[shellcode] Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/45039/?rss
Linux/x64 - Reverse (::1:1337/TCP) + IPv6 + Password (pwnd) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/45039/?rss
[remote] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
https://www.exploit-db.com/exploits/45040/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials
https://www.exploit-db.com/exploits/45040/?rss
[local] Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
https://www.exploit-db.com/exploits/45041/?rss
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape
https://www.exploit-db.com/exploits/45041/?rss
[remote] Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
https://www.exploit-db.com/exploits/45044/?rss
Nanopool Claymore Dual Miner - APIs RCE (Metasploit)
https://www.exploit-db.com/exploits/45044/?rss
[remote] QNAP Q'Center - change_passwd Command Execution (Metasploit)
QNAP Q'Center - change_passwd Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45043/?rss
QNAP Q'Center - change_passwd Command Execution (Metasploit)
https://www.exploit-db.com/exploits/45043/?rss
[papers] Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
https://www.exploit-db.com/papers/45045/?rss
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
https://www.exploit-db.com/papers/45045/?rss
Exploit-Db
Papers
Sony Playstation 4 (PS4) - PS4 5.05 BPF Double Free Kernel Exploit Writeup
[webapps] PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
https://www.exploit-db.com/exploits/45047/?rss
PrestaShop < 1.6.1.19 - 'BlowFish ECD' Privilege Escalation
https://www.exploit-db.com/exploits/45047/?rss
[webapps] PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
https://www.exploit-db.com/exploits/45046/?rss
PrestaShop < 1.6.1.19 - 'AES CBC' Privilege Escalation
https://www.exploit-db.com/exploits/45046/?rss
[local] JavaScript Core - Arbitrary Code Execution
JavaScript Core - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45048/?rss
JavaScript Core - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45048/?rss
[webapps] Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection
Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection
https://www.exploit-db.com/exploits/45049/?rss
Smart SMS & Email Manager 3.3 - 'contact_type_id' SQL Injection
https://www.exploit-db.com/exploits/45049/?rss
[shellcode] Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (100 bytes)
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (100 bytes)
https://www.exploit-db.com/exploits/45080/?rss
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (100 bytes)
https://www.exploit-db.com/exploits/45080/?rss
[remote] Microsoft Windows - 'dnslint.exe' Drive-By Download
Microsoft Windows - 'dnslint.exe' Drive-By Download
https://www.exploit-db.com/exploits/45079/?rss
Microsoft Windows - 'dnslint.exe' Drive-By Download
https://www.exploit-db.com/exploits/45079/?rss
[webapps] Tenda Wireless N150 Router 5.07.50 - Cross-Site Request Forgery (Reboot Router)
Tenda Wireless N150 Router 5.07.50 - Cross-Site Request Forgery (Reboot Router)
https://www.exploit-db.com/exploits/45078/?rss
Tenda Wireless N150 Router 5.07.50 - Cross-Site Request Forgery (Reboot Router)
https://www.exploit-db.com/exploits/45078/?rss
[dos] Windows Speech Recognition - Buffer Overflow
Windows Speech Recognition - Buffer Overflow
https://www.exploit-db.com/exploits/45077/?rss
Windows Speech Recognition - Buffer Overflow
https://www.exploit-db.com/exploits/45077/?rss
[webapps] Davolink DVW 3200 Router - Password Disclosure
Davolink DVW 3200 Router - Password Disclosure
https://www.exploit-db.com/exploits/45076/?rss
Davolink DVW 3200 Router - Password Disclosure
https://www.exploit-db.com/exploits/45076/?rss
[papers] Protecting apps against Jailbreaking and Rooting
Protecting apps against Jailbreaking and Rooting
https://www.exploit-db.com/docs/arabic/45075-protecting-apps-against-jailbreaking-and-rooting.pdf?rss
Protecting apps against Jailbreaking and Rooting
https://www.exploit-db.com/docs/arabic/45075-protecting-apps-against-jailbreaking-and-rooting.pdf?rss
[papers] File Upload Restrictions Bypass
File Upload Restrictions Bypass
https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf?rss
File Upload Restrictions Bypass
https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf?rss
[local] Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)
Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/45071/?rss
Splinterware System Scheduler Pro 5.12 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/45071/?rss
[webapps] NUUO NVRmini - 'upgrade_handle.php' Remote Command Execution
NUUO NVRmini - 'upgrade_handle.php' Remote Command Execution
https://www.exploit-db.com/exploits/45070/?rss
NUUO NVRmini - 'upgrade_handle.php' Remote Command Execution
https://www.exploit-db.com/exploits/45070/?rss
[webapps] GeoVision GV-SNVR0811 - Directory Traversal
GeoVision GV-SNVR0811 - Directory Traversal
https://www.exploit-db.com/exploits/45065/?rss
GeoVision GV-SNVR0811 - Directory Traversal
https://www.exploit-db.com/exploits/45065/?rss
[dos] TP-Link TL-WR840N - Denial of Service
TP-Link TL-WR840N - Denial of Service
https://www.exploit-db.com/exploits/45064/?rss
TP-Link TL-WR840N - Denial of Service
https://www.exploit-db.com/exploits/45064/?rss