follow
https://cxsecurity.com/
Home
follow
https://cxsecurity.com/
Full List
follow
https://cxsecurity.com/wlb/
Only Bugs
follow
https://cxsecurity.com/bugs/
Only Tricks
follow
https://cxsecurity.com/tricks/
Only Exploits
follow
https://cxsecurity.com/exploit/
Only Dorks
follow
https://cxsecurity.com/dorks/
Only CVE
follow
https://cxsecurity.com/cvelist/
Only CWE
follow
https://cxsecurity.com/cwelist/
Fake Notes
follow
https://cxsecurity.com/bogus/
Ranking
follow
https://cxsecurity.com/best/1/
Full List
follow
https://cxsecurity.com/cvemap/
Show Vendors
follow
https://cxsecurity.com/cvevendors/
Show Products
follow
https://cxsecurity.com/cveproducts/
CWE Dictionary
follow
https://cxsecurity.com/allcwe/
Check CVE Id
follow
https://cxsecurity.com/cve/
Check CWE Id
follow
https://cxsecurity.com/cwe/
Bugtraq
follow
https://cxsecurity.com/search/
CVEMAP
follow
https://cxsecurity.com/search/cve/
By author
follow
https://cxsecurity.com/search/author/
CVE Id
follow
https://cxsecurity.com/cve/
CWE Id
follow
https://cxsecurity.com/cwe/
By vendors
follow
https://cxsecurity.com/cvevendors/
By products
follow
https://cxsecurity.com/cveproducts/
Bugtraq
follow
https://cxsecurity.com/wlb/rss/all/
CVEMAP
follow
https://cxsecurity.com/cverss/fullmap/
CVE Products
follow
https://cxsecurity.com/cveproducts/
Bugs
follow
https://cxsecurity.com/wlb/rss/vulnerabilities/
Exploits
follow
https://cxsecurity.com/wlb/rss/exploit/
Dorks
follow
https://cxsecurity.com/wlb/rss/dorks/
cIFrex
follow
http://cifrex.org/
Facebook
follow
https://www.facebook.com/cxsec
Twitter
follow
https://twitter.com/cxsecurity
Donate
follow
https://cxsecurity.com/donate/
About
follow
https://cxsecurity.com/wlb/about/
Submit
follow
https://cxsecurity.com/wlb/add/
Best Hackers:
follow
https://cxsecurity.com/best/1/
{{te.nameDis}}
follow
https://cxsecurity.com/author/{{te.name}}/1/
follow
https://cxsecurity.com/best/{{te.ccurl}}/
{{te.id}}. {{te.nameDis}}
follow
{{te.url}}
{{ x.title }}
follow
{{x.url}}
follow
https://cxsecurity.com/best/{{x.cc}}/
{{ x.nameSh }}
follow
{{ x.url }}
Check the Bugtraq
follow
https://cxsecurity.com/wlb/
Backdoor.Win32.Prorat.ntz / Weak Hardcoded Password
follow
https://cxsecurity.com/issue/WLB-2021110016
malvuln
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/malvuln/
My Movie Collection Sinatra App Login Cross Site Scripting
follow
https://cxsecurity.com/issue/WLB-2021110015
Vulnerability Laboratory
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Vulnerability+Laboratory/
News247 News Magazine (CMS) - Admin Panel Authentication Bypass (NoRedirect)
follow
https://cxsecurity.com/issue/WLB-2021110014
0xr3act0r
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/0xr3act0r/
Ericsson Network Location MPS GMPC21 Privilege Escalation
follow
https://cxsecurity.com/issue/WLB-2021110013
AkkuS
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/AkkuS/
i3 International Annexxus Cameras Ax-n 5.2.0 Application Logic Flaw
follow
https://cxsecurity.com/issue/WLB-2021110012
LiquidWorm
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/LiquidWorm/
Dynojet Power Core 2.3.0 Unquoted Service Path
follow
https://cxsecurity.com/issue/WLB-2021110011
Pedro Sousa Rodrigues
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Pedro+Sousa+Rodrigues/
WordPress Pie Register 3.7.1.4 Authentication Bypass / Remote Code Execution
follow
https://cxsecurity.com/issue/WLB-2021110010
h00die
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/h00die/
Codiad 2.8.4 Shell Upload
