Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[remote] Commvault Communications Service (cvd) - Command Injection (Metasploit)
Commvault Communications Service (cvd) - Command Injection (Metasploit)
https://www.exploit-db.com/exploits/43472/?rss
[webapps] Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/43474/?rss
[shellcode] Linux/x86 - execve /bin/dash Shellcode (30 bytes)
Linux/x86 - execve /bin/dash Shellcode (30 bytes)
https://www.exploit-db.com/exploits/43476/?rss
[webapps] Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
https://www.exploit-db.com/exploits/43475/?rss
[webapps] Muviko 1.1 - SQL Injection
Muviko 1.1 - SQL Injection
https://www.exploit-db.com/exploits/43477/?rss
[remote] DiskBoss Enterprise 8.8.16 - Buffer Overflow
DiskBoss Enterprise 8.8.16 - Buffer Overflow
https://www.exploit-db.com/exploits/43478/?rss
[webapps] WordPress Plugin Events Calendar - 'event_id' SQL Injection
WordPress Plugin Events Calendar - 'event_id' SQL Injection
https://www.exploit-db.com/exploits/43479/?rss
[shellcode] Alpha - setuid() Shellcode (156 bytes)
Alpha - setuid() Shellcode (156 bytes)
https://www.exploit-db.com/exploits/43482/?rss
[shellcode] Alpha - execve() Shellcode (112 bytes)
Alpha - execve() Shellcode (112 bytes)
https://www.exploit-db.com/exploits/43481/?rss
[shellcode] Alpha - /bin/sh Shellcode (80 bytes)
Alpha - /bin/sh Shellcode (80 bytes)
https://www.exploit-db.com/exploits/43480/?rss
[shellcode] BSD/x86 - setreuid(geteuid(), geteuid()) + execve("/bin/sh") Shellcode (36 bytes)
BSD/x86 - setreuid(geteuid(), geteuid()) + execve("/bin/sh") Shellcode (36 bytes)
https://www.exploit-db.com/exploits/43483/?rss
[webapps] WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery
WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43487/?rss
[webapps] WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation
WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation
https://www.exploit-db.com/exploits/43486/?rss
[webapps] WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
https://www.exploit-db.com/exploits/43485/?rss
[webapps] WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43484/?rss
[shellcode] Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
https://www.exploit-db.com/exploits/43489/?rss
[webapps] Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43488/?rss
[remote] HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metasploit)
HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43492/?rss
[dos] Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integer Overflow Check
Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integer Overflow Check
https://www.exploit-db.com/exploits/43491/?rss
[dos] Multiple CPUs - Information Leak Using Speculative Execution
Multiple CPUs - Information Leak Using Speculative Execution
https://www.exploit-db.com/exploits/43490/?rss