[webapps] Logicspice FAQ Script 2.9.7 - Remote Code Execution
Logicspice FAQ Script 2.9.7 - Remote Code Execution
https://www.exploit-db.com/exploits/45326/?rss
Logicspice FAQ Script 2.9.7 - Remote Code Execution
https://www.exploit-db.com/exploits/45326/?rss
[webapps] PHP File Browser Script 1 - Directory Traversal
PHP File Browser Script 1 - Directory Traversal
https://www.exploit-db.com/exploits/45327/?rss
PHP File Browser Script 1 - Directory Traversal
https://www.exploit-db.com/exploits/45327/?rss
[webapps] Simple POS 4.0.24 - 'columns[0][search][value]' SQL Injection
Simple POS 4.0.24 - 'columns[0][search][value]' SQL Injection
https://www.exploit-db.com/exploits/45328/?rss
Simple POS 4.0.24 - 'columns[0][search][value]' SQL Injection
https://www.exploit-db.com/exploits/45328/?rss
[shellcode] Linux/ARM - read(0, buf, 0xff) stager + execve("/bin/sh", NULL, NULL) Shellcode (20 Bytes)
Linux/ARM - read(0, buf, 0xff) stager + execve("/bin/sh", NULL, NULL) Shellcode (20 Bytes)
https://www.exploit-db.com/exploits/45329/?rss
Linux/ARM - read(0, buf, 0xff) stager + execve("/bin/sh", NULL, NULL) Shellcode (20 Bytes)
https://www.exploit-db.com/exploits/45329/?rss
[webapps] mooSocial Store Plugin 2.6 - SQL Injection
mooSocial Store Plugin 2.6 - SQL Injection
https://www.exploit-db.com/exploits/45330/?rss
mooSocial Store Plugin 2.6 - SQL Injection
https://www.exploit-db.com/exploits/45330/?rss
[remote] FTPShell Server 6.80 - 'Add Account Name' Buffer Overflow (SEH)
FTPShell Server 6.80 - 'Add Account Name' Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/45333/?rss
FTPShell Server 6.80 - 'Add Account Name' Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/45333/?rss
[remote] FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution
FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution
https://www.exploit-db.com/exploits/45332/?rss
FUJI XEROX DocuCentre-V 3065 Printer - Remote Command Execution
https://www.exploit-db.com/exploits/45332/?rss
[papers] Obtaining Command Execution through the NetworkManager Daemon
Obtaining Command Execution through the NetworkManager Daemon
https://www.exploit-db.com/papers/45334/?rss
Obtaining Command Execution through the NetworkManager Daemon
https://www.exploit-db.com/papers/45334/?rss
Exploit-Db
Papers
Obtaining Command Execution through the NetworkManager Daemon
[dos] Microsoft people 10.1807.2131.0 - Denial of service (PoC)
Microsoft people 10.1807.2131.0 - Denial of service (PoC)
https://www.exploit-db.com/exploits/45335/?rss
Microsoft people 10.1807.2131.0 - Denial of service (PoC)
https://www.exploit-db.com/exploits/45335/?rss
[webapps] Tenda ADSL Router D152 - Cross-Site Scripting
Tenda ADSL Router D152 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45336/?rss
Tenda ADSL Router D152 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45336/?rss
[papers] Obtaining Command Execution through the NetworkManager Daemon
Obtaining Command Execution through the NetworkManager Daemon
https://www.exploit-db.com/docs/english/45334-obtaining-command-execution-through-the-networkmanager-daemon.pdf?rss
Obtaining Command Execution through the NetworkManager Daemon
https://www.exploit-db.com/docs/english/45334-obtaining-command-execution-through-the-networkmanager-daemon.pdf?rss
[webapps] NovaRad NovaPACS Diagnostics Viewer 8.5 - XML External Entity Injection (File Disclosure)
NovaRad NovaPACS Diagnostics Viewer 8.5 - XML External Entity Injection (File Disclosure)
https://www.exploit-db.com/exploits/45337/?rss
NovaRad NovaPACS Diagnostics Viewer 8.5 - XML External Entity Injection (File Disclosure)
https://www.exploit-db.com/exploits/45337/?rss
[webapps] Jorani Leave Management 0.6.5 - Cross-Site Scripting
Jorani Leave Management 0.6.5 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45338/?rss
Jorani Leave Management 0.6.5 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45338/?rss
[webapps] Jorani Leave Management 0.6.5 - 'startdate' SQL Injection
Jorani Leave Management 0.6.5 - 'startdate' SQL Injection
https://www.exploit-db.com/exploits/45340/?rss
Jorani Leave Management 0.6.5 - 'startdate' SQL Injection
https://www.exploit-db.com/exploits/45340/?rss
[local] Cisco Umbrella Roaming Client 2.0.168 - Privilege Escalation
Cisco Umbrella Roaming Client 2.0.168 - Privilege Escalation
https://www.exploit-db.com/exploits/45339/?rss
Cisco Umbrella Roaming Client 2.0.168 - Privilege Escalation
https://www.exploit-db.com/exploits/45339/?rss
[webapps] Apache Roller 5.0.3 - XML External Entity Injection (File Disclosure)
Apache Roller 5.0.3 - XML External Entity Injection (File Disclosure)
https://www.exploit-db.com/exploits/45341/?rss
Apache Roller 5.0.3 - XML External Entity Injection (File Disclosure)
https://www.exploit-db.com/exploits/45341/?rss
[webapps] WirelessHART Fieldgate SWG70 3.0 - Directory Traversal
WirelessHART Fieldgate SWG70 3.0 - Directory Traversal
https://www.exploit-db.com/exploits/45342/?rss
WirelessHART Fieldgate SWG70 3.0 - Directory Traversal
https://www.exploit-db.com/exploits/45342/?rss
[webapps] D-Link Dir-600M N150 - Cross-Site Scripting
D-Link Dir-600M N150 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45343/?rss
D-Link Dir-600M N150 - Cross-Site Scripting
https://www.exploit-db.com/exploits/45343/?rss
[webapps] MedDream PACS Server Premium 6.7.1.1 - 'email' SQL Injection
MedDream PACS Server Premium 6.7.1.1 - 'email' SQL Injection
https://www.exploit-db.com/exploits/45344/?rss
MedDream PACS Server Premium 6.7.1.1 - 'email' SQL Injection
https://www.exploit-db.com/exploits/45344/?rss
[remote] Tenable WAS-Scanner 7.4.1708 - Remote Command Execution
Tenable WAS-Scanner 7.4.1708 - Remote Command Execution
https://www.exploit-db.com/exploits/45345/?rss
Tenable WAS-Scanner 7.4.1708 - Remote Command Execution
https://www.exploit-db.com/exploits/45345/?rss
[local] DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH)
DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/45346/?rss
DVD Photo Slideshow Professional 8.07 - Buffer Overflow (SEH)
https://www.exploit-db.com/exploits/45346/?rss