[webapps] WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
https://www.exploit-db.com/exploits/43485/?rss
WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation
https://www.exploit-db.com/exploits/43485/?rss
[webapps] WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43484/?rss
WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery
https://www.exploit-db.com/exploits/43484/?rss
[shellcode] Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
https://www.exploit-db.com/exploits/43489/?rss
Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
https://www.exploit-db.com/exploits/43489/?rss
[webapps] Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43488/?rss
Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43488/?rss
[remote] HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metasploit)
HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43492/?rss
HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43492/?rss
[dos] Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integer Overflow Check
Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integer Overflow Check
https://www.exploit-db.com/exploits/43491/?rss
Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integer Overflow Check
https://www.exploit-db.com/exploits/43491/?rss
[dos] Multiple CPUs - Information Leak Using Speculative Execution
Multiple CPUs - Information Leak Using Speculative Execution
https://www.exploit-db.com/exploits/43490/?rss
Multiple CPUs - Information Leak Using Speculative Execution
https://www.exploit-db.com/exploits/43490/?rss
[remote] HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)
HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43493/?rss
HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)
https://www.exploit-db.com/exploits/43493/?rss
[local] Jungo Windriver 12.5.1 - Privilege Escalation
Jungo Windriver 12.5.1 - Privilege Escalation
https://www.exploit-db.com/exploits/43494/?rss
Jungo Windriver 12.5.1 - Privilege Escalation
https://www.exploit-db.com/exploits/43494/?rss
[webapps] SAP NetWeaver J2EE Engine 7.40 - SQL Injection
SAP NetWeaver J2EE Engine 7.40 - SQL Injection
https://www.exploit-db.com/exploits/43495/?rss
SAP NetWeaver J2EE Engine 7.40 - SQL Injection
https://www.exploit-db.com/exploits/43495/?rss
[webapps] D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution
D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution
https://www.exploit-db.com/exploits/43496/?rss
D-Link Routers 110/412/615/815 < 1.03 - 'service.cgi' Arbitrary Code Execution
https://www.exploit-db.com/exploits/43496/?rss
[local] Jungo WinDriver 12.5.1 - Local Privilege Escalation
Jungo WinDriver 12.5.1 - Local Privilege Escalation
https://www.exploit-db.com/exploits/43498/?rss
Jungo WinDriver 12.5.1 - Local Privilege Escalation
https://www.exploit-db.com/exploits/43498/?rss
[shellcode] Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)
Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)
https://www.exploit-db.com/exploits/43497/?rss
Linux/ARM (Raspberry Pi) - Bind TCP /bin/sh Shell (0.0.0.0:4444/TCP) Null-Free Shellcode (112 bytes)
https://www.exploit-db.com/exploits/43497/?rss
[local] Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
https://www.exploit-db.com/exploits/43500/?rss
Python smtplib 2.7.11 / 3.4.4 / 3.5.1 - Man In The Middle StartTLS Stripping
https://www.exploit-db.com/exploits/43500/?rss
[local] Parity Browser < 1.6.10 - Bypass Same Origin Policy
Parity Browser < 1.6.10 - Bypass Same Origin Policy
https://www.exploit-db.com/exploits/43499/?rss
Parity Browser < 1.6.10 - Bypass Same Origin Policy
https://www.exploit-db.com/exploits/43499/?rss
[dos] MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
https://www.exploit-db.com/exploits/43501/?rss
MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
https://www.exploit-db.com/exploits/43501/?rss
[shellcode] FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
https://www.exploit-db.com/exploits/43502/?rss
FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
https://www.exploit-db.com/exploits/43502/?rss
[shellcode] FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
https://www.exploit-db.com/exploits/43503/?rss
FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
https://www.exploit-db.com/exploits/43503/?rss
[shellcode] FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
https://www.exploit-db.com/exploits/43505/?rss
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
https://www.exploit-db.com/exploits/43505/?rss
[shellcode] FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss