[dos] Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
https://www.exploit-db.com/exploits/46469
  
  Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
https://www.exploit-db.com/exploits/46469
Exploit Database
  
  Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
  Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow. CVE-2019-3921 . remote exploit for Hardware platform
  [dos] Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass
Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass
https://www.exploit-db.com/exploits/46504
  
  Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass
https://www.exploit-db.com/exploits/46504
Exploit Database
  
  Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass
  Android - getpidcon() Usage in Hardware binder ServiceManager Permits ACL Bypass. CVE-2019-2023 . dos exploit for Android platform
  [dos] Android - binder Use-After-Free via racy Initialization of ->allow_user_free
Android - binder Use-After-Free via racy Initialization of ->allow_user_free
https://www.exploit-db.com/exploits/46503
  
  Android - binder Use-After-Free via racy Initialization of ->allow_user_free
https://www.exploit-db.com/exploits/46503
Exploit Database
  
  Android - binder Use-After-Free via racy Initialization of ->allow_user_free
  Android - binder Use-After-Free via racy Initialization of ->allow_user_free. CVE-2019-2025 . dos exploit for Android platform
  [dos] Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
https://www.exploit-db.com/exploits/46502
  
  Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
https://www.exploit-db.com/exploits/46502
Exploit Database
  
  Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem
  Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem. CVE-2019-9213 . dos exploit for Linux platform
  [remote] Java Debug Wire Protocol (JDWP) - Remote Code Execution
Java Debug Wire Protocol (JDWP) - Remote Code Execution
https://www.exploit-db.com/exploits/46501
  
  Java Debug Wire Protocol (JDWP) - Remote Code Execution
https://www.exploit-db.com/exploits/46501
Exploit Database
  
  Java Debug Wire Protocol (JDWP) - Remote Code Execution
  Java Debug Wire Protocol (JDWP) - Remote Code Execution.. remote exploit for Java platform
  [webapps] OpenDocMan 1.3.4 - 'search.php where' SQL Injection
OpenDocMan 1.3.4 - 'search.php where' SQL Injection
https://www.exploit-db.com/exploits/46500
  
  OpenDocMan 1.3.4 - 'search.php where' SQL Injection
https://www.exploit-db.com/exploits/46500
Exploit Database
  
  OpenDocMan 1.3.4 - 'search.php where' SQL Injection
  OpenDocMan 1.3.4 - 'search.php where' SQL Injection.. webapps exploit for PHP platform
  [shellcode] Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
https://www.exploit-db.com/exploits/46499
  
  Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
https://www.exploit-db.com/exploits/46499
Exploit Database
  
  Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
  Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes).. shellcode exploit for Linux_x86 platform
  [remote] Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() RCE (Metasploit)
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() RCE (Metasploit)
https://www.exploit-db.com/exploits/46510
  
  Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() RCE (Metasploit)
https://www.exploit-db.com/exploits/46510
Exploit Database
  
  Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
  Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit). CVE-2019-6340 . remote exploit for PHP platform
  [remote] Imperva SecureSphere 13.x - PWS Command Injection (Metasploit)
Imperva SecureSphere 13.x - PWS Command Injection (Metasploit)
https://www.exploit-db.com/exploits/46509
  
  Imperva SecureSphere 13.x - PWS Command Injection (Metasploit)
https://www.exploit-db.com/exploits/46509
Exploit Database
  
  Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit)
  Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit).. remote exploit for Linux platform
  [local] FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46508
  
  FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
https://www.exploit-db.com/exploits/46508
Exploit Database
  
  FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)
  FreeBSD - Intel SYSRET Privilege Escalation (Metasploit). CVE-2012-0217 . local exploit for FreeBSD_x86-64 platform
  [local] Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow - (UNICODE)(SEH)
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow - (UNICODE)(SEH)
https://www.exploit-db.com/exploits/46507
  
  Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow - (UNICODE)(SEH)
https://www.exploit-db.com/exploits/46507
Exploit Database
  
  Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH)
  Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH).. local exploit for Windows platform
  [remote] QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46506
  
  QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/46506
Exploit Database
  
  QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
  QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit).. remote exploit for Hardware platform
  [webapps] Kados R10 GreenBee - Multiple SQL Injection
Kados R10 GreenBee - Multiple SQL Injection
https://www.exploit-db.com/exploits/46505
  
  Kados R10 GreenBee - Multiple SQL Injection
https://www.exploit-db.com/exploits/46505
Exploit Database
  
  Kados R10 GreenBee - Multiple SQL Injection
  Kados R10 GreenBee - Multiple SQL Injection.. webapps exploit for PHP platform
  [remote] OpenSSH SCP Client - Write Arbitrary Files
OpenSSH SCP Client - Write Arbitrary Files
https://www.exploit-db.com/exploits/46516
  
  OpenSSH SCP Client - Write Arbitrary Files
https://www.exploit-db.com/exploits/46516
Exploit Database
  
  OpenSSH SCP Client - Write Arbitrary Files
  OpenSSH SCP Client - Write Arbitrary Files. CVE-2019-6111CVE-2019-6110 . remote exploit for Multiple platform
  [papers] File transfer skills in the red team post penetration test
File transfer skills in the red team post penetration test
https://www.exploit-db.com/docs/english/46515-file-transfer-skills-in-the-red-team-post-penetration-test.pdf
  
  
  
  
  
  File transfer skills in the red team post penetration test
https://www.exploit-db.com/docs/english/46515-file-transfer-skills-in-the-red-team-post-penetration-test.pdf
[remote] TeamCity < 9.0.2 - Disabled Registration Bypass
TeamCity < 9.0.2 - Disabled Registration Bypass
https://www.exploit-db.com/exploits/46514
  
  TeamCity < 9.0.2 - Disabled Registration Bypass
https://www.exploit-db.com/exploits/46514
Exploit Database
  
  TeamCity < 9.0.2 - Disabled Registration Bypass
  TeamCity < 9.0.2 - Disabled Registration Bypass.. remote exploit for Multiple platform
  [remote] Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
https://www.exploit-db.com/exploits/46513
  
  Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
https://www.exploit-db.com/exploits/46513
Exploit Database
  
  Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
  Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass). CVE-2018-3245CVE-2018-2628 . remote exploit for Multiple platform
  [webapps] phpBB 3.2.3  - Remote Code Execution
phpBB 3.2.3 - Remote Code Execution
https://www.exploit-db.com/exploits/46512
  
  phpBB 3.2.3 - Remote Code Execution
https://www.exploit-db.com/exploits/46512
Exploit Database
  
  phpBB 3.2.3 - Remote Code Execution
  phpBB 3.2.3 - Remote Code Execution.. webapps exploit for PHP platform
  [webapps] WordPress Core 5.0 - Remote Code Execution
WordPress Core 5.0 - Remote Code Execution
https://www.exploit-db.com/exploits/46511
  
  WordPress Core 5.0 - Remote Code Execution
https://www.exploit-db.com/exploits/46511
Exploit Database
  
  WordPress Core 5.0 - Remote Code Execution
  WordPress Core 5.0 - Remote Code Execution. CVE-2019-8943CVE-2019-8942 . webapps exploit for PHP platform
  [shellcode] Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
https://www.exploit-db.com/exploits/46519
  
  Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
https://www.exploit-db.com/exploits/46519
Exploit Database
  
  Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
  Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes).. shellcode exploit for Linux_x86 platform
  [webapps] McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
https://www.exploit-db.com/exploits/46518
  
  McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
https://www.exploit-db.com/exploits/46518
Exploit Database
  
  McAfee ePO 5.9.1 - Registered Executable Local Access Bypass
  McAfee ePO 5.9.1 - Registered Executable Local Access Bypass. CVE-2018-6671 . webapps exploit for Windows platform