exploit SGI IRIX 6.3 - 'Systour' / 'OutOfBox' Exploit SGI IRIX 6.4 - 'xfsdump' Exploit SGI IRIX 5.2/5.3 - 'serial_ports' Privilege Escalation SGI IRIX 6.4 - 'suid_exec' Privilege Escalation SGI IRIX 5.1/5.2 - 'sgihelp' SGI IRIX 6.4 - 'startmidi' Privilege Escalation SGI IRIX 6.3 - 'Systour' / 'OutOfBox' Privilege Escalation SGI IRIX 6.4 - 'xfsdump' Privilege Escalation Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS Exploit (2) Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS (2) GNU glibc 2.1/2.1.1 -6 - 'pt_chown' Exploit GNU glibc 2.1/2.1.1 -6 - 'pt_chown' Privilege Escalation Common Desktop Environment 2.1 20 / Solaris 7.0 - dtspcd Exploit Common Desktop Environment 2.1 20 / Solaris 7.0 - 'dtspcd' SCO Open Server 5.0.5 - 'userOsa' Symlink Exploit SCO Open Server 5.0.5 - 'userOsa' Symlink BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow Exploit (1) BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow Exploit (2) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS Exploit (1) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS Exploit (2) BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow (1) BSD/OS 2.1/3.0 / Larry Wall Perl 5.0 03 / RedHat 4.0/4.1 / SGI Freeware 1.0/2.0 SUIDPerl - Overflow (2) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (1) UNICOS 9/MAX 1.3/mk 1.5 / AIX 4.2 / libc 5.2.18 / RedHat 4 / IRIX 6 / Slackware 3 - NLS (2) S.u.S.E. Linux 6.1/6.2 - cwdtools Exploit S.u.S.E. Linux 6.1/6.2 - 'cwdtools' Solaris 7.0 - 'kcms_configure Exploit Solaris 7.0 - 'kcms_configure' FreeBSD 3.3 - 'gdc' Symlink Exploit FreeBSD 3.3 - 'gdc' Symlink SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'uidadmin' Exploit SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'uidadmin' Privilege Escalation SCO Unixware 7.1 - 'pkg' Exploit SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'coredump' Symlink Exploit SCO Unixware 7.1 - 'pkg' Privilege Escalation SCO Unixware 7.0/7.0.1/7.1/7.1.1 - 'coredump' Symlink Nortel Networks Optivity NETarchitect 2.0 - PATH Exploit SGI IRIX 6.2 - midikeys/soundplayer Exploit Nortel Networks Optivity NETarchitect 2.0 - PATH SGI IRIX 6.2 - 'midikeys'/'soundplayer' Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path Exploit (1) Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path Exploit (2) Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (1) Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path (2) FreeBSD 3.4 / NetBSD 1.4.1 / OpenBSD 2.6 - '/proc' FileSystem Exploit FreeBSD 3.4 / NetBSD 1.4.1 / OpenBSD 2.6 - '/proc' FileSystem Debian 2.1 - apcd Symlink Exploit Debian 2.1 - apcd Symlink SCO Unixware 7.1/7.1.1 - ARCserver /tmp Symlink Exploit Microsoft Windows 95/98/NT 4.0 - autorun.inf Exploit FreeBSD 3.0/3.1/3.2/3.3/3.4 - 'Asmon'/'Ascpu' Exploit Sun Workshop 5.0 - Licensing Manager Symlink Exploit SCO Unixware 7.1/7.1.1 - ARCserver /tmp Symlink Microsoft Windows 95/98/NT 4.0 - 'autorun.inf' FreeBSD 3.0/3.1/3.2/3.3/3.4 - 'Asmon'/'Ascpu' Sun Workshop 5.0 - Licensing Manager Symlink Corel Linux OS 1.0 - buildxconfig Exploit Corel Linux OS 1.0 - setxconf Exploit Corel Linux OS 1.0 - buildxconfig Corel Linux OS 1.0 - 'setxconf' Matt Kimball and Roger Wolff mtr 0.28/0.41 / Turbolinux 3.5 b2/4.2/4.4/6.0 - mtr Exploit (2) Matt Kimball and Roger Wolff mtr 0.28/0.41 / Turbolinux 3.5 b2/4.2/4.4/6.0 - mtr (2) Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - imwheel Exploit (1) Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - imwheel Exploit (2) Halloween Linux 4.0 / S.u.S.E. Linux 6.0/6.1/6.2/6.3 - kreatecd Exploit Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (1) Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel' (2) Halloween Linux 4.0 / S.u.S.E. Linux 6.0/6.1/6.2/6.3 - 'kreatecd' Be BeOS 4.0/4.5/5.0 - IP Packet Length Field Exploit QSSL QNX 4.25 A - 'crypt()' Exploit Be BeOS 4.0/4.5/5.0 - IP Packet Length Field QSSL QNX 4.25 A - 'crypt()' Privilege Escalation RedHat Linux 6.0/6.1/6.2 - pam_console Exploit RedHat Linux 6.0/6.1/6.2 - 'pam_console' Netscape Communicator 4.5/4.51/4.6/4.61/4.7/4.72/4.73 - '/tmp' Symlink Exploit Netscape Communicator 4.5/4.51/4.6/4.61/4.7/4.72/4.73 - '/tmp' Symlink OpenLDAP 1.2.7/1.2.8/1.2.9/1.2.10 - '/usr/tmp/' Symlink Exploit OpenLDAP 1.2.7/1.2.8/1.2.9/1.2.10 - '/usr/tmp/' Symlink HP-UX 10.20/11.0 - man '/tmp' Symlink Exploit HP-UX 10.20/11.0 - man '/tmp' Symlink Oracle Internet Directory 2.0.6 - oidldap Exploit Oracle Internet Directory 2.0.6 - oidldap HP-UX 10.20/11.0 - crontab '/tmp' File Exploit Exim Buffer 1.6.2/1.6.51 - Overflow Exploit HP-UX 10.20/11.0 - crontab '/tmp' File Exim Buffer 1.6.2/1.6.51 - Overflow PHP 5.3.4 Win Com Module - Com_sink Exploit PHP 5.3.4 Win Com Module - Com_sink Zoner Photo Studio 15 Build 3 - 'Zps.exe' Registry Value Parsing Exploit Zoner Photo Studio 15 Build 3 - 'Zps.exe' Registry Value Parsing BlazeVideo HDTV Player 6.6 Professional - Direct RETN Exploit Aviosoft Digital TV Player Professional 1.x - '.PLF' Direct Retn Exploit BlazeVideo HDTV Player 6.6 Professional - Direct RETN Aviosoft Digital TV Player Professional 1.x - '.PLF' Direct Retn BlazeDVD 6.1 - '.PLF' File Exploit (ASLR + DEP Bypass) (Metasploit) BlazeDVD 6.1 - '.PLF' File (ASLR + DEP Bypass) (Metasploit) Inmatrix Ltd. Zoom Player 8.5 - '.jpeg' Exploit Inmatrix Ltd. Zoom Player 8.5 - '.jpeg' HexChat 2.9.4 - Local Exploit HexChat 2.9.4 - Local Microsoft Windows NT/2000/2003/2008/XP/Vista/7/8 - 'EPATHOBJ' Local Ring Exploit Microsoft Windows NT/2000/2003/2008/XP/Vista/7/8 - 'EPATHOBJ' Local Ring Winamp 5.63 - 'winamp.ini' Local Exploit Winamp 5.63 - 'winamp.ini' Local Nginx (Debian-Based Distros + Gentoo) - 'logrotate' Privilege Escalation Nginx (Debian Based Distros + Gentoo) - 'logrotate' Privilege Escalation PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass Exploit PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass Apple 2.0.4 - Safari Local Exploit Apple 2.0.4 - Safari Local Notepad++ Plugin Notepad 1.5 - Local Exploit Notepad++ Plugin Notepad 1.5 - Local Overflow Castripper 2.50.70 - '.pls' DEP Bypass Exploit Castripper 2.50.70 - '.pls' DEP Bypass Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write Exploit (2) Linux Kernel 3.4 < 3.13.2 (Ubuntu 13.10) - 'CONFIG_X86_X32' Arbitrary Write (2) suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass Exploit suPHP 0.7 - 'suPHP_ConfigPath' / 'Safe_Mode()' Restriction Bypass PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass Exploit PHP 5.2.9 cURL - 'Safe_mode' / 'open_basedir' Restriction Bypass Adobe Reader for Android - 'addJavascriptInterface' Exploit (Metasploit) Adobe Reader for Android < 11.2.0 - 'addJavascriptInterface' Local Overflow (Metasploit) glibc - NUL Byte gconv_translit_find Off-by-One Exploit glibc - NUL Byte gconv_translit_find Off-by-One Microsoft Windows - OLE Package Manager SandWorm Exploit Microsoft Windows - OLE Package Manager SandWorm PonyOS 3.0 - VFS Permissions Exploit PonyOS 3.0 - VFS Permissions PonyOS 3.0 - TTY 'ioctl()' Local Kernel Exploit PonyOS 3.0 - TTY 'ioctl()' Local Kernel Microsoft Windows - ClientCopyImage Win32k Exploit (MS15-051) (Metasploit) Microsoft Windows - ClientCopyImage Win32k (MS15-051) (Metasploit) Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy Exploit Mozilla Firefox < 39.03 - 'pdf.js' Same Origin Policy Google Android - get_user/put_user Exploit (Metasploit) Google Android - get_user/put_user (Metasploit) IKEView.exe R60 - '.elg' Local Exploit (SEH) IKEView.exe R60 - '.elg' Local (SEH) IKEView R60 - Buffer Overflow Local Exploit (SEH) IKEView R60 - Buffer Overflow Local (SEH) Gold MP4 Player - '.swf' Local Exploit Gold MP4 Player - '.swf' Local Easy RM to MP3 Converter 2.7.3.700 - '.m3u' File Exploit (Universal ASLR + DEP Bypass) Easy RM to MP3 Converter 2.7.3.700 - '.m3u' File (Universal ASLR + DEP Bypass) Apple iOS < 10.3.1 - Kernel Exploit Apple iOS < 10.3.1 - Kernel Linux Kernel - 'offset2lib Stack Clash' Exploit Linux Kernel - 'offset2lib Stack Clash' Microsoft IIS - WebDAV 'ntdll.dll' Remote Exploit Microsoft IIS 5.0 - WebDAV Remote Exploit (PoC) Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Exploit Microsoft IIS - WebDAV 'ntdll.dll' Remote Microsoft IIS 5.0 - WebDAV Remote (PoC) Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Microsoft Windows 2000/XP - SMB Authentication Remote Exploit RealServer < 8.0.2 (Windows Platforms) - Remote Exploit Microsoft Windows 2000/XP - SMB Authentication Remote RealServer < 8.0.2 (Windows Platforms) - Remote Overflow CommuniGate Pro Webmail 4.0.6 - Session Hijacking Exploit CommuniGate Pro Webmail 4.0.6 - Session Hijacking Webfroot Shoutbox < 2.32 (Apache) - Remote Exploit Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution Microsoft Internet Explorer - Object Tag Exploit (MS03-020) Apache 2.0.45 - 'APR' Remote Exploit Microsoft Internet Explorer - Object Tag (MS03-020) Apache 2.0.45 - 'APR' Remote Yahoo Messenger 5.5 - 'DSR-ducky.c' Remote Exploit Yahoo Messenger 5.5 - 'DSR-ducky.c' Remote Microsoft Windows Media Services - Remote Exploit (MS03-022) eXtremail 1.5.x (Linux) - Remote Format Strings Exploit ColdFusion MX - Remote Development Service Exploit Microsoft Windows Media Services - Remote (MS03-022) eXtremail 1.5.x (Linux) - Remote Format Strings ColdFusion MX - Remote Development Service Microsoft Windows Media Services - 'nsiislog.dll' Remote Exploit Microsoft Windows Media Services - 'nsiislog.dll' Remote Citadel/UX BBS 6.07 - Remote Exploit Citadel/UX BBS 6.07 - Remote Microsoft Windows XP/2000 - 'RPC DCOM' Remote Exploit (MS03-026) Microsoft Windows XP/2000 - 'RPC DCOM' Remote (MS03-026) Microsoft Windows - 'RPC DCOM' Remote Exploit (1) Microsoft Windows - 'RPC DCOM' Remote Exploit (2) Microsoft Windows - 'RPC DCOM' Remote (1) Microsoft Windows - 'RPC DCOM' Remote (2) Microsoft Windows - 'RPC DCOM' Remote Exploit (Universal) Microsoft Windows - 'RPC DCOM' Remote (Universal) Microsoft Internet Explorer - Object Data Remote Exploit (MS03-032) Microsoft Internet Explorer - Object Data Remote (MS03-032) Linux pam_lib_smb < 1.1.6 - '/bin/login' Remote Exploit Linux pam_lib_smb < 1.1.6 - '/bin/login' Remote Overflow MySQL 3.23.x/4.0.x - Remote Exploit MySQL 3.23.x/4.0.x - Remote Buffer Overflow Microsoft Windows - 'RPC DCOM2' Remote Exploit (MS03-039) Microsoft Windows - 'RPC DCOM2' Remote (MS03-039) Microsoft Windows - 'RPC2' Universal Exploit / Denial of Service (RPC3) (MS03-039) Microsoft Windows - 'RPC2' Universal / Denial of Service (RPC3) (MS03-039) NIPrint LPD-LPR Print Server 4.10 - Remote Exploit Microsoft Windows XP/2000 - RPC Remote Non Exec Memory Exploit NIPrint LPD-LPR Print Server 4.10 - Remote Microsoft Windows XP/2000 - RPC Remote Non Exec Memory Microsoft FrontPage Server Extensions - 'fp30reg.dll' Exploit (MS03-051) Microsoft Windows - Workstation Service WKSSVC Remote Exploit (MS03-049) IA WebMail Server 3.x - 'iaregdll.dll 1.0.0.5' Remote Exploit Apache mod_gzip (with debug_mode) 1.2.26.1a - Remote Exploit Opera 7.22 - File Creation and Execution Exploit (WebServer) Microsoft Windows XP - Workstation Service Remote Exploit (MS03-049) Microsoft FrontPage Server Extensions - 'fp30reg.dll' (MS03-051) Microsoft Windows - Workstation Service WKSSVC Remote (MS03-049) IA WebMail Server 3.x - 'iaregdll.dll 1.0.0.5' Remote Apache mod_gzip (with debug_mode) 1.2.26.1a - Remote Opera 7.22 - File Creation and Execution (WebServer) Microsoft Windows XP - Workstation Service Remote (MS03-049) Microsoft Windows Messenger Service (French) - Remote Exploit (MS03-043) Eznet 3.5.0 - Remote Stack Overflow Universal Exploit Microsoft Windows Messenger Service (French) - Remote (MS03-043) Eznet 3.5.0 - Remote Stack Overflow Universal RhinoSoft Serv-U FTPd Server 3.x/4.x - 'SITE CHMOD' Remote Exploit RhinoSoft Serv-U FTPd Server 3.x/4.x - 'SITE CHMOD' Remote Eudora 6.0.3 (Windows) - Attachment Spoofing Exploit Eudora 6.0.3 (Windows) - Attachment Spoofing Cisco - Cisco Global Exploiter Tool Cisco - Cisco Global er Tool BFTPd - 'vsprintf()' Format Strings Exploit INND/NNRP < 1.6.x - Overflow Exploit BFTPd - 'vsprintf()' Format Strings INND/NNRP < 1.6.x - Overflow BFTPd 1.0.12 - Remote Exploit BFTPd 1.0.12 - Remote Overflow Check Point VPN-1/FireWall-1 4.1 SP2 - Blocked Port Bypass Exploit OpenBSD ftpd 2.6/2.7 - Remote Exploit Linux Kernel 2.2 - TCP/IP Weakness Spoof IP Exploit WU-FTPD 2.6.0 - Remote Format Strings Exploit Check Point VPN-1/FireWall-1 4.1 SP2 - Blocked Port Bypass OpenBSD ftpd 2.6/2.7 - Remote Linux Kernel 2.2 - TCP/IP Weakness Spoof IP WU-FTPD 2.6.0 - Remote Format Strings Cisco - Password Bruteforcer Exploit Netscape Enterprise Server 4.0/sparc/SunOS 5.7 - Remote Exploit Cisco - Password Bruteforcer Netscape Enterprise Server 4.0/sparc/SunOS 5.7 - Remote Command Execution IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Exploit TCP Connection Reset - Remote Exploit IMAP4rev1 12.261/12.264/2000.284 - 'lsub' Remote Microsoft Windows XP/2000 - 'Lsasrv.dll' Remote Universal Exploit (MS04-011) Microsoft Windows XP/2000 - 'Lsasrv.dll' Remote Universal (MS04-011) Borland Interbase 7.x - Remote Exploit Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Exploit Borland Interbase 7.x - Remote Buffer Overflow Subversion 1.0.2 - 'svn_time_from_cstring()' Remote Microsoft Internet Explorer - Remote Application.Shell Exploit Microsoft Internet Explorer - Remote Application.Shell Microsoft Internet Explorer - Remote Wscript.Shell Exploit Linux imapd - Remote Overflow File Retrieve Exploit Microsoft Internet Explorer - Remote Wscript.Shell Linux imapd - Remote Overflow / File Retrieve OpenFTPd 0.30.2 - Remote Exploit OpenFTPd 0.30.2 - Remote Remote CVS 1.11.15 - 'error_prog_name' Remote Exploit WU-IMAP 2000.287(1-2) - Remote Exploit rsync 2.5.1 - Remote Exploit (1) rsync 2.5.1 - Remote Exploit (2) Remote CVS 1.11.15 - 'error_prog_name' Arbitrary Code Execution WU-IMAP 2000.287(1-2) - Remote rsync 2.5.1 - Remote (1) rsync 2.5.1 - Remote (2) D-Link DCS-900 Camera - Remote IP Address Changer Exploit D-Link DCS-900 Camera - Remote IP Address Changer AOL Instant Messenger AIM - 'Away' Message Remote Exploit (2) AOL Instant Messenger AIM - 'Away' Message Remote (2) Citadel/UX 6.23 - Remote USER Directive Exploit Citadel/UX 6.23 - Remote USER Directive Microsoft Windows - JPEG GDI+ Overflow Shellcode Exploit Microsoft Windows - JPEG GDI+ Overflow Shellcode Microsoft Windows - JPEG GDI+ Overflow Administrator Exploit (MS04-028) Microsoft Windows - JPEG GDI+ Overflow Download Shellcode Exploit (MS04-028) Microsoft Windows - JPEG GDI+ Overflow Administrator (MS04-028) Microsoft Windows - JPEG GDI+ Overflow Download Shellcode (MS04-028) Eudora 6.2.0.7 - Attachment Spoofer Exploit Eudora 6.2.0.7 - Attachment Spoofer Microsoft Windows - Compressed Zipped Folders Exploit (MS04-034) Microsoft Windows - Compressed Zipped Folders (MS04-034) PHP 4.3.7/5.0.0RC3 - memory_limit Remote Exploit PHP 4.3.7/5.0.0RC3 - memory_limit Remote SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Exploit SHOUTcast DNAS/Linux 1.9.4 - Format String Remote Apple iTunes - Playlist Buffer Overflow Download Shellcode Exploit Apple iTunes - Playlist Buffer Overflow Download Shellcode Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Exploit Microsoft Internet Explorer - '.ANI' Universal Exploit (MS05-002) Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow Microsoft Internet Explorer - '.ANI' Universal (MS05-002) Microsoft Internet Explorer - '.ANI' Downloader Exploit (MS05-002) Microsoft Internet Explorer - '.ANI' Downloader (MS05-002) 3CServer 1.1 (FTP Server) - Remote Exploit MSN Messenger - '.png' Image Buffer Overflow Download Shellcode Exploit 3CServer 1.1 (FTP Server) - Remote MSN Messenger - '.png' Image Buffer Overflow Download Shellcode Exim 4.43 - 'auth_spa_server()' Remote Exploit (PoC) Exim 4.43 - 'auth_spa_server()' Remote (PoC) Thomson TCW690 - POST Password Validation Exploit SHOUTcast 1.9.4 (Windows) - File Request Format String Remote Exploit Thomson TCW690 - POST Password Validation SHOUTcast 1.9.4 (Windows) - File Request Format String Remote LimeWire 4.1.2 < 4.5.6 - 'GET' Remote Exploit LimeWire 4.1.2 < 4.5.6 - 'GET' Remote Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote Exploit Cyrus imapd 2.2.4 < 2.2.8 - 'imapmagicplus' Remote MailEnable Enterprise 1.x - IMAPd Remote Exploit MailEnable Enterprise 1.x - IMAPd Remote HP-UX FTPD 1.1.214.4 - 'REST' Remote Brute Force Exploit HP-UX FTPD 1.1.214.4 - 'REST' Remote Brute Force dSMTP Mail Server 3.1b (Linux) - Format String Exploit dSMTP Mail Server 3.1b (Linux) - Format String ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie Exploit ViRobot Advanced Server 2.0 - 'addschup' Remote Cookie Microsoft Windows Message Queuing - Buffer Overflow Universal Exploit (MS05-017) (v.0.3) Microsoft Internet Explorer - 'javaprxy.dll' COM Object Remote Exploit Nokia Affix < 3.2.0 - btftp Remote Client Exploit Microsoft Windows Message Queuing - Buffer Overflow Universal (MS05-017) (v.0.3) Microsoft Internet Explorer - 'javaprxy.dll' COM Object Remote Nokia Affix < 3.2.0 - btftp Remote Client Hosting Controller 0.6.1 HotFix 2.1 - Change Credit Limit Exploit Baby Web Server 2.6.2 - Command Validation Exploit Hosting Controller 0.6.1 HotFix 2.1 - Change Credit Limit Baby Web Server 2.6.2 - Command Validation Small HTTP Server 3.05.28 - Arbitrary Data Execution Exploit HP OpenView OmniBack II - Generic Remote Exploit Small HTTP Server 3.05.28 - Arbitrary Data Execution HP OpenView OmniBack II - Generic Remote CA BrightStor ARCserve Backup Agent - 'dbasqlr.exe' Remote Exploit CA BrightStor ARCserve Backup Agent - 'dbasqlr.exe' Remote Microsoft Internet Explorer - 'blnmgr.dll' COM Object Remote Exploit (MS05-038) Microsoft Internet Explorer - 'blnmgr.dll' COM Object Remote (MS05-038) Veritas Backup Exec (Windows) - Remote File Access Exploit (Metasploit) Microsoft Windows Plug-and-Play Service - Remote Universal Exploit (MS05-039) Veritas Backup Exec (Windows) - Remote File Access (Metasploit) Microsoft Windows Plug-and-Play Service - Remote Universal (MS05-039) Solaris 10 LPD - Arbitrary File Delete Exploit (Metasploit) Solaris 10 LPD - Arbitrary File Delete (Metasploit) Microsoft IIS 5.0 - '500-100.asp' Server Name Spoof Exploit Microsoft Windows Plug-and-Play Service - Remote Universal Exploit (Spanish) (MS05-039) Microsoft Windows Plug-and-Play Service (French) - Remote Universal Exploit (MS05-039) Microsoft IIS 5.0 - '500-100.asp' Server Name Spoof Microsoft Windows Plug-and-Play Service - Remote Universal (Spanish) (MS05-039) Microsoft Windows Plug-and-Play Service (French) - Remote Universal (MS05-039) HP OpenView Network Node Manager 7.50 - Remote Exploit DameWare Mini Remote Control 4.0 < 4.9 - Client Agent Remote Exploit HP OpenView Network Node Manager 7.50 - Remote DameWare Mini Remote Control 4.0 < 4.9 - Client Agent Remote Mozilla Browsers - 0xAD (HOST:) Remote Heap Buffer Overrun Exploit (2) Mozilla Browsers - 0xAD (HOST:) Remote Heap Buffer Overrun (2) HP-UX FTP Server - Unauthenticated Directory Listing Exploit (Metasploit) HP-UX FTP Server - Unauthenticated Directory Listing (Metasploit) Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Exploit Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Exploit Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Exploit Veritas NetBackup 6.0 (Linux) - 'bpjava-msvc' Remote Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Veritas NetBackup 6.0 (OSX) - 'bpjava-msvc' Remote Mirabilis ICQ 2003a - Buffer Overflow Download Shellcode Exploit Mirabilis ICQ 2003a - Buffer Overflow Download Shellcode Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote Exploit (3) Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote Exploit (4) Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (3) Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (4) Microsoft Windows - DTC Remote Exploit (PoC) (MS05-051) (2) Microsoft Windows - DTC Remote (PoC) (MS05-051) (2) Mercury Mail Transport System 4.01b - PH SERVER Remote Exploit Mercury Mail Transport System 4.01b - PH SERVER Remote Farmers WIFE 4.4 sp1 - 'FTP' Remote System Access Exploit Farmers WIFE 4.4 sp1 - 'FTP' Remote System Access Microsoft Internet Explorer 6.0 SP0 - IsComponentInstalled() Remote Exploit (Metasploit) Microsoft Internet Explorer 6.0 SP0 - IsComponentInstalled() Remote (Metasploit) Microsoft Internet Explorer - 'createTextRang' Download Shellcode Exploit (1) Microsoft Internet Explorer - 'createTextRang' Remote Exploit (Metasploit) Microsoft Internet Explorer - 'createTextRang' Download Shellcode (1) Microsoft Internet Explorer - 'createTextRang' Remote (Metasploit) Microsoft Internet Explorer - 'createTextRang' Download Shellcode Exploit (2) Microsoft Internet Explorer - 'createTextRang' Download Shellcode (2) MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage Exploit MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage Microsoft Windows - DHCP Client Broadcast Exploit (MS06-036) Microsoft Windows - DHCP Client Broadcast (MS06-036) Microsoft Windows - CanonicalizePathName() Remote Exploit (MS06-040) Microsoft Windows - CanonicalizePathName() Remote (MS06-040) Easy File Sharing FTP Server 2.0 - 'PASS' Remote Exploit (PoC) Easy File Sharing FTP Server 2.0 - 'PASS' Remote (PoC) Microsoft Internet Explorer - WebViewFolderIcon setSlice() Exploit (HTML) Microsoft Internet Explorer - WebViewFolderIcon setSlice() Exploit (1) Microsoft Internet Explorer - WebViewFolderIcon setSlice() Exploit (2) McAfee ePo 3.5.0 / ProtectionPilot 1.1.0 - Source Remote Exploit (Metasploit) Microsoft Internet Explorer - WebViewFolderIcon setSlice() (HTML) Microsoft Internet Explorer - WebViewFolderIcon setSlice() (1) Microsoft Internet Explorer - WebViewFolderIcon setSlice() (2) McAfee ePo 3.5.0 / ProtectionPilot 1.1.0 - Source Remote (Metasploit) AEP SmartGate 4.3b - 'GET' Arbitrary File Download Exploit Cisco VPN 3000 Concentrator 4.1.7/4.7.2 - 'FTP' Remote Exploit AEP SmartGate 4.3b - 'GET' Arbitrary File Download Cisco VPN 3000 Concentrator 4.1.7/4.7.2 - 'FTP' Remote MiniHTTPServer Web Forum & File Sharing Server 4.0 - Add User Exploit MiniHTTPServer Web Forum & File Sharing Server 4.0 - Add User Easy File Sharing Web Server 4 - Remote Information Stealer Exploit EFS Easy Address Book Web Server 1.2 - Remote File Stream Exploit Easy File Sharing Web Server 4 - Remote Information Stealer EFS Easy Address Book Web Server 1.2 - Remote File Stream Oracle 9i/10g - 'read/write/execute' Exploitation Suite Oracle 9i/10g - 'read/write/execute' ation Suite Oracle 9i/10g - 'utl_file' FileSystem Access Exploit Oracle 9i/10g - 'utl_file' FileSystem Access Microsoft Windows - ASN.1 Remote Exploit (MS04-007) Microsoft Windows - ASN.1 Remote (MS04-007) Rediff Bol Downloader - ActiveX Control Execute Local File Exploit Rediff Bol Downloader - ActiveX Control Execute Local File Microsoft Internet Explorer - VML Download and Execute Exploit (MS07-004) Microsoft Internet Explorer - VML Download and Execute (MS07-004) PA168 Chipset IP Phones - Weak Session Management Exploit PA168 Chipset IP Phones - Weak Session Management Lotus Domino R6 Webmail - Remote Password Hash Dumper Exploit Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack Exploit Lotus Domino R6 Webmail - Remote Password Hash Dumper Portable OpenSSH 3.6.1p-PAM/4.1-SuSE - Timing Attack Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission Exploit Oracle 10g - KUPV$FT.ATTACH_JOB Grant/Revoke dba Permission Exploit Oracle 10g - KUPW$WORKER.MAIN Grant/Revoke dba Permission Oracle 10g - KUPV$FT.ATTACH_JOB Grant/Revoke dba Permission NetProxy 4.03 - Web Filter Evasion / Bypass Logging Exploit 3Com TFTP Service (3CTftpSvc) 2.0.1 - Long Transporting Mode Exploit (Perl) NetProxy 4.03 - Web Filter Evasion / Bypass Logging 3Com TFTP Service (3CTftpSvc) 2.0.1 - Long Transporting Mode (Perl) PHP 5.2.0 - EXT/Filter FDF Post Filter Bypass Exploit PHP 5.2.0 - EXT/Filter FDF Post Filter Bypass Mercur Messaging 2005 (Windows 2000 SP4) - IMAP 'Subscribe' Remote Exploit Mercur Messaging 2005 < SP4 - IMAP Remote Exploit (Egghunter) Mercur Messaging 2005 (Windows 2000 SP4) - IMAP 'Subscribe' Remote Mercur Messaging 2005 < SP4 - IMAP Remote (Egghunter) Microsoft DNS Server - Dynamic DNS Updates Remote Exploit Microsoft DNS Server - Dynamic DNS Updates Remote Ethernet Device Drivers Frame Padding - 'Etherleak' Infomation Leakage Exploit Ethernet Device Drivers Frame Padding - 'Etherleak' Infomation Leakage Microsoft Internet Explorer - Recordset Double-Free Memory Exploit (MS07-009) Easy File Sharing FTP Server 2.0 (Windows 2000 SP4) - 'PASS' Remote Exploit Microsoft Internet Explorer - Recordset Double-Free Memory (MS07-009) Easy File Sharing FTP Server 2.0 (Windows 2000 SP4) - 'PASS' Remote CA BrightStor Backup 11.5.2.0 - 'Mediasvr.exe' Remote Code Exploit CA BrightStor Backup 11.5.2.0 - 'Mediasvr.exe' Remote Code IBM Lotus Domino Server 6.5 - Unauthenticated Remote Exploit IBM Lotus Domino Server 6.5 - Unauthenticated Remote Microsoft Windows - Animated Cursor '.ani' Remote Exploit (eeye patch Bypass) Microsoft Windows - Animated Cursor '.ani' Remote (eeye patch Bypass) Microsoft Windows - Animated Cursor '.ani' Universal Exploit Generator Microsoft Windows - Animated Cursor '.ani' Universal Generator MiniWebsvr 0.0.7 - Remote Directory Traversal Virtual CD 9.0.0.2 - 'vc9api.DLL' Remote Shell Commands Execution Exploit Virtual CD 9.0.0.2 - 'vc9api.DLL' Remote Shell Commands Execution EDraw Office Viewer Component - Unsafe Method Exploit EDraw Office Viewer Component - Unsafe Method Vivotek Motion Jpeg Control - 'MjpegDecoder.dll 2.0.0.13' Remote Exploit Vivotek Motion Jpeg Control - 'MjpegDecoder.dll 2.0.0.13' Remote IBM Tivoli Provisioning Manager - Unauthenticated Remote Exploit IBM Tivoli Provisioning Manager - Unauthenticated Remote Zenturi ProgramChecker - 'ActiveX NavigateUrl()' Insecure Method Exploit Yahoo! Messenger Webcam 8.1 - 'Ywcvwr.dll' Download / Execute Exploit Yahoo! Messenger Webcam 8.1 - 'Ywcupl.dll' Download / Execute Exploit Zenturi ProgramChecker - 'ActiveX NavigateUrl()' Insecure Method Yahoo! Messenger Webcam 8.1 - 'Ywcvwr.dll' Download / Execute Yahoo! Messenger Webcam 8.1 - 'Ywcupl.dll' Download / Execute HP Digital Imaging 'hpqxml.dll 2.0.0.133' - Arbitrary Data Write Exploit HP Digital Imaging 'hpqxml.dll 2.0.0.133' - Arbitrary Data Write HP Digital Imaging 'hpqvwocx.dll 2.1.0.556' - 'SaveToFile()' Exploit HP Digital Imaging 'hpqvwocx.dll 2.1.0.556' - 'SaveToFile()' Apache Tomcat Connector mod_jk - 'exec-shield' Remote Exploit Apache Tomcat Connector mod_jk - 'exec-shield' Remote SecureBlackbox 'PGPBBox.dll 5.1.0.112' - Arbitrary Data Write Exploit SecureBlackbox 'PGPBBox.dll 5.1.0.112' - Arbitrary Data Write Nessus Vulnerability Scanner 3.0.6 - ActiveX Remote Delete File Exploit Nessus Vulnerability Scanner 3.0.6 - ActiveX Remote Delete File VMware 'IntraProcessLogging.dll' 5.5.3.42958 - Arbitrary Data Write Exploit VMware 'IntraProcessLogging.dll' 5.5.3.42958 - Arbitrary Data Write BIND 9 0.3beta - DNS Cache Poisoning Exploit BIND 9 0.3beta - DNS Cache Poisoning NVR SP2 2.0 'nvUnifiedControl.dll 1.1.45.0' - 'SetText()' Remote Exploit NVR SP2 2.0 'nvUnifiedControl.dll 1.1.45.0' - 'SetText()' Remote Telecom Italy Alice Messenger - Remote Registry Key Manipulation Exploit Telecom Italy Alice Messenger - Remote Registry Key Manipulation Lighttpd 1.4.16 - FastCGI Header Overflow Remote Exploit Lighttpd 1.4.16 - FastCGI Header Overflow Remote Apple QuickTime /w IE .qtl Version XAS - Remote Exploit (PoC) Apple QuickTime /w IE .qtl Version XAS - Remote (PoC) Lighttpd 1.4.17 - FastCGI Header Overflow Remote Exploit Lighttpd 1.4.17 - FastCGI Header Overflow Remote Motorola Timbuktu Pro 8.6.5 - File Deletion/Creation Exploit Tor < 0.1.2.16 - ControlPort Remote Rewrite Exploit Motorola Timbuktu Pro 8.6.5 - File Deletion/Creation Tor < 0.1.2.16 - ControlPort Remote Rewrite Apple iTouch/iPhone 1.1.1 - '.tif' File Remote Jailbreak Exploit PBEmail 7 - ActiveX Edition Insecure Method Exploit Apple iTouch/iPhone 1.1.1 - '.tif' File Remote Jailbreak PBEmail 7 - ActiveX Edition Insecure Method IBM Lotus Domino 7.0.2FP1 - IMAP4 Server LSUB Command Exploit IBM Lotus Domino 7.0.2FP1 - IMAP4 Server LSUB Command SonicWALL SSL-VPN - 'NeLaunchCtrl' ActiveX Control Remote Exploit EDraw Flowchart ActiveX Control 2.0 - Insecure Method Exploit SonicWALL SSL-VPN - 'NeLaunchCtrl' ActiveX Control Remote EDraw Flowchart ActiveX Control 2.0 - Insecure Method Apple QuickTime 7.2/7.3 (Internet Explorer 7 / Firefox / Opera) - RTSP Response Universal Exploit Apple QuickTime 7.2/7.3 (Internet Explorer 7 / Firefox / Opera) - RTSP Response Universal Apple QuickTime 7.2/7.3 - RSTP Response Universal Exploit Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal Exploit Apple QuickTime 7.2/7.3 - RSTP Response Universal Apple QuickTime 7.2/7.3 (OSX/Windows) - RSTP Response Universal Microsoft Windows Server 2000 SP4 (Advanced Server) - Message Queue Exploit (MS07-065) Microsoft Windows Server 2000 SP4 (Advanced Server) - Message Queue (MS07-065) Macrovision FlexNet - 'isusweb.dll' DownloadAndExecute Method Exploit Macrovision FlexNet - 'isusweb.dll' DownloadAndExecute Method Sejoong Namo ActiveSquare 6 - 'NamoInstaller.dll' install Method Exploit Sejoong Namo ActiveSquare 6 - 'NamoInstaller.dll' install Method MailBee Objects 5.5 - 'MailBee.dll' Remote Insecure Method Exploit Chilkat Mail ActiveX 7.8 - 'ChilkatCert.dll' Insecure Method Exploit MailBee Objects 5.5 - 'MailBee.dll' Remote Insecure Method Chilkat Mail ActiveX 7.8 - 'ChilkatCert.dll' Insecure Method Chilkat FTP ActiveX 2.0 - 'ChilkatCert.dll' Insecure Method Exploit Chilkat FTP ActiveX 2.0 - 'ChilkatCert.dll' Insecure Method Backup Exec System Recovery Manager 7.0.1 - Arbitrary File Upload Rising AntiVirus Online Scanner - Insecure Method Flaw Exploit Rising AntiVirus Online Scanner - Insecure Method Flaw NetWin Surgemail 3.8k4-4 - IMAP Authenticated Remote LIST Universal Exploit NetWin Surgemail 3.8k4-4 - IMAP Authenticated Remote LIST Universal IBiz E-Banking Integrator 2.0 - ActiveX Edition Insecure Method Exploit IBiz E-Banking Integrator 2.0 - ActiveX Edition Insecure Method C6 Messenger - ActiveX Remote Download and Execute Exploit C6 Messenger - ActiveX Remote Download and Execute Akamai Download Manager < 2.2.3.7 - ActiveX Remote Download Exploit Akamai Download Manager < 2.2.3.7 - ActiveX Remote Download BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning Exploit (Metasploit) BIND 9.x - Remote DNS Cache Poisoning Exploit (Python) Microsoft Access - 'Snapview.ocx 10.0.5529.0' ActiveX Remote Exploit BIND 9.x - Remote DNS Cache Poisoning Exploit BIND 9.4.1 < 9.4.2 - Remote DNS Cache Poisoning (Metasploit) BIND 9.x - Remote DNS Cache Poisoning (Python) Microsoft Access - 'Snapview.ocx 10.0.5529.0' ActiveX Remote BIND 9.x - Remote DNS Cache Poisoning Cisco IOS 12.3(18) (FTP Server) - Remote Exploit (Attached to GDB) Cisco IOS 12.3(18) (FTP Server) - Remote (Attached to GDB) BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning Exploit BIND 9.5.0-P2 - 'Randomized Ports' Remote DNS Cache Poisoning Belkin Wireless G Router / ADSL2 Modem - Authentication Bypass Sun Solaris 10 - snoop(1M) Utility Remote Exploit Friendly Technologies - Read/Write Registry/Read Files Exploit Google Chrome 0.2.149.27 - Automatic File Download Exploit Sun Solaris 10 - snoop(1M) Utility Remote Friendly Technologies - Read/Write Registry/Read Files Google Chrome 0.2.149.27 - Automatic File Download Microworld Mailscan 5.6.a - Password Reveal Exploit Microworld Mailscan 5.6.a - Password Reveal NuMedia Soft Nms DVD Burning SDK - ActiveX 'NMSDVDX.dll' Exploit NuMedia Soft Nms DVD Burning SDK - ActiveX 'NMSDVDX.dll' Chilkat XML - ActiveX Arbitrary File Creation/Execution Exploit Chilkat XML - ActiveX Arbitrary File Creation/Execution Autodesk DWF Viewer Control / LiveUpdate Module - Remote Exploit GdPicture Pro - ActiveX 'gdpicture4s.ocx' File Overwrite / Exec Exploit Microsoft Windows - GDI (EMR_COLORMATCHTOTARGETW) Exploit (MS08-021) Autodesk DWF Viewer Control / LiveUpdate Module - Remote GdPicture Pro - ActiveX 'gdpicture4s.ocx' File Overwrite / Exec Microsoft Windows - GDI (EMR_COLORMATCHTOTARGETW) (MS08-021) PowerTCP FTP Module - Multiple Exploit Techniques (SEH HeapSpray) PowerTCP FTP Module - Multiple Techniques (SEH HeapSpray) MW6 Aztec - ActiveX 'Aztec.dll' Remote Insecure Method Exploit MW6 Barcode - ActiveX 'Barcode.dll' Insecure Method Exploit MW6 Datamatrix - ActiveX 'Datamatrix.dll' Insecure Method Exploit MW6 PDF417 - ActiveX 'MW6PDF417.dll' Remote Insecure Method Exploit MW6 Aztec - ActiveX 'Aztec.dll' Remote Insecure Method MW6 Barcode - ActiveX 'Barcode.dll' Insecure Method MW6 Datamatrix - ActiveX 'Datamatrix.dll' Insecure Method MW6 PDF417 - ActiveX 'MW6PDF417.dll' Remote Insecure Method