[dos] Multiple CPUs - Information Leak Using Speculative Execution
Multiple CPUs - Information Leak Using Speculative Execution
https://www.exploit-db.com/exploits/43490/?rss
Multiple CPUs - Information Leak Using Speculative Execution
https://www.exploit-db.com/exploits/43490/?rss
[remote] HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)
HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43493/?rss
HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43493/?rss
[local] Jungo Windriver 12.5.1 - Privilege Escalation
Jungo Windriver 12.5.1 - Privilege Escalation
https://www.exploit-db.com/exploits/43494/?rss
Jungo Windriver 12.5.1 - Privilege Escalation
https://www.exploit-db.com/exploits/43494/?rss
[webapps] SAP NetWeaver J2EE Engine 7.40 - SQL Injection
SAP NetWeaver J2EE Engine 7.40 - SQL Injection
https://www.exploit-db.com/exploits/43495/?rss
SAP NetWeaver J2EE Engine 7.40 - SQL Injection
https://www.exploit-db.com/exploits/43495/?rss
[webapps] D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution
D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution
https://www.exploit-db.com/exploits/43496/?rss
D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution
https://www.exploit-db.com/exploits/43496/?rss
[local] Jungo WinDriver 12.5.1 - Local Privilege Escalation
Jungo WinDriver 12.5.1 - Local Privilege Escalation
https://www.exploit-db.com/exploits/43498/?rss
Jungo WinDriver 12.5.1 - Local Privilege Escalation
https://www.exploit-db.com/exploits/43498/?rss
[shellcode] Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)
Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)
https://www.exploit-db.com/exploits/43497/?rss
Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)
https://www.exploit-db.com/exploits/43497/?rss
[local] Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
https://www.exploit-db.com/exploits/43500/?rss
Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
https://www.exploit-db.com/exploits/43500/?rss
[local] Parity Browser < 1.6.10 - Bypass Same Origin Policy
Parity Browser < 1.6.10 - Bypass Same Origin Policy
https://www.exploit-db.com/exploits/43499/?rss
Parity Browser < 1.6.10 - Bypass Same Origin Policy
https://www.exploit-db.com/exploits/43499/?rss
[dos] MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
https://www.exploit-db.com/exploits/43501/?rss
MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
https://www.exploit-db.com/exploits/43501/?rss
[shellcode] FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
https://www.exploit-db.com/exploits/43502/?rss
FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
https://www.exploit-db.com/exploits/43502/?rss
[shellcode] FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
https://www.exploit-db.com/exploits/43503/?rss
FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
https://www.exploit-db.com/exploits/43503/?rss
[shellcode] FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
https://www.exploit-db.com/exploits/43505/?rss
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
https://www.exploit-db.com/exploits/43505/?rss
[shellcode] FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
[shellcode] IRIX - execve(/bin/sh) Shellcode (43 bytes)
IRIX - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43509/?rss
IRIX - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43509/?rss
[shellcode] IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43508/?rss
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43508/?rss
[shellcode] FreeBSD - reboot() Shellcode (15 Bytes)
FreeBSD - reboot() Shellcode (15 Bytes)
https://www.exploit-db.com/exploits/43507/?rss
FreeBSD - reboot() Shellcode (15 Bytes)
https://www.exploit-db.com/exploits/43507/?rss
[shellcode] FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/43506/?rss
FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/43506/?rss
[shellcode] IRIX - stdin-read Shellcode (40 bytes)
IRIX - stdin-read Shellcode (40 bytes)
https://www.exploit-db.com/exploits/43512/?rss
IRIX - stdin-read Shellcode (40 bytes)
https://www.exploit-db.com/exploits/43512/?rss
[shellcode] IRIX - execve(/bin/sh) Shellcode (68 bytes)
IRIX - execve(/bin/sh) Shellcode (68 bytes)
https://www.exploit-db.com/exploits/43511/?rss
IRIX - execve(/bin/sh) Shellcode (68 bytes)
https://www.exploit-db.com/exploits/43511/?rss
[shellcode] IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
https://www.exploit-db.com/exploits/43510/?rss
IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
https://www.exploit-db.com/exploits/43510/?rss