Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[shellcode] Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
https://www.exploit-db.com/exploits/45029/?rss
[papers] Exploiting the Obvious - Bluetooth Trust Relationships
Exploiting the Obvious - Bluetooth Trust Relationships
https://www.exploit-db.com/docs/english/45028-exploiting-the-obvious---bluetooth-trust-relationships.pdf?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service
https://www.exploit-db.com/exploits/45035/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/45034/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation
https://www.exploit-db.com/exploits/45037/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download
https://www.exploit-db.com/exploits/45036/?rss
[webapps] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root
https://www.exploit-db.com/exploits/45038/?rss
[shellcode] Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/45039/?rss
[remote] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
https://www.exploit-db.com/exploits/45040/?rss
[local] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
https://www.exploit-db.com/exploits/45041/?rss
[remote] Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
https://www.exploit-db.com/exploits/45044/?rss
[remote] QNAP Q'Center - change_passwd Command Execution (Metasploit)
QNAP Q'Center - change_passwd Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45043/?rss
[papers] Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
https://www.exploit-db.com/papers/45045/?rss
[webapps] PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
https://www.exploit-db.com/exploits/45047/?rss
[webapps] PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
https://www.exploit-db.com/exploits/45046/?rss
[local] JavaScript Core - Arbitrary Code Execution
JavaScript Core - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45048/?rss
[webapps] Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection
Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection
https://www.exploit-db.com/exploits/45049/?rss
[shellcode] Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (100 bytes)
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (100 bytes)
https://www.exploit-db.com/exploits/45080/?rss
[remote] Microsoft Windows - 'dnslint.exe' Drive-By Download
Microsoft Windows - 'dnslint.exe' Drive-By Download
https://www.exploit-db.com/exploits/45079/?rss
[webapps] Tenda Wireless N150 Router 5.07.50 - Cross-Site Request Forgery (Reboot Router)
Tenda Wireless N150 Router 5.07.50 - Cross-Site Request Forgery (Reboot Router)
https://www.exploit-db.com/exploits/45078/?rss
[dos] Windows Speech Recognition - Buffer Overflow
Windows Speech Recognition - Buffer Overflow
https://www.exploit-db.com/exploits/45077/?rss