Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[webapps] Oracle PeopleSoft 8.5x - Remote Code Execution
Oracle PeopleSoft 8.5x - Remote Code Execution
https://www.exploit-db.com/exploits/43594/?rss
[shellcode] Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes)
Linux/x86-64 - Reverse TCP (192.168.1.10:31337/TCP) Shell Shellcode (118 bytes)
https://www.exploit-db.com/exploits/43599/?rss
[shellcode] Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
Linux/x86-64 - Bind TCP (31337/TCP) Shell Shellcode (150 bytes)
https://www.exploit-db.com/exploits/43598/?rss
[shellcode] Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
Linux/x86-64 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
https://www.exploit-db.com/exploits/43597/?rss
[dos] OBS studio 20.1.3 - Local Buffer Overflow
OBS studio 20.1.3 - Local Buffer Overflow
https://www.exploit-db.com/exploits/43596/?rss
[webapps] ILIAS < 5.2.4 - Cross-Site Scripting
ILIAS < 5.2.4 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43595/?rss
[shellcode] Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
Linux/x86-64 - sethostname(Rooted !) + killall Shellcode (33 bytes)
https://www.exploit-db.com/exploits/43607/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR Encoded Shellcode (87 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/zsh, [/bin/zsh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43606/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR Encoded Shellcode (87 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/ksh, [/bin/ksh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43605/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR Encoded Shellcode (87 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/csh, [/bin/csh, NULL]) + XOR Encoded Shellcode (87 bytes)
https://www.exploit-db.com/exploits/43604/?rss
[shellcode] Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shellcode (85 bytes)
Linux/x86-64 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shellcode (85 bytes)
https://www.exploit-db.com/exploits/43603/?rss
[shellcode] Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)
Linux/x86-64 - Reverse TCP (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)
https://www.exploit-db.com/exploits/43602/?rss
[shellcode] Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (131 bytes)
Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (131 bytes)
https://www.exploit-db.com/exploits/43601/?rss
[webapps] Flash Operator Panel 2.31.03 - Command Execution
Flash Operator Panel 2.31.03 - Command Execution
https://www.exploit-db.com/exploits/43600/?rss
[webapps] Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
https://www.exploit-db.com/exploits/43592/?rss
[shellcode] OpenBSD/x86 - reboot() Shellcode (15 bytes)
OpenBSD/x86 - reboot() Shellcode (15 bytes)
https://www.exploit-db.com/exploits/43608/?rss
[remote] Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
https://www.exploit-db.com/exploits/43609/?rss
[shellcode] OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
https://www.exploit-db.com/exploits/43611/?rss
[shellcode] OSX/PPC - Remote findsock by recv() Key Shellcode
OSX/PPC - Remote findsock by recv() Key Shellcode
https://www.exploit-db.com/exploits/43610/?rss
[shellcode] OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43617/?rss
[shellcode] OSX/PPC - execve(/bin/sh) Shellcode
OSX/PPC - execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43616/?rss