header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Vulnerability Type
No results found
SQL Injection (6861)
Buffer Overflow (3832)
Cross-Site Scripting (2498)
Denial of Service (1853)
Remote Code Execution (1507)
Cross-Site Scripting (XSS) (860)
Directory Traversal (845)
Remote File Include (787)
Remote File Inclusion (723)
Privilege Escalation (682)
Authentication Bypass (676)
Local File Inclusion (606)
Information Disclosure (489)
Remote Command Execution (459)
Arbitrary File Upload (430)
Blind SQL Injection (425)
HTML Injection (398)
Cross-Site Request Forgery (384)
Command Injection (352)
Cross-Site Request Forgery (CSRF) (339)
Stack Buffer Overflow (320)
Stack Overflow (304)
Remote SQL Injection (288)
Unquoted Service Path (266)
Memory Corruption (254)
Denial of Service (DoS) (249)
Stored XSS (246)
Local Privilege Escalation (245)
Local File Include (241)
Remote Denial of Service (229)
Stored Cross-Site Scripting (XSS) (213)
Use-After-Free (211)
Heap-overflow (201)
Remote Code Execution (RCE) (199)
Persistent Cross Site Scripting (187)
XSS (169)
Stack-Based Buffer Overflow (165)
Remote Buffer Overflow (146)
Format String Vulnerability (145)
CSRF (142)
Path Traversal (138)
Arbitrary Code Execution (135)
Integer Overflow (135)
Code Execution (134)
Remote File Disclosure (127)
Input Validation (125)
SQL Injection and Cross Site Scripting (123)
Stored Cross Site Scripting (119)
Command Execution (115)
Insecure Cookie Handling (113)
CWE
No results found
89 (8371)
79 (5970)
119 (4727)
78 (2054)
22 (1959)
98 (1882)
N/A (1389)
200 (1317)
400 (1282)
264 (1205)
287 (1107)
352 (1107)
94 (1044)
120 (1032)
20 (1031)
Unknown (897)
434 (856)
269 (278)
416 (254)
284 (227)
121 (196)
134 (187)
190 (149)
399 (138)
611 (120)
426 (115)
476 (110)
Buffer Overflow (110)
120 (Buffer Copy without Checking Size of Input) (104)
362 (96)
125 (92)
601 (89)
428 (88)
502 (86)
843 (86)
787 (85)
798 (85)
122 (77)
427 (73)
Not mentioned (70)
522 (68)
Not provided (59)
80 (55)
259 (54)
918 (47)
285 (45)
113 (40)
613 (39)
614 (37)
None (35)
CPE
No results found
N/A (12110)
Unknown (758)
None (168)
Not mentioned (160)
a:microsoft:internet_explorer (139)
o:microsoft:windows (133)
Not provided (121)
o:linux:linux_kernel (97)
Not Specified (91)
a:joomla:joomla (72)
Not Available (52)
a:wordpress:wordpress (49)
o:apple:mac_os_x (47)
o:freebsd:freebsd (44)
o:microsoft:windows_xp (37)
a:mozilla:firefox (35)
a:php:php (34)
o:microsoft:windows_2000 (34)
a:google:chrome (31)
o:sun:solaris (27)
o:microsoft:windows_2000::sp4 (25)
a:microsoft:iis (23)
a:wireshark:wireshark (23)
a:adobe:flash_player (22)
a:apache:tomcat (22)
a:apple:safari (22)
o:microsoft:windows_7 (22)
o:microsoft:windows_xp::sp2 (18)
a:invision_power_services:invision_power_board (16)
o:microsoft:windows_xp::sp3 (16)
o:sgi:irix (16)
a:apple:quicktime (15)
a:samba:samba (15)
a:mybb:mybb (14)
a:mysql:mysql (14)
