[local] Parity Browser < 1.6.10 - Bypass Same Origin Policy
Parity Browser < 1.6.10 - Bypass Same Origin Policy
https://www.exploit-db.com/exploits/43499/?rss
Parity Browser < 1.6.10 - Bypass Same Origin Policy
https://www.exploit-db.com/exploits/43499/?rss
[dos] MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
https://www.exploit-db.com/exploits/43501/?rss
MiniUPnP MiniUPnPc < 2.0 - Remote Denial of Service
https://www.exploit-db.com/exploits/43501/?rss
[shellcode] FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
https://www.exploit-db.com/exploits/43502/?rss
FreeBSD/x86-64 - execve /bin/sh Shellcode (28 bytes)
https://www.exploit-db.com/exploits/43502/?rss
[shellcode] FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
https://www.exploit-db.com/exploits/43503/?rss
FreeBSD/x86-64 - Bind TCP Password (R2CBw0cr) /bin/sh Shell Shellcode (127 bytes)
https://www.exploit-db.com/exploits/43503/?rss
[shellcode] FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
https://www.exploit-db.com/exploits/43505/?rss
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 Bytes)
https://www.exploit-db.com/exploits/43505/?rss
[shellcode] FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
[shellcode] IRIX - execve(/bin/sh) Shellcode (43 bytes)
IRIX - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43509/?rss
IRIX - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43509/?rss
[shellcode] IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43508/?rss
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43508/?rss
[shellcode] FreeBSD - reboot() Shellcode (15 Bytes)
FreeBSD - reboot() Shellcode (15 Bytes)
https://www.exploit-db.com/exploits/43507/?rss
FreeBSD - reboot() Shellcode (15 Bytes)
https://www.exploit-db.com/exploits/43507/?rss
[shellcode] FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/43506/?rss
FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/43506/?rss
[shellcode] IRIX - stdin-read Shellcode (40 bytes)
IRIX - stdin-read Shellcode (40 bytes)
https://www.exploit-db.com/exploits/43512/?rss
IRIX - stdin-read Shellcode (40 bytes)
https://www.exploit-db.com/exploits/43512/?rss
[shellcode] IRIX - execve(/bin/sh) Shellcode (68 bytes)
IRIX - execve(/bin/sh) Shellcode (68 bytes)
https://www.exploit-db.com/exploits/43511/?rss
IRIX - execve(/bin/sh) Shellcode (68 bytes)
https://www.exploit-db.com/exploits/43511/?rss
[shellcode] IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
https://www.exploit-db.com/exploits/43510/?rss
IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
https://www.exploit-db.com/exploits/43510/?rss
[dos] Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
https://www.exploit-db.com/exploits/43514/?rss
Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
https://www.exploit-db.com/exploits/43514/?rss
[dos] Microsoft Windows SMB Server (v1 and v2) - Mount Point Arbitrary Device Open Privilege Escalation
Microsoft Windows SMB Server (v1 and v2) - Mount Point Arbitrary Device Open Privilege Escalation
https://www.exploit-db.com/exploits/43517/?rss
Microsoft Windows SMB Server (v1 and v2) - Mount Point Arbitrary Device Open Privilege Escalation
https://www.exploit-db.com/exploits/43517/?rss
[dos] Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Escalation
Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Escalation
https://www.exploit-db.com/exploits/43516/?rss
Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Escalation
https://www.exploit-db.com/exploits/43516/?rss
[dos] Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation
Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation
https://www.exploit-db.com/exploits/43515/?rss
Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation
https://www.exploit-db.com/exploits/43515/?rss
[dos] Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
https://www.exploit-db.com/exploits/43513/?rss
Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
https://www.exploit-db.com/exploits/43513/?rss
[remote] phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
https://www.exploit-db.com/exploits/43519/?rss
phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
https://www.exploit-db.com/exploits/43519/?rss
[remote] LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/43518/?rss
LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/43518/?rss