GE Fanuc Real Time Information Portal 2.6 - 'writeFile()' API Exploit (Metasploit) GE Fanuc Real Time Information Portal 2.6 - 'writeFile()' API (Metasploit) Microsoft Windows - SmbRelay3 NTLM Replay Exploit (MS08-068) Microsoft Windows - SmbRelay3 NTLM Replay (MS08-068) DD-WRT v24-sp1 - Cross-Site Reference Forgery Microsoft Internet Explorer (Windows Vista) - XML Parsing Buffer Overflow Chilkat FTP - ActiveX (SaveLastError) Insecure Method Exploit Chilkat FTP - ActiveX (SaveLastError) Insecure Method ExcelOCX ActiveX 3.2 - Download File Insecure Method Exploit ExcelOCX ActiveX 3.2 - Download File Insecure Method GuildFTPd FTP Server 0.999.14 - Remote Delete Files Exploit GuildFTPd FTP Server 0.999.14 - Remote Delete Files GeoVision LiveAudio - ActiveX Remote Freed-Memory Access Exploit Morovia Barcode ActiveX 3.6.2 - 'MrvBarCd.dll' Insecure Method Exploit RhinoSoft Serv-U FTP Server 7.4.0.1 - 'MKD' Create Arbitrary Directories Exploit GeoVision LiveAudio - ActiveX Remote Freed-Memory Access Morovia Barcode ActiveX 3.6.2 - 'MrvBarCd.dll' Insecure Method RhinoSoft Serv-U FTP Server 7.4.0.1 - 'MKD' Create Arbitrary Directories Sysax Multi Server 4.3 - Arbitrary Delete Files Exploit Sysax Multi Server 4.3 - Arbitrary Delete Files Expoit IncrediMail 5.86 - Cross-Site Scripting Script Execution Exploit IncrediMail 5.86 - Cross-Site Scripting Script Execution Pirelli Discus DRG A225 wifi router - WPA2PSK Default Algorithm Exploit Pirelli Discus DRG A225 wifi router - WPA2PSK Default Algorithm Linux Kernel 2.6.20/2.6.24/2.6.27_7-10 (Ubuntu 7.04/8.04/8.10 / Fedora Core 10 / OpenSuse 11.1) - SCTP FWD Memory Corruption Remote Exploit Linux Kernel 2.6.20/2.6.24/2.6.27_7-10 (Ubuntu 7.04/8.04/8.10 / Fedora Core 10 / OpenSuse 11.1) - SCTP FWD Memory Corruption Remote httpdx 0.8 - FTP Server Delete/Get/Create Directories/Files Exploit httpdx 0.8 - FTP Server Delete/Get/Create Directories/Files Bopup Communications Server 3.2.26.5460 - Remote SYSTEM Exploit Bopup Communications Server 3.2.26.5460 - Remote SYSTEM Green Dam - Remote Change System Time Exploit Green Dam - Remote Change System Time Microsoft Office Web Components Spreadsheet - ActiveX 'OWC10/11' Exploit Microsoft Office Web Components Spreadsheet - ActiveX 'OWC10/11' Oracle Secure Backup Server 10.3.0.1.0 - Authentication Bypass / Remote Code Injection Exploit Oracle Secure Backup Server 10.3.0.1.0 - Authentication Bypass / Remote Code Injection IBM Installation Manager 1.3.0 - 'iim://' URI handler Exploit EMC Captiva QuickScan Pro 4.6 SP1 and EMC Documentum ApllicationXtender Desktop 5.4 (keyhelp.ocx 1.2.312) - Remote Exploit Oracle - Document Capture BlackIce DEVMODE Exploit IBM Installation Manager 1.3.0 - 'iim://' URI handler EMC Captiva QuickScan Pro 4.6 SP1 and EMC Documentum ApllicationXtender Desktop 5.4 (keyhelp.ocx 1.2.312) - Remote Oracle - Document Capture BlackIce DEVMODE Sun Java Runtime and Development Kit 6 Update 10 - Calendar Deserialization Exploit (Metasploit) Sun Java Runtime and Development Kit 6 Update 10 - Calendar Deserialization (Metasploit) AoA MP4 Converter 4.1.2 - ActiveX Exploit AoA MP4 Converter 4.1.2 - ActiveX Snort 2.4.0 < 2.4.3 - Back Orifice Pre-Preprocessor Remote Exploit (Metasploit) Snort 2.4.0 < 2.4.3 - Back Orifice Pre-Preprocessor Remote (Metasploit) Unreal Tournament 2004 - 'Secure' Overflow Exploit (Metasploit) Unreal Tournament 2004 - 'Secure' Overflow (Metasploit) AoA Audio Extractor Basic 2.3.7 - ActiveX Exploit AoA DVD Creator 2.6.2 - ActiveX Exploit AoA Audio Extractor Basic 2.3.7 - ActiveX AoA DVD Creator 2.6.2 - ActiveX Microsoft Internet Explorer 6 - Aurora Exploit Microsoft Internet Explorer 6 - Aurora Exploit EFS Software Easy Chat Server 2.2 - Buffer Overflow EFS Software Easy Chat Server 2.2 - Buffer Overflow AOL 9.5 - ActiveX Heap Spray Exploit AOL 9.5 - ActiveX Heap Spray (Gabriel's FTP Server) Open & Compact FTPd 1.2 - Unauthenticated Remote Exploit (Gabriel's FTP Server) Open & Compact FTPd 1.2 - Unauthenticated Remote Microsoft Internet Explorer 6/7 - Remote Code Execution (Remote User Add Exploit) Microsoft Internet Explorer 6/7 - Remote Code Execution (Remote User Add) Apache 2.2.14 mod_isapi - Dangling Pointer Remote SYSTEM Exploit SAP GUI 7.10 - WebViewer3D Active-X JIT-Spray Exploit Apache 2.2.14 mod_isapi - Dangling Pointer Remote SYSTEM SAP GUI 7.10 - WebViewer3D Active-X JIT-Spray Microsoft Internet Explorer - 'iepeers.dll' Use-After-Free Exploit (Metasploit) Microsoft Internet Explorer - 'iepeers.dll' Use-After-Free (Metasploit) Magneto Net Resource ActiveX 4.0.0.5 - 'NetFileClose' Universal Exploit Magneto Net Resource ActiveX 4.0.0.5 - 'NetConnectionEnum' Universal Exploit Magneto Net Resource ActiveX 4.0.0.5 - 'NetShareEnum' Universal Exploit Magneto Net Resource ActiveX 4.0.0.5 - 'NetFileClose' Universal Magneto Net Resource ActiveX 4.0.0.5 - 'NetConnectionEnum' Universal Magneto Net Resource ActiveX 4.0.0.5 - 'NetShareEnum' Universal Xftp client 3.0 - 'PWD' Remote Exploit Xftp client 3.0 - 'PWD' Remote HP Digital Imaging - 'hpodio08.dll' Insecure Method Exploit HP Digital Imaging - 'hpodio08.dll' Insecure Method ProSSHD 1.2 - Authenticated Remote Exploit (ASLR + DEP Bypass) ProSSHD 1.2 - Authenticated Remote (ASLR + DEP Bypass) Litespeed Technologies - Web Server Remote Poison Null Byte Exploit Litespeed Technologies - Web Server Remote Poison Null Byte Sun Java Web Server 7.0 u7 - Remote Exploit Sun Java Web Server 7.0 u7 - Remote Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote Exploit Apple Mac OSX EvoCam Web Server (Snow Leopard) - ROP Remote IBM AIX 5l - 'FTPd' Remote DES Hash Exploit IBM AIX 5l - 'FTPd' Remote DES Hash Barcodewiz Barcode ActiveX Control 3.29 - Remote HeapSpray Exploit (Internet Explorer 6/7) Barcodewiz Barcode ActiveX Control 3.29 - Remote HeapSpray (Internet Explorer 6/7) AoA Audio Extractor - Remote ActiveX SEH JIT Spray Exploit (ASLR + DEP Bypass) SopCast 3.2.9 - Remote Exploit AoA Audio Extractor - Remote ActiveX SEH JIT Spray (ASLR + DEP Bypass) SopCast 3.2.9 - Remote Adobe Acrobat Reader and Flash Player - 'newclass' Invalid Pointer Exploit Adobe Acrobat Reader and Flash Player - 'newclass' Invalid Pointer Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote Exploit Trend Micro Internet Security 2010 - 'UfPBCtrl.DLL' ActiveX Remote AoA Audio Extractor 2.x - ActiveX ROP Exploit AoA Audio Extractor 2.x - ActiveX ROP Microsoft ASP.NET - Auto-Decryptor File Download Exploit (MS10-070) Microsoft ASP.NET - Auto-Decryptor File Download (MS10-070) Mozilla Firefox 3.6.8 < 3.6.11 - Interleaving 'document.write' / 'appendChild' Exploit Mozilla Firefox 3.6.8 < 3.6.11 - Interleaving 'document.write' / 'appendChild' Google Android 2.0 < 2.1 - Reverse Shell Exploit Google Android 2.0 < 2.1 - Reverse Shell FreeBSD Litespeed Web Server 4.0.17 with PHP - Remote Exploit Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Crystal Reports Viewer 12.0.0.549 - 'PrintControl.dll' ActiveX Exploit Microsoft Internet Explorer 8 - CSS Parser Exploit Crystal Reports Viewer 12.0.0.549 - 'PrintControl.dll' ActiveX Microsoft Internet Explorer 8 - CSS Parser Novell iPrint 5.52 - ActiveX 'GetDriverSettings()' Remote Exploit Novell iPrint 5.52 - ActiveX 'GetDriverSettings()' Remote Sun Microsystems SunScreen Firewall - Root Exploit Sun Microsystems SunScreen Firewall - Privilege Escalation FTPGetter 3.58.0.21 - 'PASV' Buffer Overflow Exploit FTPGetter 3.58.0.21 - 'PASV' Buffer Overflow Sun Java - Calendar Deserialization Exploit (Metasploit) Sun Java - Calendar Deserialization (Metasploit) Java - 'Statement.invoke()' Trusted Method Chain Exploit (Metasploit) Java - 'Statement.invoke()' Trusted Method Chain (Metasploit) Veritas Backup Exec Name Service - Overflow Exploit (Metasploit) Veritas Backup Exec Name Service - Overflow (Metasploit) Microsoft Private Communications Transport - Overflow Exploit (MS04-011) (Metasploit) Microsoft Private Communications Transport - Overflow (MS04-011) (Metasploit) Microsoft RRAS Service - Overflow Exploit (MS06-025) (Metasploit) Microsoft RRAS Service - Overflow (MS06-025) (Metasploit) Microsoft NetDDE Service - Overflow Exploit (MS04-031) (Metasploit) Microsoft NetDDE Service - Overflow (MS04-031) (Metasploit) CA BrightStor Agent for Microsoft SQL - Overflow Exploit (Metasploit) CA BrightStor Agent for Microsoft SQL - Overflow (Metasploit) CA BrightStor Universal Agent - Overflow Exploit (Metasploit) CA BrightStor Universal Agent - Overflow (Metasploit) Knox Arkeia Backup Client Type 77 (Windows x86) - Overflow Exploit (Metasploit) Knox Arkeia Backup Client Type 77 (Windows x86) - Overflow (Metasploit) Mozilla Firefox - Interleaving 'document.write' / 'appendChild' Exploit (Metasploit) Mozilla Firefox - Interleaving 'document.write' / 'appendChild' (Metasploit) Microsoft Works 7 - 'WkImgSrv.dll' WKsPictureInterface() ActiveX Exploit (Metasploit) Microsoft Works 7 - 'WkImgSrv.dll' WKsPictureInterface() ActiveX (Metasploit) Microsoft RPC DCOM Interface - Overflow Exploit (MS03-026) (Metasploit) Microsoft RPC DCOM Interface - Overflow (MS03-026) (Metasploit) Savant Web Server 3.1 - Overflow Exploit (Metasploit) Savant Web Server 3.1 - Overflow (Metasploit) McAfee ePolicy Orchestrator / ProtectionPilot - Overflow Exploit (Metasploit) McAfee ePolicy Orchestrator / ProtectionPilot - Overflow (Metasploit) Snort Back Orifice - Pre-Preprocessor Remote Exploit (Metasploit) Snort Back Orifice - Pre-Preprocessor Remote (Metasploit) Knox Arkeia Backup Client Type 77 (OSX) - Overflow Exploit (Metasploit) Knox Arkeia Backup Client Type 77 (OSX) - Overflow (Metasploit) Samba 2.2.8 (BSD x86) - 'trans2open' Overflow Exploit (Metasploit) Samba 2.2.8 (BSD x86) - 'trans2open' Overflow (Metasploit) KingView 6.5.3 SCADA - ActiveX Exploit KingView 6.5.3 SCADA - ActiveX Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free Exploit Google Android 2.0/2.1/2.1.1 - WebKit Use-After-Free Progea Movicon 11 - 'TCPUploadServer' Remote Exploit Progea Movicon 11 - 'TCPUploadServer' Remote Adobe Flash Player < 10.1.53.64 - Action Script Type Confusion Exploit (ASLR + DEP Bypass) Adobe Flash Player < 10.1.53.64 - Action Script Type Confusion (ASLR + DEP Bypass) IBM Tivoli Endpoint 4.1.1 - Remote SYSTEM Exploit IBM Tivoli Endpoint 4.1.1 - Remote SYSTEM Black Ice Cover Page SDK - Insecure Method 'DownloadImageFileURL()' Exploit (Metasploit) Black Ice Cover Page SDK - Insecure Method 'DownloadImageFileURL()' (Metasploit) IBM Web Application Firewall - Bypass Exploit IBM Web Application Firewall - Bypass Symantec Backup Exec 12.5 - Man In The Middle Exploit Symantec Backup Exec 12.5 - Man In The Middle Mozilla Firefox 3.6.16 (Windows 7) - mChannel Object Use-After-Free Exploit Mozilla Firefox 3.6.16 (Windows 7) - mChannel Object Use-After-Free Sunway Force Control SCADA 6.1 SP3 - 'httpsrv.exe' Exploit Sunway Force Control SCADA 6.1 SP3 - 'httpsrv.exe' JBoss AS 2.0 - Remote Exploit JBoss AS 2.0 - Remote NJStar Communicator 