a:phpnuke:php-nuke (14)
a:videolan:vlc_media_player (14)
a:cpanel:cpanel (13)
a:microsoft:windows_media_player (13)
a:openemr:openemr (13)
a:opera_software:opera (13)
Solaris (13)
2.0 (12)
a:freepbx:freepbx (12)
a:oracle:virtualbox (12)
a:php:php:5.0.0 (12)
apple:safari (12)
o:cisco:ios (12)
o:google:android (12)
o:hp:hp-ux (12)
Vendor
No results found
N/A (3323)
Microsoft (1771)
WordPress (679)
Unknown (576)
Joomla! (539)
Apple (448)
Sourcecodester (363)
Oracle (320)
IBM (256)
Apache (246)
Adobe (242)
Linux (228)
Cisco (195)
HP (178)
PHP (170)
Mozilla (165)
Google (163)
Sun (141)
D-Link (140)
Novell (125)
PHPGurukul (108)
Inc (107)
Symantec (100)
ManageEngine (92)
PHP-Nuke (92)
Codecanyon (89)
XOOPS (87)
Ltd. (85)
GNU (84)
MyBB (83)
PHP Script Small (83)
phpBB (79)
SAP (77)
FreeBSD (73)
Sun Microsystems (69)
NETGEAR (68)
Not mentioned (68)
SourceForge (67)
vBulletin (64)
TP-Link (63)
Hewlett Packard (61)
Trend Micro (60)
Wireshark (58)
McAfee (57)
Mambo (56)
IPSwitch (54)
Itechscripts (53)
VMware (52)
VideoLAN (51)
e107 (50)
Product Name
No results found
N/A (695)
Internet Explorer (307)
Windows (305)
Linux Kernel (183)
PHP (172)
Unknown (140)
Firefox (115)
Solaris (113)
Joomla (107)
Mac OS X (96)
Flash Player (90)
Windows XP (88)
WordPress (87)
CMS (71)
Safari (65)
Chrome (62)
FreeBSD (57)
vBulletin (57)
Windows 7 (57)
Wireshark (55)
Kernel (54)
PHP-Nuke (54)
MySQL (52)
phpBB (51)
VLC media player (50)
Windows 2000 (50)
Windows 10 (49)
MyBB (48)
IIS (46)
Winamp (45)
AIX (44)
iOS (43)
macOS (40)
Android (38)
Opera (38)
Oracle Database (38)
Tomcat (38)
Windows Media Player (38)
Invision Power Board (37)
Samba (37)
Irix (35)
PHP-Fusion (35)
Linux (33)
phpMyAdmin (33)
osCommerce (32)
RealPlayer (32)
Apache HTTP Server (31)
ProFTPD (31)
Chromium (30)
OpenEMR (30)
Version
From
No results found
N/A (6626)
Unknown (1795)
1 (969)
1.0 (901)
3.1 (727)
1.1 (324)
2 (285)
All versions (234)
1.2 (224)
2.0 (221)
2.1 (176)
3 (158)
1.5 (152)
1.3 (147)
1.0.0 (144)
2.2 (140)
All (119)
1.0.1 (106)
1.4 (100)
v1.0 (98)
0.1 (96)
3.0 (95)
2.5 (94)
4 (90)
1.0.2 (84)
not specified (84)
2.3 (81)
1.6 (75)
Not mentioned (73)
< 3.2 (70)
2.0.0 (70)
6 (68)
5 (64)
1.0.3 (62)
1.7 (61)
3.3 (60)
2.4 (58)
Windows 7 (58)
2.0.1 (57)
1.8 (53)
3.5 (52)
Windows 2000 (51)
0.2 (50)
3.0.0 (50)
Not provided (48)
2.6 (46)
1.0.4 (45)
2.0.2 (45)
4.0 (45)
4.2 (45)
To
No results found
N/A (7012)
Unknown (2690)
1.0 (858)
1 (801)
3.5-RC7 (386)
1.1 (311)
2 (250)
1.2 (247)
2.0 (229)
All versions (221)
2.1 (154)
3 (154)
Not mentioned (153)
1.5 (143)
1.3 (131)
not specified (131)
2.2 (129)
All (118)
Other versions may also be affected. (114)
1.0.0 (111)
1.0.1 (97)
v1.0 (95)
1.0.2 (92)
2.5 (91)
3.0 (91)
3.1 (90)
1.4 (89)
0.1 (84)
Prior versions (79)
Not provided (78)
4 (77)
2.3 (75)
1.6 (73)
5 (66)
1.7 (63)
3.2 (63)
1.0.3 (61)
6 (60)
2.4 (57)
3.3 (57)
Windows 10 (55)
1.8 (54)
2.0.1 (54)
3.5 (49)
