• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

exploits

  1. 1

    Exploits WMV To AVI MPEG DVD WMV Converter 4.6.1217 Buffer Overflow

    WMV to AVI MPEG DVD WMV Converter version 4.6.1217 suffers from a buffer overflow vulnerability. View the full article
  2. 1

    Exploits MikroTik RouterOS 6.45.6 DNS Cache Poisoning

    MikroTik RouterOS version 6.45.6 DNS cache poisoning exploit. View the full article
  3. 1

    Exploits iSeeQ Hybrid DVR WH-H4 1.03R / 2.0.0.P (get_jpeg) Stream Disclosure

    iSeeQ Hybrid DVR WH-H4 versions 1.03R and 2.0.0.P suffer from an unauthenticated and unauthorized live stream disclosure vulnerability when get_jpeg script is called. View the full article
  4. 1

    Exploits JavaScriptCore GetterSetter Type Confusion

    JavaScriptCore (JSC) GetterSetter suffers from a type confusion vulnerability during DFG compilation. View the full article
  5. 1

    Exploits Citrix StoreFront Server 7.15 XML Injection

    Citrix StoreFront Server version 7.15 suffers from an XML external entity injection vulnerability. View the full article
  6. 1

    Exploits WMV To AVI MPEG DVD WMV Converter 4.6.1217 Denial Of Service

    WMV to AVI MPEG DVD WMV Converter version 4.6.1217 suffers from a denial of service vulnerability. View the full article
  7. 1

    Exploits Ajenti 2.1.31 Remote Code Execution

    This Metasploit module exploits a command injection vulnerability in Ajenti versions 2.1.31 and below. By injecting a command into the username POST parameter to api/core/auth, a shell can be spawned. View the full article
  8. 1

    Exploits Craft CMS Rate Limiting / Brute Force

    Craft CMS versions up to 3.1.7 are missing rate limiting on password validations. View the full article
  9. 1

    Exploits WordPress 5.2.4 Cross Origin Resource Sharing

    WordPress version 5.2.4 fails to validate an origin header. View the full article
  10. 1

    Exploits Microsoft Windows Server 2012 Group Policy Security Feature Bypass

    Microsoft Windows Server 2012 suffers from a Group Policy security feature bypass vulnerability. View the full article
  11. 1

    Exploits Microsoft Windows Server 2012 Group Policy Remote Code Execution

    Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability. View the full article
  12. 1

    Exploits rConfig 3.9.2 Remote Code Execution

    rConfig version 3.9.2 suffers from a remote code execution vulnerability. View the full article
  13. 1

    Exploits Win10 MailCarrier 2.51 Buffer Overflow

    Win10 MailCarrier version 2.51 POP3 User remote buffer overflow exploit. View the full article
  14. 1

    Exploits Intelligent Security System SecurOS Enterprise 10.2 Unquoted Service Path

    Intelligent Security System SecurOS Enterprise version 10.2 suffers from a SecurosCtrlService unquoted service path vulnerability. View the full article
  15. 1

    Exploits Microsoft Windows Insecure CSharedStream Object Privilege Escalation

    Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability. View the full article
  16. 1

    Exploits WebKit HTMLFrameElementBase::isURLAllowed Universal Cross Site Scripting

    WebKit suffers from an HTMLFrameElementBase::isURLAllowed universal cross site scripting vulnerability. View the full article
  17. 1

    Exploits Infosysta Jira 1.6.13_J8 User Name Disclosure

    Infosysta Jira version 1.6.13_J8 suffers from a user name disclosure vulnerability. View the full article
  18. 1

    Exploits Infosysta Jira 1.6.13_J8 Project List Authentication Bypass

    Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see project lists. View the full article
  19. 1

    Exploits Infosysta Jira 1.6.13_J8 Push Notification Authentication Bypass

    Infosysta Jira version 1.6.13_J8 suffers from an authentication bypass vulnerability that allows you to see push notifications for a given user. View the full article
  20. 1

    Exploits ChaosPro 2.0 Buffer Overflow

    ChaosPro version 2.0 SEH buffer overflow exploit. View the full article
Back
Top