follow
https://cxsecurity.com/issue/WLB-2021110009
P4p4_M4n3
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/P4p4_M4n3/
YouTube Video Grabber 1.9.9.1 Buffer Overflow
follow
https://cxsecurity.com/issue/WLB-2021110008
Achilles
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Achilles/
Kingdia CD Extractor 3.0.2 - Buffer Overflow (SEH)
follow
https://cxsecurity.com/issue/WLB-2021110007
Achilles
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Achilles/
YouTube Video Grabber v1.9.9.1-Buffer Overflow (SEH)
follow
https://cxsecurity.com/issue/WLB-2021110006
Achilles
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Achilles/
WordPress NextScripts: Social Networks Auto-Poster 4.3.20 XSS CVE-2021-38356
follow
https://cxsecurity.com/issue/WLB-2021110005
Ramuel Gall
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Ramuel+Gall/
Trojan.Win32.Pasta.mca / Insecure Permissions
follow
https://cxsecurity.com/issue/WLB-2021110004
malvuln
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/malvuln/
The latest CVEs
follow
https://cxsecurity.com/cvemap/
CVE-2020-27820
follow
https://cxsecurity.com/cveshow/CVE-2020-27820/
A vulnerability was found in Linux kernel, where a use-after-frees in nouveau"s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).
follow
https://cxsecurity.com/cveshow/CVE-2020-27820/
CVE-2021-20135
follow
https://cxsecurity.com/cveshow/CVE-2021-20135/
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https:...
follow
https://cxsecurity.com/cveshow/CVE-2021-20135/
CVE-2021-20700
follow
https://cxsecurity.com/cveshow/CVE-2021-20700/
Buffer overflow vulnerability in the Disk Agent CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote code execution via a network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20700/
CVE-2021-20701
follow
https://cxsecurity.com/cveshow/CVE-2021-20701/
Buffer overflow vulnerability in the Disk Agent CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote code execution via a network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20701/
CVE-2021-20702
follow
https://cxsecurity.com/cveshow/CVE-2021-20702/
Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote code execution via a network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20702/
CVE-2021-20703
follow
https://cxsecurity.com/cveshow/CVE-2021-20703/
Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote code execution via a network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20703/
CVE-2021-20704
follow
https://cxsecurity.com/cveshow/CVE-2021-20704/
Buffer overflow vulnerability in the compatible API with previous versions CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote code execution via a network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20704/
CVE-2021-20705
follow
https://cxsecurity.com/cveshow/CVE-2021-20705/
Improper input validation vulnerability in the WebManager CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote file upload via network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20705/
CVE-2021-20706
follow
https://cxsecurity.com/cveshow/CVE-2021-20706/
Improper input validation vulnerability in the WebManager CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote file upload via network.
follow
https://cxsecurity.com/cveshow/CVE-2021-20706/
CVE-2021-20707
follow
https://cxsecurity.com/cveshow/CVE-2021-20707/
Improper input validation vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to read files upload via network..