None (48)
2.0.2 (47)
2.6 (46)
4.0 (45)
4.2 (45)
0.2 (43)
Severity Type
No results found
HIGH (33432)
MEDIUM (4697)
N/A (2324)
CRITICAL (1722)
LOW (287)
Severity Number
No results found
7.5 (16267)
7 (7608)
5 (6608)
8 (3345)
N/A (2741)
9 (2195)
8.8 (1966)
5.5 (1836)
3 (1433)
9.8 (995)
Exploit Author
No results found
SecurityFocus (6696)
Unknown (2432)
Ihsan Sencan (887)
Gjoko 'LiquidWorm' Krstic (388)
Anonymous (356)
Project Zero (308)
milw0rm.com (271)
juan vazquez (245)
rgod (243)
LiquidWorm (222)
MC (202)
ajann (187)
Luigi Auriemma (187)
N/A (187)
Google Security Research (183)
indoushka (182)
shinnai (162)
sinn3r (154)
hdm (138)
John Page (aka hyp3rlinx) (134)
jduck (121)
cr4wl3r (113)
Hussin X (113)
Not mentioned (111)
Vulnerability Laboratory Research Team (108)
ZoRLu (99)
Kacper (a.k.a Rahim) (92)
nu11secur1ty (91)
mr_me (90)
Easy Laster (89)
CWH Underground (88)
S@BUN (84)
SirGod (83)
Ahmet Ümit BAYRAM (82)
High-Tech Bridge Security Research Lab (80)
xoron (80)
Dr_IDE (78)
Sid3^effects aKa haRi (78)
hyp3rlinx (75)
Todor Donev (75)
Stack (73)
Francis Provencher (71)
High-Tech Bridge SA - Ethical Hacking & Penetration Testing (70)
Ismail Tasdelen (70)
AntiSecurity (69)
His0k4 (68)
Kingcope (65)
ThE g0bL!N (65)
Not Specified (64)
Miroslav Stampar (61)
Platforms Tested
No results found
N/A (12658)
Windows (5027)
Linux (3465)
None (1839)
Mac (983)
Unknown (939)
Windows XP SP3 (683)
WiN7_x64/KaLiLinuX_x64 (546)
Windows 10 (540)
unix (487)
Windows 7 (411)
Kali Linux (345)
PHP (326)
Kali linux X64 (296)
Win7 x64 (276)
Windows XP SP2 (267)
Windows XP (234)
WordPress (203)
iOS (151)
All (142)
Ubuntu (138)
macOS (134)
Not mentioned (132)
Apache (121)
Microsoft Windows (117)
Not Specified (108)
Solaris (105)
Windows 7 x64 (98)
Android (96)
Xampp (91)
FreeBSD (90)
Windows 10 Pro x64 es (80)
Mac OS X (78)
Windows 2000 (77)
Windows 10 x64 (74)
Ubuntu 18.04 (72)
Windows 7 SP1 (70)
Windows Vista (70)
Not provided (69)
Windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu) (68)
Windows 7 x86 (67)
Windows XP SP3 EN (62)
Kali Linux 2.0 (59)
Windows 10 Pro (59)
Windows XP Professional SP2 (59)
Debian (57)
Linux & Windows (55)
Ubuntu 20.04 (55)
GNU/Linux (53)
Windows XP Professional SP2 with Internet Explorer 7 (53)
Year
Year
No results found
2008 (3443)
2009 (3242)
2020 (2782)
Unknown (2618)
2010 (2541)
2002 (2329)
2006 (2050)
2012 (1810)
2005 (1774)
2018 (1746)
2017 (1739)
2007 (1560)
2011 (1328)
2019 (1296)
2013 (1295)
2016 (1130)
2015 (1109)
2021 (1108)
2014 (995)
2023 (736)
2004 (529)
2022 (478)
2001 (444)
2003 (387)
2024 (272)
2000 (238)
N/A (178)
Not mentioned (138)
1999 (136)
Not Specified (92)
Not provided (89)
1998 (72)
2025 (70)
1997 (48)
1996 (16)
Not available (9)
HIGH (6)
None (6)
[date] (4)
2005-2006 (4)
0day (3)
1994 (3)
Discovered in 2020 (3)
Found in 2020 (3)
MEDIUM (3)
TBD (3)
1988 (2)
2003-2004 (2)
2004-2019 (2)
2006-2007 (2)