3.00 - MiniSMTP Server Remote Exploit (Metasploit) NJStar Communicator 3.00 - MiniSMTP Server Remote (Metasploit) Oracle - xdb.xdb_pitrig_pkg.PITRIG_DROPMETADATA procedure Exploit Oracle - xdb.xdb_pitrig_pkg.PITRIG_DROPMETADATA procedure CoDeSys SCADA 2.3 - Remote Exploit CoDeSys SCADA 2.3 - Remote Buffer Overflow CoCSoft Stream Down 6.8.0 - Universal Exploit (Metasploit) Reaver - WiFi Protected Setup (WPS) Exploit CoCSoft Stream Down 6.8.0 - Universal (Metasploit) Reaver - WiFi Protected Setup (WPS) Mozilla Firefox 4.0.1 - 'Array.reduceRight()' Exploit Mozilla Firefox 4.0.1 - 'Array.reduceRight()' Apache Tomcat - Account Scanner / 'PUT' Request Remote Exploit Apache Tomcat - Account Scanner / 'PUT' Request Remote McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 - ActiveX 'GetObject()' Exploit McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 - ActiveX 'GetObject()' Berkeley Sendmail 5.58 - Debug Exploit Berkeley Sendmail 5.58 - Debug SunView (SunOS 4.1.1) - selection_svc Exploit SunOS 4.1.3 - LD_LIBRARY_PATH / LD_OPTIONS Exploit SunView (SunOS 4.1.1) - 'selection_svc' Remote File Read SunOS 4.1.3 - LD_LIBRARY_PATH / LD_OPTIONS IRIX 6.4 - 'pfdisplay.cgi' Exploit IRIX 6.4 - 'pfdisplay.cgi' Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Exploit (1) WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Exploit (2) Metainfo Sendmail 2.0/2.5 / MetaIP 3.1 - Upload / Execute Read Scripts WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Buffer Overflow (1) WU-FTPD 2.4.2 / SCO Open Server 5.0.5 / ProFTPd 1.2 pre1 - 'realpath' Buffer Overflow (2) HP JetAdmin 1.0.9 Rev. D - symlink Exploit HP JetAdmin 1.0.9 Rev. D - symlink XM Easy Personal FTP Server 5.30 - Remote Format String Write4 Exploit XM Easy Personal FTP Server 5.30 - Remote Format String Write4 Western Digital's WD TV Live SMP/Hub - Root Exploit Western Digital's WD TV Live SMP/Hub - Privilege Escalation Debian 2.1 - httpd Exploit Debian 2.1 - httpd SGI IRIX 6.2 - cgi-bin wrap Exploit SGI IRIX 6.3 - cgi-bin 'webdist.cgi' Exploit SGI IRIX 6.4 - cgi-bin handler Exploit SGI IRIX 6.5.2 - 'nsd'' Exploit SGI IRIX 6.2 - cgi-bin wrap SGI IRIX 6.3 - cgi-bin 'webdist.cgi' SGI IRIX 6.4 - cgi-bin handler SGI IRIX 6.5.2 - 'nsd' Information Gathering IBM AIX 3.2.5 - 'login(1)' Exploit IBM AIX 3.2.5 - 'login(1)' Privilege Escalation Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS Exploit (1) Microsoft Data Access Components (MDAC) 2.1 / Microsoft IIS 3.0/4.0 / Microsoft Index Server 2.0 / Microsoft Site Server Commerce Edition 3.0 i386 MDAC - RDS (1) Microsoft Windows 98a/98b/98SE / Solaris 2.6 - IRDP Exploit Microsoft Windows 98a/98b/98SE / Solaris 2.6 - IRDP ProFTPd 1.2 pre6 - 'snprintf' Remote Root Exploit ProFTPd 1.2 pre6 - 'snprintf' Remote Root Microsoft Internet Explorer 5.0/4.0.1 - iFrame Exploit Microsoft Internet Explorer 5.0/4.0.1 - iFrame PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog Exploit Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 Exploit (1) Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 Exploit (2) PHP/FI 1.0/FI 2.0/FI 2.0 b10 - mylog/mlog Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (1) Lucent Ascend MAX 5.0/Pipeline 6.0/TNT 1.0/2.0 Router - MAX UDP Port 9 (2) AN-HTTPd 1.2b - CGI Exploits AN-HTTPd 1.2b - CGI s Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Exploit Allaire ColdFusion Server 4.0/4.0.1 - 'CFCACHE' Information Disclosure RedHat 6.1 / IRIX 6.5.18 - 'lpd' Exploit RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution A-V Tronics InetServ 3.0 - WebMail GET Exploit A-V Tronics InetServ 3.0 - WebMail GET Cat Soft Serv-U FTP Server 2.5/a/b (Windows 95/98/2000/NT 4.0) - Shortcut Exploit Cat Soft Serv-U FTP Server 2.5/a/b (Windows 95/98/2000/NT 4.0) - Shortcut SGI InfoSearch 1.0 / SGI IRIX 6.5.x - fname Exploit SGI InfoSearch 1.0 / SGI IRIX 6.5.x - fname Cisco IOS 11.x/12.x - HTTP %% Exploit Cisco IOS 11.x/12.x - HTTP %% Netscape Professional Services FTP Server (LDAP Aware) 1.3.6 - FTP Server Exploit Netscape Professional Services FTP Server (LDAP Aware) 1.3.6 - FTP Server NCSA httpd-campas 1.2 - sample script Exploit NCSA httpd-campas 1.2 - sample script Microsoft Internet Explorer 5.5 - 'Index.dat' Exploit (MS00-055) Microsoft Internet Explorer 5.5 - 'Index.dat' (MS00-055) Novell NetWare Web Server 2.x - convert.bas Exploit Novell NetWare Web Server 2.x - convert.bas Microsoft Internet Explorer 5 - 'INPUT TYPE=FILE' Exploit Microsoft Internet Explorer 5 - 'INPUT TYPE=FILE' Novell Netware Web Server 3.x - files.pl Exploit Novell Netware Web Server 3.x - files.pl SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon Exploit SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon Sitecom MD-25x - Multiple Vulnerabilities / Reverse Root Exploit Sitecom MD-25x - Multiple Vulnerabilities Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuck.c' Remote Exploit Apache mod_ssl OpenSSL < 0.9.6d / < 0.9.7-beta2 - 'openssl-too-open.c' SSL2 KEY_ARG Overflow Exploit Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuck.c' Remote Buffer Overflow Apache mod_ssl OpenSSL < 0.9.6d / < 0.9.7-beta2 - 'openssl-too-open.c' SSL2 KEY_ARG Overflow BigAnt Server 2.52 SP5 - Stack Overflow ROP-Based Exploit (SEH) (ASLR + DEP Bypass) BigAnt Server 2.52 SP5 - Stack Overflow ROP-Based (SEH) (ASLR + DEP Bypass) IBM System Director Agent - Remote System Level Exploit IBM System Director Agent - Remote System Level MySQL - 'Stuxnet Technique' Windows Remote System Exploit MySQL - 'Stuxnet Technique' Windows Remote System Microsoft Internet Explorer 5 - window.open Search Pane Cross-Zone Scripting ActFax 5.01 - RAW Server Exploit (Metasploit) ActFax 5.01 - RAW Server (Metasploit) Mitsubishi MX ActiveX Component 3 - 'ActUWzd.dll' 'WzTitle' Remote Exploit Mitsubishi MX ActiveX Component 3 - 'ActUWzd.dll' 'WzTitle' Remote Adobe ColdFusion APSB13-03 - Remote Exploit (Metasploit) Adobe ColdFusion APSB13-03 - Remote Multiple Vulnerabilities (Metasploit) Plesk < 9.5.4 - Remote Exploit Plesk < 9.5.4 - Remote PCMan FTP Server 2.0.7 - Remote Exploit (Metasploit) PCMan FTP Server 2.0.7 - Remote (Metasploit) (Gabriel's FTP Server) Open & Compact FTP Server 1.2 - Authentication Bypass / Directory Traversal SAM Retrieval Exploit (Gabriel's FTP Server) Open & Compact FTP Server 1.2 - Authentication Bypass / Directory Traversal SAM Retrieval PHP 4.x - 'copy() Safe_Mode' Bypass Exploit PHP 4.x - 'copy() Safe_Mode' Bypass Microsoft PowerPoint 2003 - 'powerpnt.exe' Exploit Microsoft PowerPoint 2003 - 'powerpnt.exe' Microsoft Internet Explorer 6 - Code Execution (1) Microsoft Internet Explorer 6 - Code Execution (2) Microsoft Internet Explorer 6 - Code Execution (1) Microsoft Internet Explorer 6 - Code Execution (2) Nginx 1.4.0 (Generic Linux x64) - Remote Exploit Nginx 1.4.0 (Generic Linux x64) - Remote PHP 5.2.5 - cURL 'safe_mode' Security Bypass Exploit PHP 5.2.5 - cURL 'safe_mode' Security Bypass Oracle Forms and Reports 11.1 - Remote Exploit Oracle Forms and Reports 11.1 - Arbitrary Code Execution Novell eDirectory 8.x - eMBox Utility 'edirutil' Command Exploit Novell eDirectory 8.x - eMBox Utility 'edirutil' Command OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak Exploit (1) OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak Exploit (2) (DTLS Support) OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support) Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow Exploit Broadcom Wi-Fi SoC - TDLS Teardown Request Remote Heap Overflow SugarCRM 6.5.23 - REST PHP Object Injection Exploit (Metasploit) SugarCRM 6.5.23 - REST PHP Object Injection (Metasploit) NovaSTOR NovaNET 12.0 - Remote SYSTEM Exploit NovaSTOR NovaNET 12.0 - Remote SYSTEM Kolibri Web Server 2.0 - GET Exploit (SEH) Kolibri Web Server 2.0 - GET (SEH) GNU bash 4.3.11 - Environment Variable dhclient Exploit GNU bash 4.3.11 - Environment Variable dhclient Eclipse 3.6.1 - Help Server help/index.jsp URI Cross-Site Scripting Eclipse 3.6.1 - Help Server help/advanced/content.jsp URI Cross-Site Scripting Eclipse 3.6.1 - Help Server 'help/index.jsp' Cross-Site Scripting Eclipse 3.6.1 - Help Server 'help/advanced/content.jsp' Cross-Site Scripting Microsoft Windows - OLE Remote Code Execution 'Sandworm' Exploit (MS14-060) Microsoft Windows - OLE Remote Code Execution 'Sandworm' (MS14-060) tnftp (FreeBSD 8/9/10) - 'tnftp' Client Eide Exploit tnftp (FreeBSD 8/9/10) - 'tnftp' Client Side VSAT Sailor 900 - Remote Exploit VSAT Sailor 900 - Remote Bsplayer 2.68 - HTTP Response Universal Exploit Bsplayer 2.68 - HTTP Response Universal MS SQL Server 2000/2005 - SQLNS.SQLNamespace COM Object Refresh() Unhandled Pointer Exploit MS SQL Server 2000/2005 - SQLNS.SQLNamespace COM Object Refresh() Unhandled Pointer Microsoft Windows Media Center - MCL Exploit (MS15-100) (Metasploit) Microsoft Windows Media Center - MCL (MS15-100) (Metasploit) Adobe Flash - Object.unwatch Use-After-Free Exploit Adobe Flash - Object.unwatch Use-After-Free Google Android 5.0.1 - Metaphor Stagefright Exploit (ASLR Bypass) Google Android 5.0.1 - Metaphor Stagefright (ASLR Bypass) TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote Exploit TOPSEC Firewalls - 'ELIGIBLEBACHELOR' Remote D-Link DIR Routers - Unauthenticated HNAP Login Stack Buffer Overflow (Metasploit) D-Link DIR-Series Routers - Unauthenticated HNAP Login Stack Buffer Overflow (Metasploit) DC/OS Marathon UI - Docker Exploit (Metasploit) DC/OS Marathon UI - Docker (Metasploit) CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote Exploit CCBILL CGI - 'ccbillx.c' 'whereami.cgi' Remote phpBB 2.0.6 - 'search_id' SQL Injection MD5 Hash Remote Exploit PHP-Nuke 6.9 - 'cid' SQL Injection Remote Exploit phpBB 2.0.6 - 'search_id' SQL Injection MD5 Hash Remote PHP-Nuke 6.9 - 'cid' SQL Injection Remote UBBCentral UBB.Threads 6.2.x < 6.3x - One Char Brute Force Exploit UBBCentral UBB.Threads 6.2.x < 6.3x - One Char Brute Force phpBB 1.0.0/2.0.10 - 'admin_cash.php' Remote Exploit PHP 4.3.9 + phpBB 2.x - 'Unserialize()' Remote Exploit phpBB 1.0.0/2.0.10 - 'admin_cash.php' Remote Code Execution PHP 4.3.9 + phpBB 2.x - 'Unserialize()' Remote phpMyChat 0.14.5 - Remote Improper File Permissions Exploit e107 - 'include()' Remote Exploit phpMyChat 0.14.5 - Remote Improper File Permissions e107 - 'include()' Remote Siteman 1.1.10 - Remote Administrative Account Addition Exploit Siteman 1.1.10 - Remote Administrative Account Addition PostNuke PostWrap Module - Remote Exploit PHP-Nuke 7.4 - Admin Exploit PostNuke PostWrap Module - Remote PHP-Nuke 7.4 - Admin AWStats 5.7 < 6.2 - Multiple Remote Exploits (PoC) AWStats 5.7 < 6.2 - Multiple Remote Exploits AWStats 5.7 < 6.2 - Multiple Remote s (PoC) AWStats 5.7 < 6.2 - Multiple Remote s Aztek Forum 4.0 - 'myadmin.php' Database Dumper Exploit Aztek Forum 4.0 - 'myadmin.php' Database Dumper phpBB 2.0.13 - 'downloads.php' mod Remote Exploit phpBB 2.0.13 - 'Calendar Pro' mod Remote Exploit phpBB 2.0.13 - 'downloads.php' mod Remote phpBB 2.0.13 - 'Calendar Pro' mod Remote PhotoPost - Arbitrary Data Remote Exploit PhotoPost - Arbitrary Data Remote ZeroBoard 4.1 - preg_replace Remote nobody Shell Exploit ZeroBoard 4.1 - 'preg_replace' Remote Nobody Shell eXtropia Shopping Cart - 'web_store.cgi' Remote Exploit Mambo 4.5.2.1 - Fetch Password Hash Remote Exploit PHP Arena 1.1.3 - 'pafiledb.php' Remote Change Password Exploit eXtropia Shopping Cart - 'web_store.cgi' Remote Mambo 4.5.2.1 - Fetch Password Hash Remote PHP Arena 1.1.3 - 'pafiledb.php' Remote Change Password PHP-Fusion 6.00.105 - Accessible Database Backups Download Exploit PHP-Fusion 6.00.105 - Accessible Database Backups Download phpBB 2.0.15 - 'highlight' Database Authentication Details Exploit phpBB 2.0.15 - 'highlight' Database Authentication Details Hosting Controller 6.1 HotFix 2.2 - Add Domain without Quota Exploit Hosting Controller 6.1 HotFix 2.2 - Add Domain without Quota Simple PHP Blog 0.4.0 - Multiple Remote Exploits Simple PHP Blog 0.4.0 - Multiple Remote s MuOnline Loopholes Web Server - 'pkok.asp' SQL Injection Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution Exploit Guppy 4.5.9 - 'REMOTE_ADDR' Remote Commands Execution SimpleBBS 1.1 - Remote Commands Execution Exploit SimpleBBS 1.1 - Remote Commands Execution SimpleBBS 1.1 - Remote Commands Execution Exploit (C) SimpleBBS 1.1 - Remote Commands Execution (C) Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Overwrite Remote Exploit Limbo 1.0.4.2 - '_SERVER[REMOTE_ADDR]' Overwrite Remote phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command Exploit phpDocumentor 1.3.0 rc4 - Remote Commands Execution Exploit phpBB 2.0.17 - 'signature_bbcode_uid' Remote Command phpDocumentor 1.3.0 rc4 - Remote Commands Execution Magic News Plus 1.0.3 - Admin Pass Change Exploit Magic News Plus 1.0.3 - Admin Pass Change creLoaded 6.15 - 'HTMLAREA' Automated Perl Exploit creLoaded 6.15 - 'HTMLAREA' Automated Perl CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution Exploit SPIP 1.8.2g - Remote Commands Execution Exploit CPGNuke Dragonfly 9.0.6.1 - Remote Commands Execution SPIP 1.8.2g - Remote Commands Execution DocMGR 0.54.2 - 'file_exists' Remote Commands Execution Exploit DocMGR 0.54.2 - 'file_exists' Remote Commands Execution EnterpriseGS 1.0 rc4 - Remote Commands Execution Exploit FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution Exploit EnterpriseGS 1.0 rc4 - Remote Commands Execution FlySpray 0.9.7 - 'install-0.9.7.php' Remote Commands Execution PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution Exploit PHPKIT 1.6.1R2 - 'filecheck' Remote Commands Execution Coppermine Photo Gallery 1.4.3 - Remote Commands Execution Exploit Coppermine Photo Gallery 1.4.3 - Remote Commands Execution GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution Exploit GeekLog 1.x - 'error.log' (gpc = Off) Remote Commands Execution VHCS 2.4.7.1 - Add User Authentication Bypass Pentacle In-Out Board 6.03 - 'login.asp' Remote Authentication Bypass Farsinews 2.5 - Directory Traversal Arbitrary 'users.db' Access Exploit Farsinews 2.5 - Directory Traversal Arbitrary 'users.db' Access PHP-Stats 0.1.9.1 - Remote Commands Execution Exploit PHP-Stats 0.1.9.1 - Remote Commands Execution Gallery 2.0.3 - stepOrder[] Remote Commands Execution Exploit Gallery 2.0.3 - stepOrder[] Remote Commands Execution JiRos Banner Experience 1.0 - Create Authentication Bypass Remote Exploit JiRos Banner Experience 1.0 - Create Authentication Bypass Remote Simplog 0.9.2 - 's' Remote Commands Execution Exploit Simplog 0.9.2 - 's' Remote Commands Execution phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution Exploit phpWebSite 0.10.2 - 'hub_dir' Remote Commands Execution FlexBB 0.5.5 - '/inc/start.php?_COOKIE' SQL Bypass Exploit FlexBB 0.5.5 - '/inc/start.php?_COOKIE' SQL Bypass phpBB 2.0.20 - Admin/Restore DB/default_lang Remote Exploit Sugar Suite Open Source 4.2 - 'OptimisticLock' Remote Exploit phpBB 2.0.20 - Admin/Restore DB/default_lang Remote Sugar Suite Open Source 4.2 - 'OptimisticLock' Remote DeluxeBB 1.06 - 'Attachment mod_mime' Remote Exploit DeluxeBB 1.06 - 'Attachment mod_mime' Remote XOOPS 2.0.13.2 - 'xoopsOption[nocommon]' Remote Exploit XOOPS 2.0.13.2 - 'xoopsOption[nocommon]' Remote Command Execution Drupal 4.7 - 'Attachment mod_mime' Remote Exploit Drupal 4.7 - 'Attachment mod_mime' Remote EggBlog < 3.07 - Remote SQL Injection / Privilege Escalation Speedy ASP Forum - 'profileupdate.asp' User Pass Change Exploit Nukedit 4.9.6 - Unauthorized Admin Add Speedy ASP Forum - 'profileupdate.asp' User Pass Change Nukedit 4.9.6 - Unauthorized Admin Add aspWebLinks 2.0 - SQL Injection / Admin Pass Change Exploit aspWebLinks 2.0 - SQL Injection / Admin Pass Change FunkBoard CF0.71 - 'profile.php' Remote User Pass Change Exploit FunkBoard CF0.71 - 'profile.php' Remote User Pass Change myNewsletter 1.1.2 - 'adminLogin.asp' Authentication Bypass Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime Exploit Bitweaver 1.3 - 'tmpImagePath' Attachment mod_mime MyBulletinBoard (MyBB) 1.1.3 - 'usercp.php' Create Admin Exploit MyBulletinBoard (MyBB) 1.1.3 - 'usercp.php' Create Admin Phorum 5 - 'pm.php' Arbitrary Local Inclusion Exploit Phorum 5 - 'pm.php' Arbitrary Local Inclusion TinyPHP Forum 3.6 - 'makeAdmin' Remote Admin Maker Exploit TinyPHP Forum 3.6 - 'makeAdmin' Remote Admin Maker WEBInsta MM 1.3e - 'absolute_path' Remote File Inclusion Joomla! Component Poll 1.0.10 - Arbitrary Add Votes Exploit Joomla! Component Poll 1.0.10 - Arbitrary Add Votes Simple Machines Forum (SMF) 1.1 rc2 (Windows) - 'lngfile' Remote Exploit Simple Machines Forum (SMF) 1.1 rc2 (Windows) - 'lngfile' Remote Simple Machines Forum (SMF) 1.1 rc2 - Lock Topics Remote Exploit Simple Machines Forum (SMF) 1.1 rc2 - Lock Topics Remote PmWiki 2.1.19 - 'Zend_Hash_Del_Key_Or_Index' Remote Exploit PmWiki 2.1.19 - 'Zend_Hash_Del_Key_Or_Index' Remote TR Forum 2.0 - SQL Injection / Bypass Security Restriction Exploit TR Forum 2.0 - SQL Injection / Bypass Security Restriction phpBB 2.0.21 - Poison Null Byte Remote Exploit phpBB 2.0.21 - Poison Null Byte Remote Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin Exploit Blog Pixel Motion 2.1.1 - PHP Code Execution / Create Admin Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users Exploit Flatnuke 2.5.8 - 'userlang' Local Inclusion / Delete All Users Active Bulletin Board 1.1b2 - Remote User Pass Change Exploit Active Bulletin Board 1.1b2 - Remote User Pass Change JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface Exploit JaxUltraBB 2.0 - 'delete.php' Remote Auto Deface PHP League 0.81 - 'config.php' Remote File Inclusion MiraksGalerie 2.62 - 'pcltar.lib.php' Remote File Inclusion E Annu 1.0 - Authentication Bypass / SQL Injection Invision Power Board 2.1.7 - 'Debug' Remote Password Change Exploit Invision Power Board 2.1.7 - 'Debug' Remote Password Change iPrimal Forums - '/admin/index.php' Change User Password Exploit iPrimal Forums - '/admin/index.php' Change User Password Online Event Registration 2.0 - 'save_profile.asp' Pass Change Exploit Online Event Registration 2.0 - 'save_profile.asp' Pass Change Bandwebsite 1.5 - 'LOGIN' Remote Add Admin Enthrallweb eClassifieds 1.0 - Remote User Pass Change Exploit Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change Exploit Enthrallweb eNews 1.0 - Remote User Pass Change Exploit Enthrallweb eClassifieds 1.0 - Remote User Pass Change Enthrallweb eCoupons 1.0 - 'myprofile.asp' Remote Pass Change Enthrallweb eNews 1.0 - Remote User Pass Change Fishyshoop 0.930b - Remote Add Administrator Account Exploit Fishyshoop 0.930b - Remote Add Administrator Account Cahier de texte 2.2 - Bypass General Access Protection Exploit Cahier de texte 2.2 - Bypass General Access Protection Cacti 0.8.6i - 'copy_cacti_user.php' SQL Injection Create Admin Exploit Cacti 0.8.6i - 'copy_cacti_user.php' SQL Injection Create Admin IMGallery 2.5 - Create Uploader Script Exploit IMGallery 2.5 - Create Uploader Script TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator Exploit TaskTracker 1.5 - 'Customize.asp' Remote Add Administrator FdWeB Espace Membre 2.01 - 'path' Remote File Inclusion GuppY 4.5.16 - Remote Commands Execution Exploit GuppY 4.5.16 - Remote Commands Execution Extcalendar 2 - 'profile.php' Remote User Pass Change Exploit Extcalendar 2 - 'profile.php' Remote User Pass Change Advanced Poll 2.0.5-dev - Remote Admin Session Generator Exploit Advanced Poll 2.0.5-dev - Remote Admin Session Generator Site-Assistant 0990 - 'paths[version]' Remote File Inclusion AT Contenator 1.0 - 'Root_To_Script' Remote File Inclusion VS-News-System 1.2.1 - 'newsordner' Remote File Inclusion VS-Link-Partner 2.1 - 'script_pfad' Remote File Inclusion VS-News-System 1.2.1 - 'newsordner' Remote File Inclusion VS-Link-Partner 2.1 - 'script_pfad' Remote File Inclusion S-Gastebuch 1.5.3 - 'gb_pfad' Remote File Inclusion AJ Dating 1.0 - 'view_profile.php' SQL Injection AJ Classifieds 1.0 - 'postingdetails.php' SQL Injection AJ Dating 1.0 - 'view_profile.php' SQL Injection AJ Classifieds 1.0 - 'postingdetails.php' SQL Injection JobSitePro 1.0 - 'search.php' SQL Injection JGBBS 3.0beta1 - 'search.asp?author' SQL Injection WSN Guest 1.21 - 'id' SQL Injection Dayfox Blog 4 - 'postpost.php' Remote Code Execution Orion-Blog 2.0 - Remote Authentication Bypass WSN Guest 1.21 - 'id' SQL Injection Dayfox Blog 4 - 'postpost.php' Remote Code Execution Orion-Blog 2.0 - Remote Authentication Bypass Particle Blogger 1.2.0 - 'post.php?postid' SQL Injection PHP-Stats 0.1.9.1b - 'PHP-stats-options.php' Admin 2 'exec()' Exploit PHP-Stats 0.1.9.1b - 'PHP-stats-options.php' Admin 2 'exec()' Guestbara 1.2 - Change Admin Login and Password Exploit Guestbara 1.2 - Change Admin Login and Password Active NewsLetter 4.3 - 'ViewNewspapers.asp' SQL Injection eWebquiz 8 - 'eWebQuiz.asp' SQL Injection PBlang 4.66z - Remote Create Admin Exploit PBlang 4.66z - Remote Create Admin IceBB 1.0-rc5 - Remote Create Admin Exploit IceBB 1.0-rc5 - Remote Create Admin Joomla! Component D4JeZine 2.8 - Blind SQL Injection Web Content System 2.7.1 - Remote File Inclusion XOOPS Module Lykos Reviews 1.00 - 'index.php' SQL Injection WinMail Server 4.4 build 1124 - 'WebMail' Remote Add Super User Exploit WinMail Server 4.4 build 1124 - 'WebMail' Remote Add Super User XOOPS Module debaser 0.92 - 'genre.php' Blind SQL Injection XOOPS Module RM+Soft Gallery 1.0 - Blind SQL Injection XOOPS Module XFsection 1.07 - 'articleId' Blind SQL Injection XOOPS Module PopnupBlog 2.52 - 'postid' Blind SQL Injection phpMyNewsletter 0.6.10 - 'customize.php' Remote File Inclusion XOOPS Module WF-Snippets 1.02 (c) - Blind SQL Injection Mutant 0.9.2 - 'mutant_functions.php' Remote File Inclusion XOOPS Module WF-Snippets 1.02 (c) - Blind SQL Injection Mutant 0.9.2 - 'mutant_functions.php' Remote File Inclusion CodeBreak 1.1.2 - 'codebreak.php' Remote File Inclusion e107 0.7.8 - 