ERPNext version 12.14.0 suffers from an authenticated remote SQL injection vulnerability.
63b22913276ba3627f6534a8ceb2131b07a5290477a6a8cbc7ec0e16f68babf5
LibreNMS version 1.46 suffers from an authenticated remote SQL injection vulnerability in the MAC Account Graph. Original discovery of SQL injection in this version is attributed to Punt in May of 2020.
ea3344c4db8aac29739017c56d9f67f842adeab17b741741d19a6459f7ef0656
ManageEngine Applications Manager authenticated remote code execution exploit that leverages the newInstance() and loadClass() methods being used by the "WeblogicReference", when attempting a Credential Test for a new Monitor. Versions below 14720 are affected.
0c0cd9e0020b9b9ebc100236161c5168965c12c7c555ee30775d0cba210c80f1
ATutor LMS version 2.2.4 suffers from having a weak password reset hash.
695d43c107bcbb8c5b7a5b23041b58961922c09223a6f7f84fa51fde122cb2f4
AIDA64 Engineer version 6.20.5300 Report File filename SEH buffer overflow exploit.
fe7db04e0b5015baf2963e005ec2c8ca15943475775055a6ef16d357d909edb1
10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit.
14d5fb0369d804df952aa677f189c95cee2dc58e248e3ea40989ccac3e77a17b
10-Strike Network Inventory Explorer version 9.03 Read-from-file buffer overflow exploit that uses SEH and ROP.
d9902b1b7f52b90b881ecd03566b14bdebeafb458532ad05ad92d0692856be5f
FreeCommander XE 2020 Build 810a 32-bit suffers from a pathname buffer overflow vulnerability.
60d82e33f0c7f4253ddc265c3479423769c54f1a48cc6ae26922cfd73df607d2
Yachtcontrol versions dated 2019-10-06 suffer from an unauthenticated remote code execution vulnerability.
b2252962f4ffefcd60f7bc45599cdb4a32a747d57fdae0a5dda1b6d23e8a297e
Core FTP version 2.0 build 653 suffers from a PBSZ command denial of service vulnerability.
00eab4c7b5f5b0eaa067ef5307df33a9314ec54ced7998e6a06d61125051fb73
Anyburn version 4.3 x86 "Copy disc to image file" buffer overflow SEH unicode exploit.
093efaf0e4484fa5ee3691f96a71fdfc76d836f48b33f9b0e592f75d34a8ad15
RealTerm Serial Terminal version 2.0.0.70 suffers from an echo port buffer overflow vulnerability. Modifications to the original proof of concept include the fact that it uses a larger payload size for shellcode due to different jump offsets and filters the bad character 0x3a as this is the character for port which causes an error ":".
7d6aa76dc1238452c1e6142d776b2b51e99c79aa8cf79ef87b7b1cde732ae71f
This archive contains a Linux x86/x64 payload AES-128 CBC encrypter and payload decrypter/runner.
456de0042812f5a98189859583df3dd73d9d360ecc37ccc72ee879753d9ca583
Ricoh myPrint suffers from hardcoded application credential and information disclosure vulnerabilities. The myPrint windows client version 2.9.2.4 and myPrint android client version 2.2.7 are both affected.
ecf580b9a434a73107f0ba5a72c008e086a0dd48d9c43c99626d47b2773c9b0d
Easy File Sharing Web Server version 6.9 POST msg.ghp UserID remote buffer overflow SEH exploit with DEP bypass and ROP.
5052bd3ade9eabb5408d9af16042f88ccdd5c0093460e58e70f4514aa17d56cc