Explore all Exploits:

AsusWRT LAN Unauthenticated Remote Code Execution

The HTTP server in AsusWRT allows an unauthenticated client to perform a POST request, which can be combined with a vulnerability in the VPN configuration upload routine to enable a special command mode. This command mode can then be abused to execute commands as root by sending a UDP packet to infosvr on port UDP 9999. This exploit leverages that to start telnetd in a random port and connect to it. It has been tested with the RT-AC68U running AsusWRT Version 3.0.0.4.380.7743.

CloudMe Sync v1.10.9

This module exploits a stack-based buffer overflow vulnerability in CloudMe Sync v1.10.9 client application. The vulnerability allows an attacker to execute arbitrary code by sending a specially crafted buffer to the vulnerable application. This module has been tested successfully on Windows 7 SP1 x86.

Disk Savvy Enterprise v10.4.18 Server – Unauthenticated Remote Buffer Overflow SEH

The exploit allows an unauthenticated remote attacker to execute arbitrary code on the target system by exploiting a buffer overflow vulnerability in Disk Savvy Enterprise v10.4.18 Server. By sending a specially crafted request, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program flow.

MagniComp SysInfo mcsiwrapper Privilege Escalation

This module attempts to gain root privileges on systems running MagniComp SysInfo versions prior to 10-H64. The .mcsiwrapper suid executable allows loading a config file using the '--configfile' argument. The 'ExecPath' config directive is used to set the executable load path. This module abuses this functionality to set the load path resulting in execution of arbitrary code as root. This module has been tested successfully with SysInfo version 10-H63 on Fedora 20 x86_64, 10-H32 on Fedora 27 x86_64, 10-H10 on Debian 8 x86_64, and 10-GA on Solaris 10u11 x86.

Windows: Constrained Impersonation Capability EoP

It’s possible to use the constrained impersonation capability added in Windows 10 to impersonate a lowbox SYSTEM token leading to EoP. Windows 10 added a new security check during impersonation of a token which relies on an AppContainer capability Constrained Impersonation which allows a LowBox process to impersonate another LowBox token, even if it’s for a different user, as long as it meets certain requirements. The only limiting factor is getting hold of a suitable token which has the same session ID. This is easy for example in UAC scenarios (including OTS elevation) but of course that’s a UAC bypass. There’s various tricks to get a SYSTEM token but most of the services run in Session 0. However there are a few processes running as SYSTEM but in the same session on a default install of Windows including CSRSS and Winlogon. There’s also the consent process which is part of UAC which is spawned in the user session. Therefore one way to get the token is to try and elevate a process running on a WebDAV share (hosted on localhost) and negotiate the NTLM/Negotiate auth in a similar way to previous issues I’ve reported (e.g. cases 21243 and 21878).

Recent Exploits:

cqrsecured