'mailout.php' Authenticated Access Escalation Exploit e107 0.7.8 - 'mailout.php' Authenticated Access Escalation AimStats 3.2 - 'process.php?update' Remote Code Execution wavewoo 0.1.1 - 'loading.php?path_include' Remote File Inclusion The Merchant 2.2.0 - 'index.php?show' Remote File Inclusion phpMyPortal 3.0.0 RC3 - GLOBALS[CHEMINMODULES] Remote File Inclusion Snaps! Gallery 1.4.4 - Remote User Pass Change Exploit Snaps! Gallery 1.4.4 - Remote User Pass Change PHP FirstPost 0.1 - 'block.php?Include' Remote File Inclusion XOOPS Module resmanager 1.21 - Blind SQL Injection Alstrasoft e-Friends 4.21 - Admin Session Retrieve Exploit Alstrasoft Live Support 1.21 - Admin Credential Retrieve Exploit Alstrasoft e-Friends 4.21 - Admin Session Retrieve Alstrasoft Live Support 1.21 - Admin Credential Retrieve WordPress 2.1.3 - 'admin-ajax.php' SQL Injection Blind Fishing Exploit WordPress 2.1.3 - 'admin-ajax.php' SQL Injection Blind Fishing RevokeBB 1.0 RC4 - Blind SQL Injection / Hash Retrieve Exploit XOOPS Module icontent 1.0/4.5 - Remote File Inclusion RevokeBB 1.0 RC4 - Blind SQL Injection / Hash Retrieve XOOPS Module icontent 1.0/4.5 - Remote File Inclusion NewsSync for phpBB 1.5.0rc6 - Remote File Inclusion PHP Real Estate Classifieds - Remote File Inclusion Solar Empire 2.9.1.1 - Blind SQL Injection / Hash Retrieve Exploit Solar Empire 2.9.1.1 - Blind SQL Injection / Hash Retrieve AV Tutorial Script 1.0 - Remote User Pass Change Exploit AV Tutorial Script 1.0 - Remote User Pass Change Vivvo CMS 3.4 - 'index.php' Blind SQL Injection JBlog 1.0 - Create / Delete Admin Authentication Bypass Fuzzylime CMS 3.0 - Local File Inclusion Flip 3.0 - Remote Admin Creation Exploit Flip 3.0 - Remote Admin Creation Drupal 5.2 - PHP Zend Hash Exploitation Vector Drupal 5.2 - PHP Zend Hash ation Vector PHP-AGTC Membership System 1.1a - Remote Add Admin IceBB 1.0-rc6 - Remote Database Authentication Details Exploit IceBB 1.0-rc6 - Remote Database Authentication Details Ucms 1.8 - Backdoor Remote Command Execution Snitz Forums 2000 - 'Active.asp' SQL Injection MonAlbum 0.87 - Arbitrary File Upload / Password Grabber Exploit MonAlbum 0.87 - Arbitrary File Upload / Password Grabber FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber Exploit FreeWebShop 2.2.7 - 'cookie' Admin Password Grabber CuteNews 1.4.5 - Admin Password md5 Hash Fetching Exploit CuteNews 1.4.5 - Admin Password md5 Hash Fetching WebPortal CMS 0.6-beta - Remote Password Change Exploit WebPortal CMS 0.6-beta - Remote Password Change ClipShare 2.6 - Remote User Password Change Exploit ClipShare 2.6 - Remote User Password Change NetRisk 1.9.7 - Remote Password Change Exploit NetRisk 1.9.7 - Remote Password Change DomPHP 0.81 - Remote Add Administrator Exploit DomPHP 0.81 - Remote Add Administrator Evilsentinel 1.0.9 - Multiple Vulnerabilities Disable Exploit Evilsentinel 1.0.9 - Multiple Vulnerabilities Disable DigitalHive 2.0 RC2 - 'user_id' SQL Injection MoinMoin 1.5.x - 'MOIND_ID' Cookie Bug Remote Exploit MoinMoin 1.5.x - 'MOIND_ID' Cookie Bug Remote sCssBoard (Multiple Versions) - 'pwnpack' Remote Exploits sCssBoard (Multiple Versions) - 'pwnpack' Remote s PunBB 1.2.16 - Blind Password Recovery Exploit MultiCart 2.0 - 'productdetails.php' SQL Injection PunBB 1.2.16 - Blind Password Recovery MultiCart 2.0 - 'productdetails.php' SQL Injection QuickTalk Forum 1.6 - Blind SQL Injection Destar 0.2.2-5 - Arbitrary Add New User Exploit Destar 0.2.2-5 - Arbitrary Add New User phpBB Addon Fishing Cat Portal - Remote File Inclusion LightNEasy 1.2 - no database Remote Hash Retrieve Exploit LightNEasy 1.2 - no database Remote Hash Retrieve Joomla! Component JoomlaXplorer 1.6.2 - Remote Exploits Joomla! Component JoomlaXplorer 1.6.2 - Remote s OpenInvoice 0.9 - Arbitrary Change User Password Exploit OpenInvoice 0.9 - Arbitrary Change User Password txtCMS 0.3 - 'index.php' Local File Inclusion Zomplog 3.8.2 - 'newuser.php' Arbitrary Add Admin MeltingIce File System 1.0 - Arbitrary Add User Exploit MeltingIce File System 1.0 - Arbitrary Add User CMSimple 3.1 - Local File Inclusion / Arbitrary File Upload Telephone Directory 2008 - Arbitrary Delete Contact Exploit Telephone Directory 2008 - Arbitrary Delete Contact AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete Exploit AuraCMS 2.2.2 - '/pages_data.php' Arbitrary Edit/Add/Delete Scripteen Free Image Hosting Script 1.2 - 'cookie' Pass Grabber Exploit Scripteen Free Image Hosting Script 1.2 - 'cookie' Pass Grabber WordPress Plugin Download Manager 0.2 - Arbitrary File Upload IceBB 1.0-RC9.2 - Blind SQL Injection / Session Hijacking Exploit IceBB 1.0-RC9.2 - Blind SQL Injection / Session Hijacking moziloCMS 1.10.1 - 'download.php' Arbitrary Download File Exploit moziloCMS 1.10.1 - 'download.php' Arbitrary Download File LoveCMS 1.6.2 Final - Update Settings Remote Exploit LoveCMS 1.6.2 Final - Update Settings Remote Simple Machines Forum (SMF) 1.1.5 (Windows x86) - Admin Reset Password Exploit MemHT Portal 3.9.0 - Remote Create Shell Exploit Simple Machines Forum (SMF) 1.1.5 (Windows x86) - Admin Reset Password MemHT Portal 3.9.0 - Remote Create Shell WordPress 2.6.1 - SQL Column Truncation Admin Takeover Exploit WordPress 2.6.1 - SQL Column Truncation Admin Takeover phsBlog 0.2 - Bypass SQL Injection Filtering Exploit phsBlog 0.2 - Bypass SQL Injection Filtering Sports Clubs Web Panel 0.0.1 - Remote Game Delete Exploit Sports Clubs Web Panel 0.0.1 - Remote Game Delete Pluck CMS 4.5.3 - 'update.php' Remote File Corruption Exploit Pluck CMS 4.5.3 - 'update.php' Remote File Corruption Kusaba 1.0.4 - Remote Code Execution (2) Globsy 1.0 - Remote File Rewriting Exploit Globsy 1.0 - Remote File Rewriting LokiCMS 0.3.4 - 'index.php' Arbitrary Check File Exploit LokiCMS 0.3.4 - 'index.php' Arbitrary Check File Micro CMS 0.3.5 - Remote Add/Delete/Password Change Exploit Micro CMS 0.3.5 - Remote Add/Delete/Password Change FREEze Greetings 1.0 - Remote Password Retrieve Exploit FREEze Greetings 1.0 - Remote Password Retrieve wPortfolio 0.3 - Admin Password Changing Exploit wPortfolio 0.3 - Admin Password Changing vBulletin 3.7.3 - Visitor Message Cross-Site Request Forgery / Worm Exploit vBulletin 3.7.3 - Visitor Message Cross-Site Request Forgery / Worm Discuz! - Remote Reset User Password Exploit Discuz! - Remote Reset User Password All Club CMS 0.0.2 - Remote Database Configuration Retrieve Exploit All Club CMS 0.0.2 - Remote Database Configuration Retrieve OpenForum 0.66 Beta - Remote Reset Admin Password Exploit OpenForum 0.66 Beta - Remote Reset Admin Password IPNPro3 < 1.44 - Admin Password Changing Exploit DL PayCart 1.34 - Admin Password Changing Exploit Bonza Cart 1.10 - Admin Password Changing Exploit IPNPro3 < 1.44 - Admin Password Changing DL PayCart 1.34 - Admin Password Changing Bonza Cart 1.10 - Admin Password Changing Wysi Wiki Wyg 1.0 - Remote Password Retrieve Exploit Wysi Wiki Wyg 1.0 - Remote Password Retrieve Flatnux - html/JavaScript Injection Cookie Grabber Exploit Flatnux - html/JavaScript Injection Cookie Grabber BabbleBoard 1.1.6 - Cross-Site Request Forgery/Cookie Grabber Exploit BabbleBoard 1.1.6 - Cross-Site Request Forgery/Cookie Grabber Comersus Shopping Cart 6.0 - Remote User Pass Exploit Comersus Shopping Cart 6.0 - Remote User Pass Fhimage 1.2.1 - Remote Index Change Exploit Fhimage 1.2.1 - Remote Index Change Max.Blog 1.0.6 - Arbitrary Delete Post Exploit Max.Blog 1.0.6 - Arbitrary Delete Post OpenFiler 2.3 - (Authentication Bypass) Remote Password Change Exploit OpenFiler 2.3 - (Authentication Bypass) Remote Password Change txtBB 1.0 RC3 - HTML/JS Injection / Arbitrary Add Admin Privileges MemHT Portal 4.0.1 - Delete All Private Messages Exploit MemHT Portal 4.0.1 - Delete All Private Messages Traidnt up 2.0 - 'cookie' Add Extension Bypass Exploit Traidnt up 2.0 - 'cookie' Add Extension Bypass Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass Exploit) Bloginator 1a - SQL Injection / Command Injection (via Cookie Bypass ) eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password Exploit eLitius 1.0 - '/manage-admin.php' Arbitrary Add Admin/Change Password TotalCalendar 2.4 - Remote Password Change Exploit TotalCalendar 2.4 - Remote Password Change Absolute Form Processor XE-V 1.5 - Remote Change Password Exploit Absolute Form Processor XE-V 1.5 - Remote Change Password Teraway LinkTracker 1.0 - Remote Password Change Exploit Teraway LinkTracker 1.0 - Remote Password Change VisionLms 1.0 - 'changePW.php' Remote Password Change Exploit VisionLms 1.0 - 'changePW.php' Remote Password Change MiniTwitter 0.2b - Remote User Options Changer Exploit MiniTwitter 0.2b - Remote User Options Changer Simple Customer 1.3 - Arbitrary Change Admin Password Job Script 2.0 - Arbitrary Change Admin Password Simple Customer 1.3 - Arbitrary Change Admin Password Job Script 2.0 - Arbitrary Change Admin Password MaxCMS 2.0 - 'm_username' Arbitrary Create Admin Exploit MaxCMS 2.0 - 'm_username' Arbitrary Create Admin 2DayBiz Template Monster Clone - 'edituser.php' Change Pass Exploit 2DayBiz Template Monster Clone - 'edituser.php' Change Pass PHP Article Publisher - Remote Change Admin Password Coppermine Photo Gallery 1.4.22 - Remote Exploit Coppermine Photo Gallery 1.4.22 - Remote Joomla! Component Casino 0.3.1 - Multiple SQL Injections Exploits Joomla! Component Casino 0.3.1 - Multiple SQL Injections s ZaoCMS - 'user_updated.php' Remote Change Password Exploit ZaoCMS - 'user_updated.php' Remote Change Password Mole Group Sky Hunter/Bus Ticket Scripts - Change Admin Password Ultimate Media Script 2.0 - Remote Change Content Gallarific - 'user.php' Arbirary Change Admin Information Exploit Ultimate Media Script 2.0 - Remote Change Content Gallarific - 'user.php' Arbirary Change Admin Information ShaadiClone 2.0 - 'addAdminmembercode.php' Arbitrary Add Admin ZeeCareers 2.0 - 'addAdminmembercode.php' Arbitrary Add Admin Online Grades & Attendance 3.2.6 - Credentials Changer SQL Exploit Online Grades & Attendance 3.2.6 - Credentials Changer SQL Web Directory PRO - 'Admins.php' Change Admin Password Host Directory PRO 2.1.0 - Remote Change Admin Password Grestul 1.2 - Remote Add Administrator Account Exploit Grestul 1.2 - Remote Add Administrator Account Evernew Free Joke Script 1.2 - Remote Change Password Exploit Evernew Free Joke Script 1.2 - Remote Change Password phpMyAdmin - pmaPWN! Code Injection Remote Code Execution Scanner & Exploit Tool phpMyAdmin - 'pmaPWN!' Code Injection / Remote Code Execution Messages Library 2.0 - Arbitrary Administrator Account Infinity 2.0.5 - Arbitrary Create Admin Exploit Infinity 2.0.5 - Arbitrary Create Admin webLeague 2.2.0 - 'install.php' Remote Change Password Exploit webLeague 2.2.0 - 'install.php' Remote Change Password JBLOG 1.5.1 - SQL Table Backup Exploit JBLOG 1.5.1 - SQL Table Backup Barracuda IMFirewall 620 - Exploit Barracuda IMFirewall 620 - Barracuda Web Firewall 660 Firmware 7.3.1.007 - Exploit Barracuda Web Firewall 660 Firmware 7.3.1.007 - XP Book 3.0 - login Admin Exploit XP Book 3.0 - login Admin Jax Guestbook 3.50 - Admin Login Exploit Jax Guestbook 3.50 - Admin Login ImageVue 2.0 - Remote Admin Login Exploit ImageVue 2.0 - Remote Admin Login SoftCab Sound Converter - 'sndConverter.ocx' ActiveX Insecure Method Exploit SoftCab Sound Converter - 'sndConverter.ocx' ActiveX Insecure Method Jevonweb Guestbook - Remote Admin Access Exploit Simple PHP Guestbook - Remote Admin Access Exploit Jevonweb Guestbook - Remote Admin Access Simple PHP Guestbook - Remote Admin Access PHPShop 0.6 - Bypass Exploit PHPShop 0.6 - Bypass Jax Calendar 1.34 - Remote Admin Access Exploit Jax Calendar 1.34 - Remote Admin Access al3jeb script - Remote Change Password Exploit al3jeb script - Remote Change Password Joomla! 