follow
https://cxsecurity.com/cveshow/CVE-2021-20707/
Dorks
follow
https://cxsecurity.com/dorks/
Open Journal Systems Arbitrary File Upload/index.php/journal
follow
https://cxsecurity.com/issue/WLB-2021100133
Emyounoone
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Emyounoone/
Mini-XML 3.2 Heap Overflowmxml Mini-xml Mini-XML
follow
https://cxsecurity.com/issue/WLB-2021100122
LIWEI
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/LIWEI/
Build Smart ERP 21.0817 eidValue SQL Injection (Unauthenticated)intitle:buildsmart accounting
follow
https://cxsecurity.com/issue/WLB-2021100116
Nehru Sethuraman
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Nehru+Sethuraman/
CKAN Datastore Search - SQL-I (Brasil POC)inurl:/datastore_search_sql?sql=
follow
https://cxsecurity.com/issue/WLB-2021100115
Gh05t666nero
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/Gh05t666nero/
Optijet School Management System - Blind SQL Injection (Unauthenticated)"okulsonuc.com"
follow
https://cxsecurity.com/issue/WLB-2021100087
MaliciousFolder
follow
https://cxsecurity.com/search/author/DESC/AND/FIND/0/10/MaliciousFolder/
Bugtraq
follow
https://cxsecurity.com/wlb/1/
The latest CVEs
follow
https://cxsecurity.com/cvemap/1/
Dorks
follow
https://cxsecurity.com/dorks/1/
Search
follow
https://cxsecurity.com/search/
Bugtraq
follow
https://cxsecurity.com/search/
CVEMAP
follow
https://cxsecurity.com/search/cve/
By Author
follow
https://cxsecurity.com/search/author/
CVE Id
follow
https://cxsecurity.com/cve/
CWE Id
follow
https://cxsecurity.com/cwe/
By vendors
follow
https://cxsecurity.com/cvevendors/A/
By products
follow
https://cxsecurity.com/cveproducts/A/
Apple
follow
https://cxsecurity.com/cvevendor/50/apple/
Microsoft
follow
https://cxsecurity.com/cvevendor/16/microsoft/
Google
follow
https://cxsecurity.com/cvevendor/1351/google/
Oracle
follow
https://cxsecurity.com/cvevendor/150/oracle/
Apache
follow
https://cxsecurity.com/cvevendor/38/apache/
IBM
follow
https://cxsecurity.com/cvevendor/8/ibm/
Red Hat
follow
https://cxsecurity.com/cvevendor/5/redhat/
HP
follow
https://cxsecurity.com/cvevendor/7/hp/
Adobe
follow
https://cxsecurity.com/cvevendor/58/adobe/
Mozilla
follow
https://cxsecurity.com/cvevendor/465/mozilla/
Full List of Vendors
follow
https://cxsecurity.com/cvevendors/
Linux Kernel
follow
https://cxsecurity.com/cveproduct/44/85/linux_kernel/
Mac OS X
follow
https://cxsecurity.com/cveproduct/50/221/mac_os_x/
Windows XP
follow
https://cxsecurity.com/cveproduct/16/1085/windows_xp/
Windows 10
follow
https://cxsecurity.com/cveproduct/16/27993/windows__31__30_/
Flash Player
follow
https://cxsecurity.com/cveproduct/58/1936/flash_player/
Adobe Reader
follow
https://cxsecurity.com/cveproduct/58/596/acrobat_reader/
PHP
follow
https://cxsecurity.com/cveproduct/42/81/php/
JRE
follow
https://cxsecurity.com/cveproduct/10/1531/jre/
JDK
follow
https://cxsecurity.com/cveproduct/10/1043/jdk/
Wordpress
follow
https://cxsecurity.com/cveproduct/2324/3929/wordpress/
Joomla
follow
https://cxsecurity.com/cveproduct/3454/5895/joomla/
Chrome
follow
https://cxsecurity.com/cveproduct/1351/4057/chrome/
IE
follow
https://cxsecurity.com/cveproduct/16/9481/internet_explorer/
Firefox
follow
https://cxsecurity.com/cveproduct/465/2728/firefox/
Safari
follow
https://cxsecurity.com/cveproduct/50/2844/safari/
HTTPD
follow
https://cxsecurity.com/cveproduct/38/72/http_server/
Tomcat
follow
https://cxsecurity.com/cveproduct/38/876/tomcat/
Nginx
follow
https://cxsecurity.com/cveproduct/10354/16273/nginx/
Full List of Products
follow
https://cxsecurity.com/cveproducts/
CWE-89 (SQL Injection)
follow
https://cxsecurity.com/cwe/CWE-89
CWE-79 (XSS)
follow
https://cxsecurity.com/cwe/CWE-79
CWE-119 (Buffer Overflow)
follow
https://cxsecurity.com/cwe/CWE-119
CWE-22 (Path Traversal)
follow
https://cxsecurity.com/cwe/CWE-22
Check CWE Dictionary
follow
https://cxsecurity.com/allcwe/
Donations
follow
https://cxsecurity.com/donate/