1.5.12 - connect back Exploit Joomla! 1.5.12 - Connect Back Snif 1.5.2 - Any Filetype Download Exploit Snif 1.5.2 - Any Filetype Download bispage - Bypass Exploit bispage - Bypass Kolang 4.3.10 < 5.3.0 - 'proc_open()' PHP 'safe_mode' Bypass Exploit Kolang 4.3.10 < 5.3.0 - 'proc_open()' PHP 'safe_mode' Bypass Torrent Hoster - Remount Upload Exploit Torrent Hoster - Remount Upload Easy-Clanpage 2.2 - Multiple SQL Injections / Exploit Easy-Clanpage 2.2 - Multiple SQL Injections / PHP Jokesite 2.0 - exec Command Exploit PHP Jokesite 2.0 - exec Command Zyke CMS 1.1 - Bypass Exploit Zyke CMS 1.1 - Bypass Tochin eCommerce - Multiple Remote Exploits Tochin eCommerce - Multiple Remote s PHP-Nuke 8.2 - Arbitrary File Upload Exploit PHP-Nuke 8.2 - Arbitrary File Upload JCMS 2010 - File Download Exploit JCMS 2010 - File Download CakePHP 1.3.5/1.2.8 - 'Unserialize()' Exploit CakePHP 1.3.5/1.2.8 - 'Unserialize()' JBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 < 4.3.0.CP08 - Remote Exploit JBoss Application Server 4.2 < 4.2.0.CP09 / 4.3 < 4.3.0.CP08 - Remote CakePHP 1.3.5/1.2.8 - Cache Corruption Exploit (Metasploit) CakePHP 1.3.5/1.2.8 - Cache Corruption (Metasploit) N_CMS 1.1E - Unauthenticated Local File Inclusion / Remote Code Exploit N_CMS 1.1E - Unauthenticated Local File Inclusion / Remote Code iCMS 1.1 - Admin SQL Injection / Brute Force Exploit iCMS 1.1 - Admin SQL Injection / Brute Force WordPress Plugin Block-Spam-By-Math-Reloaded - Bypass Exploit WordPress Plugin Block-Spam-By-Math-Reloaded - Bypass COMTREND CT-5624 Router - Root/Support Password Disclosure/Change Exploit COMTREND CT-5624 Router - Root/Support Password Disclosure/Change Vonage VDV23 - Cross-Site Scripting TP-Link TL-WR740N - Cross-Site Scripting LanSweeper 6.0.100.75 - Cross-Site Scripting TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root Exploit TRENDnet TEW-812DRU - Cross-Site Request Forgery/Command Injection Root WordPress Plugin Akismet 2.1.3 - Exploit WordPress Plugin Akismet 2.1.3 - SonicWALL Gms 7.x - Filter Bypass / Persistent Exploit SonicWALL Gms 7.x - Filter Bypass / Persistent Google Gmail IOS Mobile Application - Persistent / Persistent Cross-Site Scripting Google Gmail IOS Mobile Application - Persistent Cross-Site Scripting Feetan Inc WireShare 1.9.1 iOS - Persistent Exploit Feetan Inc WireShare 1.9.1 iOS - Persistent Seagate BlackArmor NAS - Root Exploit Seagate BlackArmor NAS - Privilege Escalation Kemana Directory 1.5.6 - 'qvc_init()' Cookie Poisoning CAPTCHA Bypass Exploit Kemana Directory 1.5.6 - 'qvc_init()' Cookie Poisoning CAPTCHA Bypass Private Photo+Video 1.1 Pro iOS - Persistent Exploit Private Photo+Video 1.1 Pro iOS - Persistent Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent Exploit Barracuda Networks #35 Web Firewall 610 6.0.1 - Filter Bypass / Persistent Bonefire 0.7.1 - Reinstall Admin Account Exploit Bonefire 0.7.1 - Reinstall Admin Account Kingsoft Webshield 1.1.0.62 - Cross-Site Scripting / Remote Command Execution NETGEAR WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access Exploit NETGEAR WNR500 Wireless Router - 'webproc?getpage' Traversal Arbitrary File Access PHPads 213607 - Authentication Bypass / Password Change Exploit PHPads 213607 - Authentication Bypass / Password Change D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored Exploit Wlsecrefresh.wl & Wlsecurity.wl D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored Wlsecrefresh.wl & Wlsecurity.wl D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored Exploit DnsProxy.cmd D-Link DSL-2730B Modem - Cross-Site Scripting Injection Stored DnsProxy.cmd Seagate Central 2014.0410.0026-F - Remote Facebook Access Token Exploit Seagate Central 2014.0410.0026-F - Remote Facebook Access Token Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security Exploit Atlassian JIRA FishEye 2.5.7 / Crucible 2.5.7 Plugins - XML Parsing Security AirDroid iOS / Android / Win 3.1.3 - Persistent Exploit AirDroid iOS / Android / Win 3.1.3 - Persistent up.time 7.5.0 - Arbitrary File Disclose and Delete Exploit up.time 7.5.0 - Upload and Execute Exploit up.time 7.5.0 - Arbitrary File Disclose and Delete up.time 7.5.0 - Upload and Execute MantisBT 1.2.19 - Host Header Exploit MantisBT 1.2.19 - Host Header SMF (Simple Machine Forum) 2.0.10 - Remote Memory Exfiltration Exploit SMF (Simple Machine Forum) 2.0.10 - Remote Memory Exfiltration JSSE - SKIP-TLS Exploit JSSE - SKIP-TLS D-Link DIR Series Routers - '/model/__show_info.php' Local File Disclosure D-Link DIR-Series Routers - '/model/__show_info.php' Local File Disclosure iScripts AutoHoster - 'main_smtp.php' Traversal Exploit iScripts AutoHoster - 'main_smtp.php' Traversal OpenMRS 2.3 (1.11.4) - XML External Entity Processing Exploit OpenMRS 2.3 (1.11.4) - XML External Entity Processing IBM Lotus Domino R8 - Password Hash Extraction Exploit IBM Lotus Domino R8 - Password Hash Extraction Trend Micro - 'CoreServiceShell.exe' Multiple HTTP Exploits Trend Micro - 'CoreServiceShell.exe' Multiple HTTP s Dell OpenManage Server Administrator 8.3 - XML External Entity Exploit Dell OpenManage Server Administrator 8.3 - XML External Entity D-Link DIR8xx Routers - Leak Credentials D-Link DIR8xx Routers - Root Remote Code Execution D-Link DIR8xx Routers - Local Firmware Upload D-Link DIR-8xx Routers - Leak Credentials D-Link DIR-8xx Routers - Root Remote Code Execution D-Link DIR-8xx Routers - Local Firmware Upload TP-Link WR940N - Authenticated Remote Code Exploit TP-Link WR940N - Authenticated Remote Code Zeta Components Mail 1.8.1 - Remote Code Execution |
||
---|---|---|
platforms | ||
files.csv | ||
README.md | ||
searchsploit |
The Exploit Database Git Repository
This is the official repository of The Exploit Database, a project sponsored by Offensive Security.
The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away.
This repository is updated daily with the most recently added submissions. Any additional resources can be found in our binary sploits repository.
Included with this repository is the searchsploit utility, which will allow you to search through the exploits using one or more terms. For more information, please see the SearchSploit manual.
root@kali:~# searchsploit -h
Usage: searchsploit [options] term1 [term2] ... [termN]
==========
Examples
==========
searchsploit afd windows local
searchsploit -t oracle windows
searchsploit -p 39446
searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"
For more examples, see the manual: https://www.exploit-db.com/searchsploit/
=========
Options
=========
-c, --case [Term] Perform a case-sensitive search (Default is inSEnsITiVe).
-e, --exact [Term] Perform an EXACT match on exploit title (Default is AND) [Implies "-t"].
-h, --help Show this help screen.
-j, --json [Term] Show result in JSON format.
-m, --mirror [EDB-ID] Mirror (aka copies) an exploit to the current working directory.
-o, --overflow [Term] Exploit titles are allowed to overflow their columns.
-p, --path [EDB-ID] Show the full path to an exploit (and also copies the path to the clipboard if possible).
-t, --title [Term] Search JUST the exploit title (Default is title AND the file's path).
-u, --update Check for and install any exploitdb package updates (deb or git).
-w, --www [Term] Show URLs to Exploit-DB.com rather than the local path.
-x, --examine [EDB-ID] Examine (aka opens) the exploit using $PAGER.
--colour Disable colour highlighting in search results.
--id Display the EDB-ID value rather than local path.
--nmap [file.xml] Checks all results in Nmap's XML output with service version (e.g.: nmap -sV -oX file.xml).
Use "-v" (verbose) to try even more combinations
--exclude="term" Remove values from results. By using "|" to separated you can chain multiple values.
e.g. --exclude="term1|term2|term3".
=======
Notes
=======
* You can use any number of search terms.
* Search terms are not case-sensitive (by default), and ordering is irrelevant.
* Use '-c' if you wish to reduce results by case-sensitive searching.
* And/Or '-e' if you wish to filter results by using an exact match.
* Use '-t' to exclude the file's path to filter the search results.
* Remove false positives (especially when searching using numbers - i.e. versions).
* When updating or displaying help, search terms will be ignored.
root@kali:~#
root@kali:~# searchsploit afd windows local
---------------------------------------------------------------------------------------- -----------------------------------
Exploit Title | Path
| (/usr/share/exploitdb/platforms/)
---------------------------------------------------------------------------------------- -----------------------------------
Microsoft Windows (x86) - 'afd.sys' Privilege Escalation (MS11-046) | win_x86/local/40564.c
Microsoft Windows - 'AfdJoinLeaf' Privilege Escalation (MS11-080) (Metasploit) | windows/local/21844.rb
Microsoft Windows - 'afd.sys' Local Kernel Exploit (PoC) (MS11-046) | windows/dos/18755.c
Microsoft Windows 7 (x64) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | win_x86-64/local/39525.py
Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040) | win_x86/local/39446.py
Microsoft Windows XP - 'afd.sys' Local Kernel Denial of Service | windows/dos/17133.c
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (K-plugin) (MS08-066) | windows/local/6757.txt
Microsoft Windows XP/2003 - 'afd.sys' Privilege Escalation (MS11-080) | windows/local/18176.py
---------------------------------------------------------------------------------------- -----------------------------------
root@kali:~#
root@kali:~# searchsploit -p 39446
Exploit: Microsoft Windows 7 (x86) - 'afd.sys' Dangling Pointer Privilege Escalation (MS14-040)
URL: https://www.exploit-db.com/exploits/39446/
Path: /usr/share/exploitdb/platforms/win_x86/local/39446.py
Copied EDB-ID 39446's path to the clipboard.
root@kali:~#
SearchSploit requires either "CoreUtils" or "utilities" (e.g. bash
, sed
, grep
, awk
, etc.) for the core features to work. The self updating function will require git
, and the Nmap XML option to work, will require xmllint
(found in the libxml2-utils
package in Debian-based systems).